Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps
暂无分享,去创建一个
Chien-Ming Chen | Linlin Xu | King-Hang Wang | Tsu-Yang Wu | Shuai Liu | Tsu-Yang Wu | King-Hang Wang | Chien‐Ming Chen | Linlin Xu | Shuai Liu
[1] Chien-Ming Chen,et al. On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol , 2016, J. Netw. Intell..
[2] Ljupco Kocarev,et al. Public-key encryption with chaos. , 2004, Chaos.
[3] Xun Yi,et al. Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.
[4] Ljupco Kocarev,et al. Public-Key Encryption Based on Chebyshev Polynomials , 2005 .
[5] J. Fridrich. Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[6] Hung-Min Sun,et al. An Efficient Solution for Hierarchical Access Control Problem in Cloud Environment , 2014 .
[7] Cheng-Chi Lee,et al. A new three-party-authenticated key agreement scheme based on chaotic maps without password table , 2014, Nonlinear Dynamics.
[8] Hongfeng Zhu,et al. A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem , 2015, J. Inf. Hiding Multim. Signal Process..
[9] YoungJu Choie,et al. Efficient identity-based authenticated key agreement protocol from pairings , 2005, Appl. Math. Comput..
[10] Yixian Yang,et al. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .
[11] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[12] Xiaoni Du,et al. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..
[13] Xuexian Hu,et al. Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol , 2014 .
[14] Cheng-Chi Lee,et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013, Nonlinear Dynamics.
[15] Hong-Feng Zhu. Sustained and Authenticated of a Universal Construction for Multiple Key Agreement Based on Chaotic Maps with Privacy Preserving , 2016 .
[16] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[17] Suman Bala,et al. A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks , 2016, Int. J. Ad Hoc Ubiquitous Comput..
[18] Hung-Min Sun,et al. A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices , 2013, IEEE Transactions on Information Forensics and Security.
[19] Hung-Min Sun,et al. A provable authenticated group key agreement protocol for mobile environment , 2015, Inf. Sci..
[20] Peng Gong,et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.
[21] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[22] Xiong Li,et al. Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol , 2015 .
[23] Qi Xie,et al. Chaotic maps-based three-party password-authenticated key agreement scheme , 2013, Nonlinear Dynamics.
[24] Kwok-Wo Wong,et al. On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$ , 2010, IEEE Transactions on Computers.
[25] Yan Zhang,et al. A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model , 2016, J. Inf. Hiding Multim. Signal Process..
[26] Saru Kumari,et al. Cryptanalysis and improvement of a three‐party password‐based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2017, Int. J. Commun. Syst..