Chaotic maps-based three-party password-authenticated key agreement scheme
暂无分享,去创建一个
[1] Kefei Chen,et al. Cryptanalysis and enhancements of efficient three‐party password‐based key exchange scheme , 2013, Int. J. Commun. Syst..
[2] Peilin Hong,et al. Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .
[3] Peng Gong,et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.
[4] Ljupco Kocarev,et al. Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.
[5] Zhi-hui Li,et al. Fast algorithms of public key cryptosystem based on Chebyshev polynomials over finite field , 2011 .
[6] Majid Khan,et al. An efficient method for the construction of block cipher with multi-chaotic systems , 2013 .
[7] Muhammad Khurram Khan,et al. Cryptanalysis of a key agreement protocol based on chaotic Hash , 2013, Int. J. Electron. Secur. Digit. Forensics.
[8] Cheng-Chi Lee,et al. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2013 .
[9] Tao Xiang,et al. On the security of a novel key agreement protocol based on chaotic maps , 2009 .
[10] Zuowen Tan,et al. A chaotic maps-based authenticated key agreement protocol with strong anonymity , 2013 .
[11] Sirma Yavuz,et al. Designing chaotic S-boxes based on time-delay chaotic system , 2013 .
[12] Song Han,et al. Chaotic map based key agreement with/out clock synchronization , 2009 .
[13] Xingyuan Wang,et al. An anonymous key agreement protocol based on chaotic maps , 2011 .
[14] Eun-Jun Yoon,et al. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .
[15] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[16] Kwok-Wo Wong,et al. An efficient entire chaos-based scheme for deniable authentication , 2005 .
[17] Eunjun Yoon,et al. An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map , 2011 .
[18] Tariq Shah,et al. A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm , 2012, Nonlinear Dynamics.
[19] Ping Li,et al. A secure chaotic maps-based key agreement protocol without using smart cards , 2012 .
[20] M. Baptista. Cryptography with chaos , 1998 .
[21] Wuu Yang,et al. A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.
[22] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[23] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[24] Chin-Chen Chang,et al. Chaotic maps-based password-authenticated key agreement using smart cards , 2013, Commun. Nonlinear Sci. Numer. Simul..
[25] Xiaofeng Liao,et al. A chaos-based hash function with both modification detection and localization capabilities , 2010 .
[26] Song Han,et al. Security of a key agreement protocol based on chaotic maps , 2008 .
[27] Jiashu Zhang,et al. Secure group key agreement protocol based on chaotic Hash , 2010, Inf. Sci..
[28] Xiaofeng Liao,et al. Using time-stamp to improve the security of a chaotic maps-based key agreement protocol , 2008, Inf. Sci..
[29] Vinod Patidar,et al. Discrete chaotic cryptography using external key , 2003 .
[30] Jun-Han Yang,et al. Provably secure three-party password authenticated key exchange protocol in the standard model , 2012, J. Syst. Softw..
[31] Cheng-Chi Lee,et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013 .
[32] Yixian Yang,et al. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .
[33] Tariq Shah,et al. An efficient approach for the construction of LFT S-boxes using chaotic logistic map , 2012, Nonlinear Dynamics.
[34] A. Akhavan,et al. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .
[35] Xing-yuan Wang,et al. An improved key agreement protocol based on chaos , 2010 .
[36] Gonzalo Alvarez,et al. Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.