Related references
Note: Only part of the references are listed.Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
Mohammad Sabzinejad Farash et al.
NONLINEAR DYNAMICS (2014)
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
Mohammad Sabzinejad Farash et al.
NONLINEAR DYNAMICS (2014)
A secure key agreement protocol based on chaotic maps
Wang Xing-Yuan et al.
CHINESE PHYSICS B (2013)
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
Cheng-Chi Lee et al.
NONLINEAR DYNAMICS (2013)
Chaotic maps-based three-party password-authenticated key agreement scheme
Qi Xie et al.
NONLINEAR DYNAMICS (2013)
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
Cheng-Chi Lee et al.
NONLINEAR DYNAMICS (2013)
Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
Fengjun Zhao et al.
NONLINEAR DYNAMICS (2013)
A security-enhanced key agreement protocol based on chaotic maps
Tzung-Her Chen et al.
SECURITY AND COMMUNICATION NETWORKS (2013)
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
Eun-Jun Yoon
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2012)
Security improvement on an anonymous key agreement protocol based on chaotic maps
Kaiping Xue et al.
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2012)
Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol
Hong Lai et al.
MATHEMATICAL PROBLEMS IN ENGINEERING (2012)
An extended chaotic maps-based key agreement protocol with user anonymity
Cheng-Chi Lee et al.
NONLINEAR DYNAMICS (2012)
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
Debiao He et al.
NONLINEAR DYNAMICS (2012)
A secure chaotic maps-based key agreement protocol without using smart cards
Peng Gong et al.
NONLINEAR DYNAMICS (2012)
An anonymous key agreement protocol based on chaotic maps
Yujun Niu et al.
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2011)
Secure group key agreement protocol based on chaotic Hash
Xianfeng Guo et al.
INFORMATION SCIENCES (2010)
Simple password-based three-party authenticated key exchange without server public keys
Tian-Fu Lee et al.
INFORMATION SCIENCES (2010)
Chaotic map based key agreement with/out clock synchronization
S. Han et al.
CHAOS SOLITONS & FRACTALS (2009)
Communication-efficient three-party protocols for authentication and key agreement
Tian-Fu Lee et al.
COMPUTERS & MATHEMATICS WITH APPLICATIONS (2009)
Cryptanalysis of the public key encryption based on multiple chaotic systems
Linhua Zhang
CHAOS SOLITONS & FRACTALS (2008)
Security of a key agreement protocol based on chaotic maps
Song Han
CHAOS SOLITONS & FRACTALS (2008)
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
Di Xiao et al.
INFORMATION SCIENCES (2008)
A novel key agreement protocol based on chaotic maps
Di Xiao et al.
INFORMATION SCIENCES (2007)
Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords
J Nam et al.
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES (2006)
Security problems with a chaos-based deniable authentication scheme
G Alvarez
CHAOS SOLITONS & FRACTALS (2005)
Security of public-key cryptosystems based on Chebyshev polynomials
P Bergamo et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2005)
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
HA Wen et al.
IEE PROCEEDINGS-COMMUNICATIONS (2005)
Secure key agreement protocols for three-party against guessing attacks
HM Sun et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2005)