Chaotic maps-based three-party password-authenticated key agreement scheme
Published 2013 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Chaotic maps-based three-party password-authenticated key agreement scheme
Authors
Keywords
Chaos, Chaotic maps, Password, Authenticated key agreement, Information security
Journal
NONLINEAR DYNAMICS
Volume 74, Issue 4, Pages 1021-1027
Publisher
Springer Nature
Online
2013-08-21
DOI
10.1007/s11071-013-1020-7
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- (2013) Zuowen Tan NONLINEAR DYNAMICS
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- (2013) Cheng-Chi Lee et al. NONLINEAR DYNAMICS
- A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
- (2012) Cheng-Chi Lee et al. NONLINEAR DYNAMICS
- An efficient approach for the construction of LFT S-boxes using chaotic logistic map
- (2012) Iqtadar Hussain et al. NONLINEAR DYNAMICS
- A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm
- (2012) Iqtadar Hussain et al. NONLINEAR DYNAMICS
- A secure chaotic maps-based key agreement protocol without using smart cards
- (2012) Peng Gong et al. NONLINEAR DYNAMICS
- An efficient method for the construction of block cipher with multi-chaotic systems
- (2012) Majid Khan et al. NONLINEAR DYNAMICS
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- (2011) Eun-Jun Yoon Communications in Nonlinear Science and Numerical Simulation
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- (2011) Kaiping Xue et al. Communications in Nonlinear Science and Numerical Simulation
- Provably secure three-party password authenticated key exchange protocol in the standard model
- (2011) Jun-Han Yang et al. JOURNAL OF SYSTEMS AND SOFTWARE
- An improved key agreement protocol based on chaos
- (2010) Xingyuan Wang et al. Communications in Nonlinear Science and Numerical Simulation
- An anonymous key agreement protocol based on chaotic maps
- (2010) Yujun Niu et al. Communications in Nonlinear Science and Numerical Simulation
- An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map
- (2010) Eun-Jun Yoon et al. Communications in Nonlinear Science and Numerical Simulation
- Secure group key agreement protocol based on chaotic Hash
- (2010) Xianfeng Guo et al. INFORMATION SCIENCES
- A chaos-based hash function with both modification detection and localization capabilities
- (2009) Di Xiao et al. Communications in Nonlinear Science and Numerical Simulation
- On the security of a novel key agreement protocol based on chaotic maps
- (2008) Tao Xiang et al. CHAOS SOLITONS & FRACTALS
- Security of a key agreement protocol based on chaotic maps
- (2007) Song Han CHAOS SOLITONS & FRACTALS
- Chaotic map based key agreement with/out clock synchronization
- (2007) S. Han et al. CHAOS SOLITONS & FRACTALS
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- (2007) Di Xiao et al. INFORMATION SCIENCES
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- (2006) Linhua Zhang CHAOS SOLITONS & FRACTALS
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started