-
1
-
-
0042786512
-
Cryptography with chaos
-
1619621 10.1016/S0375-9601(98)00086-3
-
Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240, 50-54 (1998)
-
(1998)
Phys. Lett. A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
2
-
-
84886233591
-
Designing chaotic S-boxes based on time-delay chaotic system
-
10.1007/s11071-013-0987-4
-
Özkaynak, F.; Yavuz, S.: Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn. (2013). doi: 10.1007/s11071-013-0987-4
-
(2013)
Nonlinear Dyn.
-
-
Özkaynak, F.1
Yavuz, S.2
-
3
-
-
34249064674
-
A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps
-
10.1016/j.physleta.2007.01.081
-
Behnia, S.; Akhshani, A.; Ahadpour, S.; Mahmodi, H.; Akhavan, A.: A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys. Lett. A 366, 391-396 (2007)
-
(2007)
Phys. Lett. A
, vol.366
, pp. 391-396
-
-
Behnia, S.1
Akhshani, A.2
Ahadpour, S.3
Mahmodi, H.4
Akhavan, A.5
-
4
-
-
84870901272
-
A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm
-
2992175 10.1007/s11071-012-0573-1
-
Hussain, I.; Shah, T.; Gondal, M.: A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyn. 70, 1791-1794 (2012)
-
(2012)
Nonlinear Dyn.
, vol.70
, pp. 1791-1794
-
-
Hussain, I.1
Shah, T.2
Gondal, M.3
-
5
-
-
84871976249
-
An efficient approach for the construction of LFT S-boxes using chaotic logistic map
-
3010568 10.1007/s11071-012-0646-1
-
Hussain, I.; Shah, T.; Gondal, M.; Mahmood, H.: An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn. 71, 133-140 (2013)
-
(2013)
Nonlinear Dyn.
, vol.71
, pp. 133-140
-
-
Hussain, I.1
Shah, T.2
Gondal, M.3
Mahmood, H.4
-
6
-
-
84893703468
-
An efficient method for the construction of block cipher with multi-chaotic systems
-
3015255 10.1007/s11071-012-0675-9
-
Khan, M.; Shah, T.; Mahmood, H.; Gondal, M.: An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 71, 489-492 (2013)
-
(2013)
Nonlinear Dyn.
, vol.71
, pp. 489-492
-
-
Khan, M.1
Shah, T.2
Mahmood, H.3
Gondal, M.4
-
7
-
-
6344239137
-
An efficient entire chaos-based scheme for deniable authentication
-
Xiao, D.; Liao, X.; Wong, K.: An efficient entire chaos-based scheme for deniable authentication. Chaos Solitons Fractals 23, 1327-1331 (2005)
-
(2005)
Chaos Solitons Fractals
, vol.23
, pp. 1327-1331
-
-
Xiao, D.1
Liao, X.2
Wong, K.3
-
8
-
-
17644411093
-
Security problems with a chaos-based deniable authentication scheme
-
10.1016/j.chaos.2004.12.023
-
Alvarez, G.: Security problems with a chaos-based deniable authentication scheme. Chaos Solitons Fractals 26, 7-11 (2005)
-
(2005)
Chaos Solitons Fractals
, vol.26
, pp. 7-11
-
-
Alvarez, G.1
-
9
-
-
33751227507
-
A novel key agreement protocol based on chaotic maps
-
2288747 10.1016/j.ins.2006.07.026
-
Xiao, D.; Liao, X.; Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177, 1136-1142 (2007)
-
(2007)
Inf. Sci.
