Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
DOI10.1007/S11071-018-04748-YzbMATH Open1437.94082OpenAlexW2908950575WikidataQ114689433 ScholiaQ114689433MaRDI QIDQ783392FDOQ783392
Authors: D. Kharzeev
Publication date: 4 August 2020
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-018-04748-y
Recommendations
- Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card
- Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- A speech encryption using fractional chaotic systems
- An extended chaotic maps-based key agreement protocol with user anonymity
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- Chaotic maps-based three-party password-authenticated key agreement scheme
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- An anonymous key agreement protocol based on chaotic maps
- An improved key agreement protocol based on chaos
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- A chaotic image encryption algorithm based on perceptron model
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- A revised key agreement protocol based on chaotic maps
- Chaotic map based key agreement with/out clock synchronization
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card
- Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation
- Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control
Cited In (4)
- A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card
- Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
Uses Software
This page was built for publication: Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q783392)