An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map
暂无分享,去创建一个
[1] Xing-yuan Wang,et al. An improved key agreement protocol based on chaos , 2010 .
[2] Xiaofeng Liao,et al. A chaos-based hash function with both modification detection and localization capabilities , 2010 .
[3] Di Xiao,et al. Analysis and improvement of a chaos-based Hash function construction , 2010 .
[4] Song Han,et al. Chaotic map based key agreement with/out clock synchronization , 2009 .
[5] Song Han,et al. Security of a key agreement protocol based on chaotic maps , 2008 .
[6] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[7] Zengqiang Chen,et al. A new image encryption algorithm based on hyper-chaos , 2008 .
[8] A. Akhavan,et al. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .
[9] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[10] Kwok-Wo Wong,et al. A Fast Image Encryption Scheme based on Chaotic Standard Map , 2006, ArXiv.
[11] Yiu-ming Cheung,et al. Security of public key encryption technique based on multiple chaotic systems , 2005, nlin/0510017.
[12] Z. Guan,et al. Chaos-based image encryption algorithm ✩ , 2005 .
[13] Ranjan Bose,et al. Novel public key encryption technique based on multiple chaotic systems. , 2005, Physical review letters.
[14] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[15] Jinyu Kuang,et al. PERIODICITY OF CHAOTIC TRAJECTORIES IN REALIZATIONS OF FINITE COMPUTER PRECISIONS AND ITS IMPLICATION IN CHAOS COMMUNICATIONS , 2003, nlin/0309005.
[16] Meng Zhan,et al. Error function attack of chaos synchronization based encryption schemes. , 2003, Chaos.
[17] Ljupco Kocarev,et al. Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[18] K. Wong,et al. A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .
[19] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[20] M. Baptista. Cryptography with chaos , 1998 .
[21] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .