A novel key agreement protocol based on chaotic maps
暂无分享,去创建一个
[1] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[2] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[3] Xiaofeng Liao,et al. A digital secure image communication scheme based on the chaotic Chebyshev map , 2004, Int. J. Commun. Syst..
[4] X. Liao,et al. One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .
[5] Alfredo De Santis,et al. Enforcing the security of a time-bound hierarchical key assignment scheme , 2006, Inf. Sci..
[6] M. Baptista. Cryptography with chaos , 1998 .
[7] Roy Tenny,et al. Using distributed nonlinear dynamics for public key encryption. , 2003, Physical review letters.
[8] Ljupco Kocarev,et al. Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .
[9] Nevenko Zunic,et al. Methods for Protecting Password Transmission , 2000, Comput. Secur..
[10] Ljupco Kocarev,et al. Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[11] Gonzalo Álvarez,et al. Breaking network security based on synchronized chaos , 2004, Comput. Commun..
[12] Guanrong Chen,et al. A digital secure image communication scheme based on the chaotic Chebyshev map: Research Articles , 2004 .
[13] E. Alvarez,et al. New approach to chaotic encryption , 1999 .
[14] K. Wong,et al. A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .
[15] Kwok-Wo Wong,et al. A combined chaotic cryptographic and hashing scheme , 2003 .
[16] Gonzalo Alvarez,et al. Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.
[17] Jyh-haw Yeh,et al. Key assignment for enforcing access control policy exceptions in distributed systems , 2003, Inf. Sci..
[18] Kwok-Wo Wong,et al. An efficient entire chaos-based scheme for deniable authentication , 2005 .
[19] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .