Optimized Key Agreement Protocol Based on Chaotic Maps
暂无分享,去创建一个
Lequan Min | Xiaodong Li | Geng Zhao | Ping Zhen | L. Min | Geng Zhao | P. Zhen | Xiaodong Li
[1] M. Hwang,et al. Simple authenticated key agreement and protected password change protocol , 2005 .
[2] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[3] Cheng-Chi Lee,et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013 .
[4] Min-Shiang Hwang,et al. A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS , 2010 .
[5] Gonzalo Alvarez,et al. Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.
[6] Ranjan Bose,et al. Novel public key encryption technique based on multiple chaotic systems. , 2005, Physical review letters.
[7] Ahmed A. Abd El-Latif,et al. Chaos-based hash function (CBHF) for cryptographic applications , 2009 .
[8] Yong Wang,et al. One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..
[9] Zuowen Tan,et al. A chaotic maps-based authenticated key agreement protocol with strong anonymity , 2013 .
[10] Song Han,et al. Chaotic map based key agreement with/out clock synchronization , 2009 .
[11] Xingyuan Wang,et al. An anonymous key agreement protocol based on chaotic maps , 2011 .
[12] Eun-Jun Yoon,et al. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .
[13] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[14] Hongjun Liu,et al. Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..
[15] Ping Li,et al. A secure chaotic maps-based key agreement protocol without using smart cards , 2012 .
[16] Ljupco Kocarev,et al. Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[17] Xiaona Song,et al. Image encryption based on a delayed fractional-order chaotic logistic system , 2012 .
[18] Wei-Pang Yang,et al. A communication-efficient three-party password authenticated key exchange protocol , 2011, Inf. Sci..
[19] Min-Shiang Hwang,et al. An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks , 2010 .
[20] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[21] Wuu Yang,et al. A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.
[22] Wang Xing-Yuan,et al. A secure key agreement protocol based on chaotic maps , 2013 .