Optimized Key Agreement Protocol Based on Chaotic Maps

[1]  M. Hwang,et al.  Simple authenticated key agreement and protected password change protocol , 2005 .

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Cheng-Chi Lee,et al.  A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013 .

[4]  Min-Shiang Hwang,et al.  A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS , 2010 .

[5]  Gonzalo Alvarez,et al.  Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.

[6]  Ranjan Bose,et al.  Novel public key encryption technique based on multiple chaotic systems. , 2005, Physical review letters.

[7]  Ahmed A. Abd El-Latif,et al.  Chaos-based hash function (CBHF) for cryptographic applications , 2009 .

[8]  Yong Wang,et al.  One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..

[9]  Zuowen Tan,et al.  A chaotic maps-based authenticated key agreement protocol with strong anonymity , 2013 .

[10]  Song Han,et al.  Chaotic map based key agreement with/out clock synchronization , 2009 .

[11]  Xingyuan Wang,et al.  An anonymous key agreement protocol based on chaotic maps , 2011 .

[12]  Eun-Jun Yoon,et al.  Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .

[13]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[14]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[15]  Ping Li,et al.  A secure chaotic maps-based key agreement protocol without using smart cards , 2012 .

[16]  Ljupco Kocarev,et al.  Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[17]  Xiaona Song,et al.  Image encryption based on a delayed fractional-order chaotic logistic system , 2012 .

[18]  Wei-Pang Yang,et al.  A communication-efficient three-party password authenticated key exchange protocol , 2011, Inf. Sci..

[19]  Min-Shiang Hwang,et al.  An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks , 2010 .

[20]  Xiaofeng Liao,et al.  A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..

[21]  Wuu Yang,et al.  A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.

[22]  Wang Xing-Yuan,et al.  A secure key agreement protocol based on chaotic maps , 2013 .