, vol.177
, pp. 1136-1142
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
10
-
-
43049150816
-
Security of a key agreement protocol based on chaotic maps
-
2423362 10.1016/j.chaos.2007.01.017
-
Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38, 764-768 (2008)
-
(2008)
Chaos Solitons Fractals
, vol.38
, pp. 764-768
-
-
Han, S.1
-
11
-
-
64949092681
-
On the security of a novel key agreement protocol based on chaotic maps
-
10.1016/j.chaos.2007.08.012
-
Xiang, T.; Wong, K.; Liao, X.: On the security of a novel key agreement protocol based on chaotic maps. Chaos Solitons Fractals 40, 672-675 (2009)
-
(2009)
Chaos Solitons Fractals
, vol.40
, pp. 672-675
-
-
Xiang, T.1
Wong, K.2
Liao, X.3
-
12
-
-
38349025681
-
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
-
2406988 10.1016/j.ins.2007.11.001
-
Xiao, D.; Liao, X.; Deng, S.: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178, 1598-11602 (2008)
-
(2008)
Inf. Sci.
, vol.178
, pp. 1598-11602
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
13
-
-
62949175202
-
Chaotic map based key agreement with/out clock synchronization
-
2512932 10.1016/j.chaos.2007.06.030
-
Han, S.; Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39, 1283-1289 (2009)
-
(2009)
Chaos Solitons Fractals
, vol.39
, pp. 1283-1289
-
-
Han, S.1
Chang, E.2
-
14
-
-
77958150942
-
Secure group key agreement protocol based on chaotic Hash
-
10.1016/j.ins.2010.06.013
-
Guo, X.; Zhang, J.: Secure group key agreement protocol based on chaotic Hash. Inf. Sci. 180, 4069-4074 (2010)
-
(2010)
Inf. Sci.
, vol.180
, pp. 4069-4074
-
-
Guo, X.1
Zhang, J.2
-
16
-
-
84870863840
-
A secure chaotic maps-based key agreement protocol without using smart cards
-
2998172 10.1007/s11071-012-0628-3
-
Gong, P.; Li, P.; Shi, W.: A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dyn. 70, 2401-2406 (2012)
-
(2012)
Nonlinear Dyn.
, vol.70
, pp. 2401-2406
-
-
Gong, P.1
Li, P.2
Shi, W.3
-
18
-
-
78049382801
-
An anonymous key agreement protocol based on chaotic maps
-
2736063 10.1016/j.cnsns.2010.08.015
-
Niu, Y.; Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986-1992 (2011)
-
(2011)
Commun. Nonlinear Sci. Numer. Simul.
, vol.16
, Issue.4
, pp. 1986-1992
-
-
Niu, Y.1
Wang, X.2
-
19
-
-
84856430473
-
Security improvement on an anonymous key agreement protocol based on chaotic maps
-
2880466 10.1016/j.cnsns.2011.11.025
-
Xue, K.; Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17, 2969-2977 (2012)
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
, vol.17
, pp. 2969-2977
-
-
Xue, K.1
Hong, P.2
-
20
-
-
84856471309
-
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
-
2880446 10.1016/j.cnsns.2011.11.010
-
Yoon, E.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17, 2735-2740 (2012)
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
, vol.17
, pp. 2735-2740
-
-
Yoon, E.1
-
21
-
-
84875673567
-
A chaotic maps-based authenticated key agreement protocol with strong anonymity
-
10.1007/s11071-012-0715-5
-
Tan, Z.: A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72, 311-320 (2013)
-
(2013)
Nonlinear Dyn.
, vol.72
, pp. 311-320
-
-
Tan, Z.1
-
22
-
-
84871955339
-
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
-
3010573 10.1007/s11071-012-0652-3
-
Lee, C.; Hsu, C.: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71, 201-211 (2013)
-
(2013)
Nonlinear Dyn.
, vol.71
, pp. 201-211
-
-
Lee, C.1
Hsu, C.2
-
23
-
-
84872373047
-
Chaotic maps-based password-authenticated key agreement using smart cards
-
10.1016/j.cnsns.2012.09.032
-
Guo, C.; Chang, C.C.: Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. (2012). doi: 10.1016/j.cnsns.2012.09.032
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
-
-
Guo, C.1
Chang, C.C.2
-
24
-
-
77952742569
-
An improved key agreement protocol based on chaos
-
2652676 10.1016/j.cnsns.2010.02.014
-
Wang, X.; Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15, 4052-4057 (2010)
-
(2010)
Commun. Nonlinear Sci. Numer. Simul.
