On the security of a novel key agreement protocol based on chaotic maps
暂无分享,去创建一个
[1] Kwok-Wo Wong,et al. An efficient entire chaos-based scheme for deniable authentication , 2005 .
[2] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[3] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[4] X. Liao,et al. An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .
[5] Jinsheng Sun,et al. A chaotic stream cipher and the usage in video protection , 2007 .
[6] Arthur E. Oldehoeft,et al. A survey of password mechanisms: Weaknesses and potential improvements. Part 2 , 1989, Comput. Secur..
[7] Song Han,et al. Security of a key agreement protocol based on chaotic maps , 2008 .
[8] Gonzalo Alvarez,et al. Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.
[9] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[10] X. Liao,et al. A new chaotic cryptosystem , 2006 .
[11] X. Liao,et al. One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .
[12] Ljupco Kocarev,et al. Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[13] Jinsheng Sun,et al. A block cipher based on a suitable use of the chaotic standard map , 2005 .
[14] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .