Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Published 2014 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Authors
Keywords
Heuristic security, Standard model, Enhanced Chebyshev chaotic maps, Pseudo-random function ensembles, Decisional Diffie–Hellman
Journal
NONLINEAR DYNAMICS
Volume 77, Issue 4, Pages 1427-1439
Publisher
Springer Nature
Online
2014-04-11
DOI
10.1007/s11071-014-1388-z
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- (2013) Zuowen Tan NONLINEAR DYNAMICS
- An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
- (2013) Chun-Ta Li et al. NONLINEAR DYNAMICS
- Chaotic maps-based three-party password-authenticated key agreement scheme
- (2013) Qi Xie et al. NONLINEAR DYNAMICS
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- (2013) Cheng-Chi Lee et al. NONLINEAR DYNAMICS
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- (2013) Fengjun Zhao et al. NONLINEAR DYNAMICS
- A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
- (2012) Cheng-Chi Lee et al. NONLINEAR DYNAMICS
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- (2012) Debiao He et al. NONLINEAR DYNAMICS
- A secure chaotic maps-based key agreement protocol without using smart cards
- (2012) Peng Gong et al. NONLINEAR DYNAMICS
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
- (2011) Lei Zhang et al. INFORMATION SCIENCES
- Provably secure three-party password-based authenticated key exchange protocol
- (2011) Jianjie Zhao et al. INFORMATION SCIENCES
- Provably secure three-party password authenticated key exchange protocol in the standard model
- (2011) Jun-Han Yang et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Provably secure and efficient certificateless authenticated tripartite key agreement protocol
- (2011) Hu Xiong et al. MATHEMATICAL AND COMPUTER MODELLING
- An extended chaotic maps-based key agreement protocol with user anonymity
- (2011) Cheng-Chi Lee et al. NONLINEAR DYNAMICS
- An improved key agreement protocol based on chaos
- (2010) Xingyuan Wang et al. Communications in Nonlinear Science and Numerical Simulation
- An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map
- (2010) Eun-Jun Yoon et al. Communications in Nonlinear Science and Numerical Simulation
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- (2010) Hua Guo et al. INFORMATION SCIENCES
- On the security of a novel key agreement protocol based on chaotic maps
- (2008) Tao Xiang et al. CHAOS SOLITONS & FRACTALS
- Security of a key agreement protocol based on chaotic maps
- (2007) Song Han CHAOS SOLITONS & FRACTALS
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- (2006) Linhua Zhang CHAOS SOLITONS & FRACTALS
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started