An extended chaotic-maps-based protocol with key agreement for multiserver environments
From MaRDI portal
Publication:2517587
DOI10.1007/S11071-013-1174-3zbMath1319.94076OpenAlexW1974831485MaRDI QIDQ2517587
Chun-Ta Li, Der-Chyuan Lou, Cheng-Chi Lee, Che-Wei Hsu
Publication date: 26 August 2015
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-013-1174-3
Related Items (8)
Three-factor-based confidentiality-preserving remote user authentication scheme in multi-server environment ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ A new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
Cites Work
- Unnamed Item
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Chaotic map based key agreement with/out clock synchronization
- A chaos-based hash function with both modification detection and localization capabilities
- A speech encryption using fractional chaotic systems
- Using smart cards to authenticate remote passwords
- One-way hash function construction based on the chaotic map with changeable-parameter
- An extended chaotic maps-based key agreement protocol with user anonymity
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Note on: ``Design of improved password authentication and update scheme based on elliptic curve cryptography
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A chaotic image encryption algorithm based on perceptron model
- New directions in cryptography
- A logic of authentication
- Security of public-key cryptosystems based on Chebyshev polynomials
- A new remote user authentication scheme for multi-server architecture
This page was built for publication: An extended chaotic-maps-based protocol with key agreement for multiserver environments