-
1
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
2043749 10.1016/j.chaos.2003.12.022
-
Chen, G.; Mao, Y.; Chui, C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749-761 (2004)
-
(2004)
Chaos Solitons Fractals
, vol.21
, Issue.3
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.3
-
2
-
-
78049452836
-
A chaotic image encryption algorithm based on perceptron model
-
10.1007/s11071-010-9749-8
-
Wang, X.; Yang, L.; Liu, R.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62, 615-621 (2010)
-
(2010)
Nonlinear Dyn.
, vol.62
, pp. 615-621
-
-
Wang, X.1
Yang, L.2
Liu, R.3
-
3
-
-
79952007772
-
Chaotic encryption algorithm based on alternant of stream cipher and block cipher
-
10.1007/s11071-010-9821-4
-
Wang, X.; Wang, X.; Zhao, J.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63, 587-597 (2011)
-
(2011)
Nonlinear Dyn.
, vol.63
, pp. 587-597
-
-
Wang, X.1
Wang, X.2
Zhao, J.3
-
4
-
-
79959528048
-
A speech encryption using fractional chaotic systems
-
10.1007/s11071-010-9877-1
-
Jye, S.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65, 103-108 (2011)
-
(2011)
Nonlinear Dyn.
, vol.65
, pp. 103-108
-
-
Jye, S.1
-
5
-
-
59949096428
-
A block cipher with dynamic S-boxes based on tent map
-
2502315 10.1016/j.cnsns.2008.12.005
-
Wang, Y.; Wong, K.; Liao, X.; Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3089-3099 (2009)
-
(2009)
Commun. Nonlinear Sci. Numer. Simul.
, vol.14
, Issue.7
, pp. 3089-3099
-
-
Wang, Y.1
Wong, K.2
Liao, X.3
Xiang, T.4
-
6
-
-
33747348397
-
An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
-
DOI 10.1016/j.chaos.2005.10.022, PII S0960077905009604
-
Chen, G.; Chen, Y.; Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3), 571-579 (2007) (Pubitemid 44247626)
-
(2007)
Chaos, Solitons and Fractals
, vol.31
, Issue.3
, pp. 571-579
-
-
Chen, G.1
Chen, Y.2
Liao, X.3
-
7
-
-
77949485060
-
A chaos-based hash function with both modification detection and localization capabilities
-
2602707 10.1016/j.cnsns.2009.10.012
-
Xiao, D.; Shih, F.; Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254-2261 (2010)
-
(2010)
Commun. Nonlinear Sci. Numer. Simul.
, vol.15
, Issue.9
, pp. 2254-2261
-
-
Xiao, D.1
Shih, F.2
Liao, X.3
-
8
-
-
0017018484
-
New direction in cryptography
-
437208 10.1109/TIT.1976.1055638
-
Diffie, W.; Hellman, M.E.: New direction in cryptography. IEEE Trans. Inf. Theory IT-22(6), 644-654 (1976)
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
0037142442
-
Identity-based authenticated key agreement protocol based on Weil pairing
-
DOI 10.1049/el:20020387
-
Smart, N.: An identity based authenticated key agreement protocol based on the Weyl pairing. Electron. Lett. 38(13), 630-632 (2002) (Pubitemid 34725603)
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.P.1
-
10
-
-
0038680685
-
Efficient ID-based authenticated key agreement protocol based on the Weyl pairing
-
10.1049/el:20030448
-
Shim, K.: Efficient ID-based authenticated key agreement protocol based on the Weyl pairing. Electron. Lett. 39(8), 653-654 (2003)
-
(2003)
Electron. Lett.
, vol.39
, Issue.8
, pp. 653-654
-
-
Shim, K.1
-
11
-
-
80052626402
-
A new two-round certificateless authenticated key agreement protocol without bilinear pairings
-
2841856 10.1016/j.mcm.2011.08.004
-
He, D.; Chen, Y.; Chen, J.; Zhang, R.: A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54(11-12), 3143-3152 (2011)
-
(2011)
Math. Comput. Model.
, vol.54
, Issue.11-12
, pp. 3143-3152
-
-
He, D.1
Chen, Y.2
Chen, J.3
Zhang, R.4
-
12
-
-
79955705154
-
Strongly secure identity-based authenticated key agreement protocols
-
10.1016/j.compeleceng.2011.03.001
-
Ni, L.; Chen, G.; Li, J.: Strongly secure identity-based authenticated key agreement protocols. Comput. Electr. Eng. 37(2), 205-217 (2011)
-
(2011)
Comput. Electr. Eng.
, vol.37
, Issue.2
, pp. 205-217
-
-
Ni, L.1
Chen, G.2
Li, J.3
-
13
-
-
79955160951
-
An authentication key agreement protocol using isogenies between elliptic curves
-
2934059
-
He, D.; Chen, J.; Hu, J.: An authentication key agreement protocol using isogenies between elliptic curves. Int. J. Comput. Commun. Control 6(2), 251-258 (2011)
-
(2011)
Int. J. Comput. Commun. Control
, vol.6
, Issue.2
, pp. 251-258
-
-
He, D.1
Chen, J.2
Hu, J.3
-
14
-
-
84865646945
-
An efficient two-party certificateless authenticated key agreement protocol
-
2960814 10.1016/j.camwa.2012.03.044
-
He, D.; Padhye, S.; Chen, J.: An efficient two-party certificateless authenticated key agreement protocol. Comput. Math. Appl. 64(6), 1914-1926 (2012)
-
(2012)
Comput. Math. Appl.
