An improved key agreement protocol based on chaos

X Wang, J Zhao - Communications in Nonlinear Science and Numerical …, 2010 - Elsevier
… protocols based on chaos, which … key agreement protocol based on Chebyshev chaotic
map. Utilizing the semi-group property of Chebyshev polynomials, the proposed key exchange

Security of a key agreement protocol based on chaotic maps

S Han - Chaos, Solitons & Fractals, 2008 - Elsevier
… the attack on a key agreement protocol based on Kacorev et al.’s … key agreement protocol.
In this paper, we will present two attacks on Xiao et al.’s key agreement protocol using chaotic

A novel key agreement protocol based on chaotic maps

D Xiao, X Liao, S Deng - Information Sciences, 2007 - Elsevier
… Based on the semi-group property of Chebyshev chaotic map and some effective
improvements of our original protocol, we propose a novel chaotic maps-based key agreement

An anonymous key agreement protocol based on chaotic maps

Y Niu, X Wang - Communications in Nonlinear Science and Numerical …, 2011 - Elsevier
… , we propose a new key agreement protocol based on Chebyshev chaotic map. In contrast
… 2, we review Tseng et al.’s key agreement protocol based on chaotic maps. In Section 3, the …

Secure group key agreement protocol based on chaotic hash

X Guo, J Zhang - Information Sciences, 2010 - Elsevier
… nature of key agreement, that is, the malicious server can predetermine the shared secret key.
… flaws, we propose a secure group key agreement based on the chaotic Hash function. The …

Chaotic map based key agreement with/out clock synchronization

S Han, E Chang - Chaos, Solitons & Fractals, 2009 - Elsevier
… Protocols based on chaotic map and their security issues In this section, two key agreement
protocols based on chaotic maps are analyzed. Some issues will be pointed out with them. …

Security improvement on an anonymous key agreement protocol based on chaotic maps

K Xue, P Hong - Communications in Nonlinear Science and Numerical …, 2012 - Elsevier
key agreement protocols with the property of both protocol security and user anonymity. In
[14], Tseng et al. firstly proposed a password sharing and chaotic maps based key agreement

A chaotic maps-based key agreement protocol that preserves user anonymity

HR Tseng, RH Jan, W Yang - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
keys for use in subsequent communications. Recently, several key agreement protocols
based on chaotic … propose a novel key agreement protocol based on chaotic maps to enhance …

An improved secure and efficient password and chaos-based two-party key agreement protocol

Y Liu, K Xue - Nonlinear Dynamics, 2016 - Springer
… [9] protocol provides an enhanced secure chaos-based key agreement protocol, but the added
… an improved secure and efficient chaos-based key agreement protocol, which has fewer …

A secure key agreement protocol based on chaotic maps

XY Wang, DP Luan - Chinese Physics B, 2013 - iopscience.iop.org
… , the public key system and the key agreement protocol based on the chaos theory have not
received the attention they deserve. The key agreement protocol is a key establishment tech…