4.2 Article

A security-enhanced key agreement protocol based on chaotic maps

Related references

Note: Only part of the references are listed.
Article Mathematics, Applied

An anonymous key agreement protocol based on chaotic maps

Yujun Niu et al.

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2011)

Article Mathematics, Interdisciplinary Applications

Security of a key agreement protocol based on chaotic maps

Song Han

CHAOS SOLITONS & FRACTALS (2008)

Article Computer Science, Software Engineering

A round- and computation-efficient three-party authenticated key exchange protocol

Tzung-Her Chen et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2008)

Article Computer Science, Information Systems

A novel key agreement protocol based on chaotic maps

Di Xiao et al.

INFORMATION SCIENCES (2007)

Article Engineering, Electrical & Electronic

Security of public-key cryptosystems based on Chebyshev polynomials

P Bergamo et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2005)