메뉴 건너뛰기




Volumn 17, Issue 7, 2012, Pages 2969-2977

Security improvement on an anonymous key agreement protocol based on chaotic maps

Author keywords

Chaotic maps; Contributory property; Key agreement; Protocol security; User anonymity

Indexed keywords

CHAOTIC SYSTEMS; LYAPUNOV METHODS;

EID: 84856430473     PISSN: 10075704     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cnsns.2011.11.025     Document Type: Article
Times cited : (114)

References (18)
  • 1
    • 0017018484 scopus 로고
    • New direction in cryptography
    • Diffie Whitfield, Hellman Martin E. New direction in cryptography. IEEE Trans Inform Theory 1976, 22(6):644-654.
    • (1976) IEEE Trans Inform Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 2
    • 0042786512 scopus 로고    scopus 로고
    • Cryptography with chaos
    • Baptista M.S. Cryptography with chaos. Phys Lett A 1998, 240(1-2):50-54.
    • (1998) Phys Lett A , vol.240 , Issue.1-2 , pp. 50-54
    • Baptista, M.S.1
  • 3
    • 4444346865 scopus 로고    scopus 로고
    • Chaos-based cryptography: a brief overview
    • Kocarev Ljupco Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 2001, 1(3):6-21.
    • (2001) IEEE Circuits Syst Mag , vol.1 , Issue.3 , pp. 6-21
    • Kocarev, L.1
  • 4
    • 77949488987 scopus 로고    scopus 로고
    • A new compound mode of confusion and diffusion for block encryption of image based on chaos
    • Wang Xing-yuan, Chen Feng, Wang Tian A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun Nonlinear Sci Numer Simulat 2010, 15(9):2479-2485.
    • (2010) Commun Nonlinear Sci Numer Simulat , vol.15 , Issue.9 , pp. 2479-2485
    • Wang, X.-Y.1    Chen, F.2    Wang, T.3
  • 5
    • 34548361693 scopus 로고    scopus 로고
    • Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
    • Li Chengqing, Li Shujun, Alvarez Gonzalo, Chen Guanrong, Lo Kwok-Tung Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys Lett A 2007, 369(1-2):23-30.
    • (2007) Phys Lett A , vol.369 , Issue.1-2 , pp. 23-30
    • Li, C.1    Li, S.2    Alvarez, G.3    Chen, G.4    Lo, K.-T.5
  • 6
    • 77949485060 scopus 로고    scopus 로고
    • A chaos-based hash function with both modification detection and localization capabilities
    • Xiao Di, Shih Frank Y., Liao Xiaofeng A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simulat 2010, 15(9):2254-2261.
    • (2010) Commun Nonlinear Sci Numer Simulat , vol.15 , Issue.9 , pp. 2254-2261
    • Xiao, D.1    Shih, F.Y.2    Liao, X.3
  • 7
    • 67649867159 scopus 로고    scopus 로고
    • Chaos-based hash function (CBHF) for cryptographic applications
    • Amin Mohamed, Faragallah Osama S., Abd El-Latif Ahmed A. Chaos-based hash function (CBHF) for cryptographic applications. Chaos Soliton Fract 2009, 42(2):767-772.
    • (2009) Chaos Soliton Fract , vol.42 , Issue.2 , pp. 767-772
    • Amin, M.1    Faragallah, O.S.2    Abd El-Latif, A.A.3
  • 8
    • 33751227507 scopus 로고    scopus 로고
    • A novel key agreement protocol based on chaotic maps
    • Xiao Di, Liao Xiaofeng, Deng Shaojiang A novel key agreement protocol based on chaotic maps. Inform Sci 2007, 177(4):1136-1142.
    • (2007) Inform Sci , vol.177 , Issue.4 , pp. 1136-1142
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 9
    • 43049150816 scopus 로고    scopus 로고
    • Security of a key agreement protocol based on chaotic maps
    • Han Song Security of a key agreement protocol based on chaotic maps. Chaos Soliton Fract 2008, 38(3):764-768.
    • (2008) Chaos Soliton Fract , vol.38 , Issue.3 , pp. 764-768
    • Han, S.1
  • 10
    • 85196138565 scopus 로고    scopus 로고
    • "A new key agreement protocol based on chaotic maps", In: Proceedings of Second KES International Symposium-Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2008), Incheon, Korea, March 26-28
    • Eun-Jun Yoon, Kee-Young Yoo. "A new key agreement protocol based on chaotic maps", In: Proceedings of Second KES International Symposium-Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2008), Incheon, Korea, March 26-28, 2008.
    • (2008)
    • Yoon, E.-J.1    Yoo, K.-Y.2
  • 11
    • 77958150942 scopus 로고    scopus 로고
    • Secure group key agreement protocol based on chaotic Hash
    • Guo Xianfeng, Zhang Jiashu Secure group key agreement protocol based on chaotic Hash. Inform Sci 2010, 180(20):4069-4074.
    • (2010) Inform Sci , vol.180 , Issue.20 , pp. 4069-4074
    • Guo, X.1    Zhang, J.2
  • 12
    • 85196221243 scopus 로고
    • Bellovin, Michael Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks, IEEE symposium on research in security and privacy;
    • Steven M. Bellovin, Michael Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks, IEEE symposium on research in security and privacy; 1992. p. 72-84.
    • (1992) , pp. 72-84
    • Steven, M.1
  • 13
    • 23144460039 scopus 로고    scopus 로고
    • Security of public-key cryptosystems based on Chebyshev polynomials
    • Bergamo P., Darco P., Santis A.D., et al. Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst Regul 2005, 52(7):1382-1393.
    • (2005) IEEE Trans Circuits Syst Regul , vol.52 , Issue.7 , pp. 1382-1393
    • Bergamo, P.1    Darco, P.2    Santis, A.D.3
  • 14
    • 85196150164 scopus 로고    scopus 로고
    • A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE international Conference on Communications (ICC09)
    • Tseng H, Jan R, Yang W, A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE international Conference on Communications (ICC09), 2009; p.1-6.
    • (2009) , pp. 1-6
    • Tseng, H.1    Jan, R.2    Yang, W.3
  • 15
    • 78049382801 scopus 로고    scopus 로고
    • An anonymous key agreement protocol based on chaotic maps
    • Niu Yujun, Wang Xingyuan An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simulat 2011, 16(4):1986-1992.
    • (2011) Commun Nonlinear Sci Numer Simulat , vol.16 , Issue.4 , pp. 1986-1992
    • Niu, Y.1    Wang, X.2
  • 17
    • 9644303109 scopus 로고    scopus 로고
    • One-way Hash function construction based on the chaotic map with changeable-parameter
    • Xiao Di, Liao Xiaofeng, Deng Shaojiang One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Soliton Fract 2005, 24(1):65-71.
    • (2005) Chaos Soliton Fract , vol.24 , Issue.1 , pp. 65-71
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 18
    • 23144460039 scopus 로고    scopus 로고
    • Security of public-key cryptosystems based on Chebyshev polynomials
    • Bergamo Pina, Darco Paolo, Santis Alfredo De, Kocarev Ljupco Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst I 2005, 52(7):1382-1393.
    • (2005) IEEE Trans Circuits Syst I , vol.52 , Issue.7 , pp. 1382-1393
    • Bergamo, P.1    Darco, P.2    Santis, A.D.3    Kocarev, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.