Pages that link to "Item:Q4590397"
From MaRDI portal
The following pages link to Security of public-key cryptosystems based on Chebyshev polynomials (Q4590397):
Displaying 44 items.
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication (Q327431) (← links)
- An improved secure and efficient password and chaos-based two-party key agreement protocol (Q332780) (← links)
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy (Q335718) (← links)
- A chaotic maps-based authenticated key agreement protocol with strong anonymity (Q355005) (← links)
- Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\) (Q429602) (← links)
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps (Q434814) (← links)
- Security improvement on an anonymous key agreement protocol based on chaotic maps (Q434848) (← links)
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards (Q493916) (← links)
- Compressive sensing using chaotic sequence based on Chebyshev map (Q494825) (← links)
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps (Q508778) (← links)
- Self-generated-certificate public key encryption without pairing and its application (Q545362) (← links)
- On the security of a novel key agreement protocol based on chaotic maps (Q600489) (← links)
- Chaotic map based key agreement with/out clock synchronization (Q712006) (← links)
- A novel combined cryptographic and hash algorithm based on chaotic control character (Q718026) (← links)
- An anonymous key agreement protocol based on chaotic maps (Q718505) (← links)
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map (Q718554) (← links)
- An improved key agreement protocol based on chaos (Q720323) (← links)
- Security of a key agreement protocol based on chaotic maps (Q953624) (← links)
- A back-iteration method for reconstructing chaotic sequences in finite-precision machines (Q1024649) (← links)
- Three theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module \(2^w\) (Q1742871) (← links)
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps (Q1749189) (← links)
- A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps (Q1797913) (← links)
- An extended chaotic maps-based key agreement protocol with user anonymity (Q1928918) (← links)
- Public-key encryption based on Chebyshev polynomials over \(\mathrm{GF}(q)\) (Q1944037) (← links)
- Theoretical design and circuit implementation of novel digital chaotic systems via hybrid control (Q2122852) (← links)
- On \((\beta,\gamma)\)-Chebyshev functions and points of the interval (Q2238042) (← links)
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing (Q2259603) (← links)
- Counteracting the dynamical degradation of digital chaos via hybrid control (Q2299831) (← links)
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem (Q2318572) (← links)
- A revised key agreement protocol based on chaotic maps (Q2346824) (← links)
- Cryptanalysis of the public key encryption based on multiple chaotic systems (Q2425485) (← links)
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps (Q2435610) (← links)
- Chaotic maps-based three-party password-authenticated key agreement scheme (Q2441996) (← links)
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol (Q2476790) (← links)
- Improved chaotic maps-based password-authenticated key agreement using smart cards (Q2513843) (← links)
- An extended chaotic-maps-based protocol with key agreement for multiserver environments (Q2517587) (← links)
- An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services (Q2520651) (← links)
- Secure group key agreement protocol based on chaotic hash (Q2638204) (← links)
- Cryptanalysis of Multiplicative Coupled Cryptosystems Based on the Chebyshev Polynomials (Q3187959) (← links)
- CRYPTANALYSIS OF CHAOS-BASED ELGAMAL PUBLIC-KEY ENCRYPTION (Q3502425) (← links)
- A new way to produce key streams based on chaotic sequences (Q5031928) (← links)
- A Note on the Insecurity of Cryptosystems Based on Chebyshev Polynomials (Q5064646) (← links)
- ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks (Q5197648) (← links)
- Secure Communication Systems Based on the Synchronization of Chaotic Systems (Q5215346) (← links)