On the Security of a Three-Party-Authenticated Key Agreement Scheme based on Chaotic Maps