Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
From MaRDI portal
Publication:1928988
DOI10.1007/s11071-012-0335-0zbMath1256.68056OpenAlexW2060680991WikidataQ57668436 ScholiaQ57668436MaRDI QIDQ1928988
Debiao He, Yitao Chen, Jian-Hua Chen
Publication date: 4 January 2013
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-012-0335-0
Data encryption (aspects in computer science) (68P25) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Authentication, digital signatures and secret sharing (94A62)
Related Items (18)
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ A chaotic maps-based authenticated key agreement protocol with strong anonymity ⋮ The three-party quantum key agreement protocol with quantum Fourier transform ⋮ A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps ⋮ Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials ⋮ A new digital signature scheme based on chaotic maps ⋮ Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing ⋮ A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps ⋮ An extended chaotic-maps-based protocol with key agreement for multiserver environments ⋮ Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol ⋮ An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps ⋮ A revised key agreement protocol based on chaotic maps ⋮ Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system ⋮ Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the security of a novel key agreement protocol based on chaotic maps
- A block cipher with dynamic S-boxes based on tent map
- Analysis and improvement of a chaos-based hash function construction
- An anonymous key agreement protocol based on chaotic maps
- A chaos-based hash function with both modification detection and localization capabilities
- A speech encryption using fractional chaotic systems
- Security of a key agreement protocol based on chaotic maps
- One-way hash function construction based on the chaotic map with changeable-parameter
- A symmetric image encryption scheme based on 3D chaotic cat maps
- An extended chaotic maps-based key agreement protocol with user anonymity
- Note on: ``Design of improved password authentication and update scheme based on elliptic curve cryptography
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A chaotic image encryption algorithm based on perceptron model
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
This page was built for publication: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol