Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
暂无分享,去创建一个
Peng Gong | Shuai Li | Ping Li | Fengjun Zhao | Mingguan Li | Ping Li | Peng Gong | Mingguan Li | Shuai Li | Fengqun Zhao
[1] Yixian Yang,et al. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .
[2] Nigel P. Smart,et al. AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .
[3] Kyung-Ah Shim. Efficient ID-based authenticated key agreement protocol based on Weil pairing , 2003 .
[4] Long-Jye Sheu,et al. A speech encryption using fractional chaotic systems , 2011 .
[5] Jianhua Chen,et al. Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography' , 2012, Math. Comput. Model..
[6] G. P. Biswas,et al. Design of improved password authentication and update scheme based on elliptic curve cryptography , 2013, Math. Comput. Model..
[7] Song Han,et al. Security of a key agreement protocol based on chaotic maps , 2008 .
[8] Debiao He,et al. Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol , 2012, Nonlinear Dynamics.
[9] Rui Zhang,et al. A new two-round certificateless authenticated key agreement protocol without bilinear pairings , 2011, Mathematical and computer modelling.
[10] Sahadeo Padhye,et al. An efficient certificateless two-party authenticated key agreement protocol , 2012, Comput. Math. Appl..
[11] Zuowen Tan,et al. A chaotic maps-based authenticated key agreement protocol with strong anonymity , 2013 .
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[13] Xingyuan Wang,et al. An anonymous key agreement protocol based on chaotic maps , 2011 .
[14] Eun-Jun Yoon,et al. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .
[15] X. Liao,et al. An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .
[16] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[17] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[18] Jianhua Li,et al. Strongly secure identity-based authenticated key agreement protocols , 2011, Comput. Electr. Eng..
[19] Zhenfeng Zhang,et al. Chaotic encryption algorithm based on alternant of stream cipher and block cipher , 2011 .
[20] Peilin Hong,et al. Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .
[21] Sahadeo Padhye,et al. A pairing‐free certificateless authenticated key agreement protocol , 2012, Int. J. Commun. Syst..
[22] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[23] Wuu Yang,et al. A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.
[24] Xing-yuan Wang,et al. A chaotic image encryption algorithm based on perceptron model , 2010 .
[25] X. Liao,et al. A block cipher with dynamic S-boxes based on tent map , 2009 .
[26] Jianhua Chen,et al. An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves , 2011, Int. J. Comput. Commun. Control.
[27] Cheng-Chi Lee,et al. An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.
[28] Xiaofeng Liao,et al. A chaos-based hash function with both modification detection and localization capabilities , 2010 .