An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map

[1]  Xing-yuan Wang,et al.  An improved key agreement protocol based on chaos , 2010 .

[2]  Xiaofeng Liao,et al.  A chaos-based hash function with both modification detection and localization capabilities , 2010 .

[3]  Di Xiao,et al.  Analysis and improvement of a chaos-based Hash function construction , 2010 .

[4]  Song Han,et al.  Chaotic map based key agreement with/out clock synchronization , 2009 .

[5]  Song Han,et al.  Security of a key agreement protocol based on chaotic maps , 2008 .

[6]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[7]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[8]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[9]  Xiaofeng Liao,et al.  A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..

[10]  Kwok-Wo Wong,et al.  A Fast Image Encryption Scheme based on Chaotic Standard Map , 2006, ArXiv.

[11]  Yiu-ming Cheung,et al.  Security of public key encryption technique based on multiple chaotic systems , 2005, nlin/0510017.

[12]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[13]  Ranjan Bose,et al.  Novel public key encryption technique based on multiple chaotic systems. , 2005, Physical review letters.

[14]  Alfredo De Santis,et al.  Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.

[15]  Jinyu Kuang,et al.  PERIODICITY OF CHAOTIC TRAJECTORIES IN REALIZATIONS OF FINITE COMPUTER PRECISIONS AND ITS IMPLICATION IN CHAOS COMMUNICATIONS , 2003, nlin/0309005.

[16]  Meng Zhan,et al.  Error function attack of chaos synchronization based encryption schemes. , 2003, Chaos.

[17]  Ljupco Kocarev,et al.  Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[18]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[19]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[20]  M. Baptista Cryptography with chaos , 1998 .

[21]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .