An improved key agreement protocol based on chaos
X Wang, J Zhao - Communications in Nonlinear Science and Numerical …, 2010 - Elsevier
… protocols based on chaos, which … key agreement protocol based on Chebyshev chaotic
map. Utilizing the semi-group property of Chebyshev polynomials, the proposed key exchange …
map. Utilizing the semi-group property of Chebyshev polynomials, the proposed key exchange …
Security of a key agreement protocol based on chaotic maps
S Han - Chaos, Solitons & Fractals, 2008 - Elsevier
… the attack on a key agreement protocol based on Kacorev et al.’s … key agreement protocol.
In this paper, we will present two attacks on Xiao et al.’s key agreement protocol using chaotic …
In this paper, we will present two attacks on Xiao et al.’s key agreement protocol using chaotic …
A novel key agreement protocol based on chaotic maps
D Xiao, X Liao, S Deng - Information Sciences, 2007 - Elsevier
… Based on the semi-group property of Chebyshev chaotic map and some effective
improvements of our original protocol, we propose a novel chaotic maps-based key agreement …
improvements of our original protocol, we propose a novel chaotic maps-based key agreement …
An anonymous key agreement protocol based on chaotic maps
Y Niu, X Wang - Communications in Nonlinear Science and Numerical …, 2011 - Elsevier
… , we propose a new key agreement protocol based on Chebyshev chaotic map. In contrast
… 2, we review Tseng et al.’s key agreement protocol based on chaotic maps. In Section 3, the …
… 2, we review Tseng et al.’s key agreement protocol based on chaotic maps. In Section 3, the …
Secure group key agreement protocol based on chaotic hash
X Guo, J Zhang - Information Sciences, 2010 - Elsevier
… nature of key agreement, that is, the malicious server can predetermine the shared secret key.
… flaws, we propose a secure group key agreement based on the chaotic Hash function. The …
… flaws, we propose a secure group key agreement based on the chaotic Hash function. The …
Chaotic map based key agreement with/out clock synchronization
S Han, E Chang - Chaos, Solitons & Fractals, 2009 - Elsevier
… Protocols based on chaotic map and their security issues In this section, two key agreement
protocols based on chaotic maps are analyzed. Some issues will be pointed out with them. …
protocols based on chaotic maps are analyzed. Some issues will be pointed out with them. …
Security improvement on an anonymous key agreement protocol based on chaotic maps
K Xue, P Hong - Communications in Nonlinear Science and Numerical …, 2012 - Elsevier
… key agreement protocols with the property of both protocol security and user anonymity. In
[14], Tseng et al. firstly proposed a password sharing and chaotic maps based key agreement …
[14], Tseng et al. firstly proposed a password sharing and chaotic maps based key agreement …
A chaotic maps-based key agreement protocol that preserves user anonymity
HR Tseng, RH Jan, W Yang - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
… keys for use in subsequent communications. Recently, several key agreement protocols
based on chaotic … propose a novel key agreement protocol based on chaotic maps to enhance …
based on chaotic … propose a novel key agreement protocol based on chaotic maps to enhance …
An improved secure and efficient password and chaos-based two-party key agreement protocol
Y Liu, K Xue - Nonlinear Dynamics, 2016 - Springer
… [9] protocol provides an enhanced secure chaos-based key agreement protocol, but the added
… an improved secure and efficient chaos-based key agreement protocol, which has fewer …
… an improved secure and efficient chaos-based key agreement protocol, which has fewer …
A secure key agreement protocol based on chaotic maps
XY Wang, DP Luan - Chinese Physics B, 2013 - iopscience.iop.org
… , the public key system and the key agreement protocol based on the chaos theory have not
received the attention they deserve. The key agreement protocol is a key establishment tech…
received the attention they deserve. The key agreement protocol is a key establishment tech…
Related searches
- key agreement protocol
- key agreement scheme chaotic maps
- dynamic group key agreement
- key agreement clock synchronization
- key agreement smart cards
- key agreement scheme password table
- agreement protocol chaotic maps
- agreement protocol chaotic hash
- key agreement scheme three party
- from chaotic to secret key agreement
- secret key agreement blockchain
- secret key agreement cryptography
- secret key agreement algorithm
- secret key agreement encryption
- secret key agreement scheme