4.7 Article

Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie-Hellman assumption

Related references

Note: Only part of the references are listed.
Article Engineering, Mechanical

Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing

Mohammad Sabzinejad Farash et al.

NONLINEAR DYNAMICS (2014)

Article Physics, Multidisciplinary

A secure key agreement protocol based on chaotic maps

Wang Xing-Yuan et al.

CHINESE PHYSICS B (2013)

Article Engineering, Mechanical

Chaotic maps-based three-party password-authenticated key agreement scheme

Qi Xie et al.

NONLINEAR DYNAMICS (2013)

Article Computer Science, Information Systems

A security-enhanced key agreement protocol based on chaotic maps

Tzung-Her Chen et al.

SECURITY AND COMMUNICATION NETWORKS (2013)

Article Mathematics, Applied

Efficiency and security problems of anonymous key agreement protocol based on chaotic maps

Eun-Jun Yoon

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2012)

Article Mathematics, Applied

Security improvement on an anonymous key agreement protocol based on chaotic maps

Kaiping Xue et al.

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2012)

Article Engineering, Multidisciplinary

Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol

Hong Lai et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2012)

Article Engineering, Mechanical

An extended chaotic maps-based key agreement protocol with user anonymity

Cheng-Chi Lee et al.

NONLINEAR DYNAMICS (2012)

Article Engineering, Mechanical

Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol

Debiao He et al.

NONLINEAR DYNAMICS (2012)

Article Engineering, Mechanical

A secure chaotic maps-based key agreement protocol without using smart cards

Peng Gong et al.

NONLINEAR DYNAMICS (2012)

Article Mathematics, Applied

An anonymous key agreement protocol based on chaotic maps

Yujun Niu et al.

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2011)

Article Computer Science, Information Systems

Secure group key agreement protocol based on chaotic Hash

Xianfeng Guo et al.

INFORMATION SCIENCES (2010)

Article Computer Science, Information Systems

Simple password-based three-party authenticated key exchange without server public keys

Tian-Fu Lee et al.

INFORMATION SCIENCES (2010)

Article Mathematics, Interdisciplinary Applications

Chaotic map based key agreement with/out clock synchronization

S. Han et al.

CHAOS SOLITONS & FRACTALS (2009)

Article Mathematics, Applied

Communication-efficient three-party protocols for authentication and key agreement

Tian-Fu Lee et al.

COMPUTERS & MATHEMATICS WITH APPLICATIONS (2009)

Article Mathematics, Interdisciplinary Applications

Cryptanalysis of the public key encryption based on multiple chaotic systems

Linhua Zhang

CHAOS SOLITONS & FRACTALS (2008)

Article Mathematics, Interdisciplinary Applications

Security of a key agreement protocol based on chaotic maps

Song Han

CHAOS SOLITONS & FRACTALS (2008)

Article Computer Science, Information Systems

Using time-stamp to improve the security of a chaotic maps-based key agreement protocol

Di Xiao et al.

INFORMATION SCIENCES (2008)

Article Computer Science, Information Systems

A novel key agreement protocol based on chaotic maps

Di Xiao et al.

INFORMATION SCIENCES (2007)

Article Computer Science, Hardware & Architecture

Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords

J Nam et al.

IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES (2006)

Article Mathematics, Interdisciplinary Applications

Security problems with a chaos-based deniable authentication scheme

G Alvarez

CHAOS SOLITONS & FRACTALS (2005)

Article Engineering, Electrical & Electronic

Security of public-key cryptosystems based on Chebyshev polynomials

P Bergamo et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2005)

Article Engineering, Electrical & Electronic

Provably secure three-party password-based authenticated key exchange protocol using Weil pairing

HA Wen et al.

IEE PROCEEDINGS-COMMUNICATIONS (2005)

Article Computer Science, Software Engineering

Secure key agreement protocols for three-party against guessing attacks

HM Sun et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2005)