Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card
DOI10.1007/s11071-014-1816-0zbMath1331.94062OpenAlexW2042527029WikidataQ114689439 ScholiaQ114689439MaRDI QIDQ490466
Publication date: 27 August 2015
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-014-1816-0
Network design and communication in computer systems (68M10) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Dynamical systems involving maps of the interval (37E05) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Uses Software
Cites Work
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Chaotic maps-based password-authenticated key agreement using smart cards
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Cryptography based on chaotic random maps with position dependent weighting probabilities
- Chaotic map based key agreement with/out clock synchronization
- Analysis and improvement of a chaos-based hash function construction
- An anonymous key agreement protocol based on chaotic maps
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- An improved key agreement protocol based on chaos
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- Cryptography with chaos
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- Chaotic substitution for highly autocorrelated data in encryption algorithm
- An efficient self-adaptive model for chaotic image encryption algorithm
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- A revised key agreement protocol based on chaotic maps
- Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- A new digital signature scheme based on chaotic maps
- Chaotic maps-based three-party password-authenticated key agreement scheme
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- Improved chaotic maps-based password-authenticated key agreement using smart cards
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- Secure group key agreement protocol based on chaotic hash
- Models and Proofs of Protocol Security: A Progress Report
- On the security of public key protocols
- Mobile values, new names, and secure communication
This page was built for publication: Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card