Security of a key agreement protocol based on chaotic maps
From MaRDI portal
Recommendations
- On the security of a novel key agreement protocol based on chaotic maps
- A revised key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- An anonymous key agreement protocol based on chaotic maps
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
Cites work
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- A fast chaotic cryptographic scheme with dynamic look-up table
- A system theory approach for designing cryptosystems based on hyperchaos
- An efficient entire chaos-based scheme for deniable authentication
- Chaos and cryptography
- One-way hash function construction based on the chaotic map with changeable-parameter
- Security of public-key cryptosystems based on Chebyshev polynomials
- Security problems with a chaos-based deniable authentication scheme
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
Cited in
(29)- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Secure group key agreement protocol based on chaotic hash
- Improved chaotic maps-based password-authenticated key agreement using smart cards
- Chaotic map based key agreement with/out clock synchronization
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- On the security of a novel key agreement protocol based on chaotic maps
- Chaotic maps-based password-authenticated key agreement using smart cards
- A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\)
- A Secret Key Cryptosystem by Iterating a Chaotic Map
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- scientific article; zbMATH DE number 5507095 (Why is no real title available?)
- An extended chaotic maps-based key agreement protocol with user anonymity
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- The three-party quantum key agreement protocol with quantum Fourier transform
- An anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- scientific article; zbMATH DE number 5631863 (Why is no real title available?)
- An improved key agreement protocol based on chaos
- A revised key agreement protocol based on chaotic maps
- Security of public key encryption technique based on multiple chaotic systems
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- Chaotic maps-based three-party password-authenticated key agreement scheme
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- scientific article; zbMATH DE number 7448810 (Why is no real title available?)
This page was built for publication: Security of a key agreement protocol based on chaotic maps
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q953624)