, vol.64
, Issue.6
, pp. 1914-1926
-
-
He, D.1
Padhye, S.2
Chen, J.3
-
15
-
-
80052632132
-
A pairing-free certificateless authenticated key agreement protocol
-
10.1002/dac.1265
-
He, D.; Chen, J.; Hu, J.: A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst. 25(2), 221-230 (2012)
-
(2012)
Int. J. Commun. Syst.
, vol.25
, Issue.2
, pp. 221-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
16
-
-
33751227507
-
A novel key agreement protocol based on chaotic maps
-
DOI 10.1016/j.ins.2006.07.026, PII S0020025506002246
-
Xiao, D.; Liao, X.; Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136-1142 (2007) (Pubitemid 44791324)
-
(2007)
Information Sciences
, vol.177
, Issue.4
, pp. 1136-1142
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
17
-
-
43049150816
-
Security of a key agreement protocol based on chaotic maps
-
DOI 10.1016/j.chaos.2007.01.017, PII S0960077907000343
-
Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3), 764-768 (2008) (Pubitemid 351633025)
-
(2008)
Chaos, Solitons and Fractals
, vol.38
, Issue.3
, pp. 764-768
-
-
Han, S.1
-
18
-
-
70449471727
-
A chaotic maps-based key agreement protocol that preserves user anonymity
-
Dresden, Germany 10.1109/ICC.2009.5198581
-
Tseng, H.; Jan, R.; Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE Int. Conf. Commun.; ICC'09, Dresden, Germany, pp. 1-6 (2009)
-
(2009)
IEEE Int. Conf. Commun.; ICC'09
, pp. 1-6
-
-
Tseng, H.1
Jan, R.2
Yang, W.3
-
19
-
-
78049382801
-
An anonymous key agreement protocol based on chaotic maps
-
2736063 10.1016/j.cnsns.2010.08.015
-
Niu, Y.; Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 1986-1992 (2011)
-
(2011)
Commun. Nonlinear Sci. Numer. Simul.
, vol.16
, pp. 1986-1992
-
-
Niu, Y.1
Wang, X.2
-
20
-
-
84856471309
-
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
-
2880446 10.1016/j.cnsns.2011.11.010
-
Yoon, E.J.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17, 2735-2740 (2012)
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
, vol.17
, pp. 2735-2740
-
-
Yoon, E.J.1
-
21
-
-
84856430473
-
Security improvement on an anonymous key agreement protocol based on chaotic maps
-
2880466 10.1016/j.cnsns.2011.11.025
-
Xue, K.P.; Hong, P.L.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17, 2969-2977 (2012)
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
, vol.17
, pp. 2969-2977
-
-
Xue, K.P.1
Hong, P.L.2
-
22
-
-
84875673567
-
A chaotic maps-based authenticated key agreement protocol with strong anonymity
-
10.1007/s11071-012-0715-5
-
Tan, Z.: A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72, 311-320 (2012)
-
(2012)
Nonlinear Dyn.
, vol.72
, pp. 311-320
-
-
Tan, Z.1
-
23
-
-
84861748201
-
An extended chaotic maps-based key agreement protocol with user anonymity
-
2929856 10.1007/s11071-011-0247-4
-
Lee, C.; Chen, C.; Wu, C.; Huang, S.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1-2), 79-87 (2012)
-
(2012)
Nonlinear Dyn.
, vol.69
, Issue.1-2
, pp. 79-87
-
-
Lee, C.1
Chen, C.2
Wu, C.3
Huang, S.4
-
24
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
2943375 10.1007/s11071-012-0335-0
-
He, D.; Chen, Y.; Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69, 1149-1157 (2012)
-
(2012)
Nonlinear Dyn.
, vol.69
, pp. 1149-1157
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
25
-
-
84867956932
-
Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
-
10.1155/2012/454823 2971243
-
Lai, H.; Xiao, J.; Li, L.; Yang, Y.: Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol. Math. Probl. Eng. (2012). doi: 10.1155/2012/454823
-
(2012)
Math. Probl. Eng.
-
-
Lai, H.1
Xiao, J.2
Li, L.3
Yang, Y.4
-
26
-
-
40249103088
-
Cryptanalysis of the public key encryption based on multiple chaotic systems
-
DOI 10.1016/j.chaos.2006.09.047, PII S096007790600909X
-
Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37, 669-674 (2008) (Pubitemid 351335355)
-
(2008)
Chaos, Solitons and Fractals
, vol.37
, Issue.3
, pp. 669-674
-
-
Zhang, L.1
-
27
-
-
84855196010
-
Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'
-
2887550 10.1016/j.mcm.2011.10.079
-
He, D.; Wu, S.; Chen, J.: Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'. Math. Comput. Model. 55(3-4), 1661-1664 (2012)
-
(2012)
Math. Comput. Model.
, vol.55
, Issue.3-4
, pp. 1661-1664
-
-
He, D.1
Wu, S.2
Chen, J.3
|