An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
From MaRDI portal
Publication:718554
DOI10.1016/j.cnsns.2010.09.021zbMath1221.94073MaRDI QIDQ718554
Publication date: 23 September 2011
Published in: Communications in Nonlinear Science and Numerical Simulation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cnsns.2010.09.021
Related Items
A signature algorithm based on chaotic maps and factoring problems, Efficiency and security problems of anonymous key agreement protocol based on chaotic maps, Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card, Uniform big bang-chaotic big crunch optimization, Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table, Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps, A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps, Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol, Counteracting the dynamical degradation of digital chaos via hybrid control, A revised key agreement protocol based on chaotic maps, Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model, Chaotic maps-based three-party password-authenticated key agreement scheme, Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
Cites Work
- Unnamed Item
- Unnamed Item
- A new image encryption algorithm based on hyper-chaos
- A fast image encryption scheme based on chaotic standard map
- Chaotic map based key agreement with/out clock synchronization
- Analysis and improvement of a chaos-based hash function construction
- A chaos-based hash function with both modification detection and localization capabilities
- An improved key agreement protocol based on chaos
- Security of public key encryption technique based on multiple chaotic systems
- Security of a key agreement protocol based on chaotic maps
- A fast chaotic cryptographic scheme with dynamic look-up table
- Chaos-based image encryption algorithm
- Cryptography with chaos
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- Security of public-key cryptosystems based on Chebyshev polynomials