, vol.15
, pp. 4052-4057
-
-
Wang, X.1
Zhao, J.2
-
25
-
-
78651423836
-
An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
-
2765190 10.1016/j.cnsns.2010.09.021
-
Yoon, E.; Jeon, I.: An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16, 2383-2389 (2011)
-
(2011)
Commun. Nonlinear Sci. Numer. Simul.
, vol.16
, pp. 2383-2389
-
-
Yoon, E.1
Jeon, I.2
-
26
-
-
84867956932
-
Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
-
10.1155/2012/454823 2971243
-
Lai, H.; Xiao, J.; Li, L.; Yang, Y.: Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol. Math. Probl. Eng. (2012). doi: 10.1155/2012/454823
-
(2012)
Math. Probl. Eng.
-
-
Lai, H.1
Xiao, J.2
Li, L.3
Yang, Y.4
-
27
-
-
84883751308
-
Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
-
10.1007/s11071-013-0979-4
-
Zhao, F.; Gong, P.; Li, S.; Li, M.; Li, P.: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. (2013). doi: 10.1007/s11071-013-0979-4
-
(2013)
Nonlinear Dyn.
-
-
Zhao, F.1
Gong, P.2
Li, S.3
Li, M.4
Li, P.5
-
28
-
-
84879782333
-
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
-
10.1007/s11071-013-0772-4
-
Lee, C.; Li, C.; Hsu, C.: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73, 125-132 (2013)
-
(2013)
Nonlinear Dyn.
, vol.73
, pp. 125-132
-
-
Lee, C.1
Li, C.2
Hsu, C.3
-
29
-
-
84355166674
-
Provably secure three-party password authenticated key exchange protocol in the standard model
-
10.1016/j.jss.2011.08.024
-
Yang, J.; Cao, T.: Provably secure three-party password authenticated key exchange protocol in the standard model. J. Syst. Softw. 85, 340-350 (2012)
-
(2012)
J. Syst. Softw.
, vol.85
, pp. 340-350
-
-
Yang, J.1
Cao, T.2
-
30
-
-
84876132598
-
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme
-
10.1002/dac.1362
-
Wu, S.; Chen, K.; Pu, Q.; Zhu, Y.: Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. (2012). doi: 10.1002/dac.1362
-
(2012)
Int. J. Commun. Syst.
-
-
Wu, S.1
Chen, K.2
Pu, Q.3
Zhu, Y.4
-
31
-
-
40249103088
-
Cryptanalysis of the public key encryption based on multiple chaotic systems
-
2400324 10.1016/j.chaos.2006.09.047
-
Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669-674 (2008)
-
(2008)
Chaos Solitons Fractals
, vol.37
, Issue.3
, pp. 669-674
-
-
Zhang, L.1
-
32
-
-
77949485060
-
A chaos-based hash function with both modification detection and localization capabilities
-
2602707 10.1016/j.cnsns.2009.10.012
-
Xiao, D.; Shih, F.; Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15, 2254-2261 (2010)
-
(2010)
Commun. Nonlinear Sci. Numer. Simul.
, vol.15
, pp. 2254-2261
-
-
Xiao, D.1
Shih, F.2
Liao, X.3
-
34
-
-
23144460039
-
Security of public key cryptosystems based on Chebyshev polynomials
-
10.1109/TCSI.2005.851701
-
Bergamo, P.; D'Arco, P.; Santis, A.; Kocarev, L.: Security of public key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I 52, 1382-1393 (2005)
-
(2005)
IEEE Trans. Circuits Syst. i
, vol.52
, pp. 1382-1393
-
-
Bergamo, P.1
D'Arco, P.2
Santis, A.3
Kocarev, L.4
-
36
-
-
0037451060
-
Discrete chaotic cryptography using external key
-
1971482 10.1016/S0375-9601(03)00122-1
-
Pareek, N.K.; Patidar, V.; Sud, K.K.: Discrete chaotic cryptography using external key. Phys. Lett. A 309, 75-82 (2003)
-
(2003)
Phys. Lett. A
, vol.309
, pp. 75-82
-
-
Pareek, N.K.1
Patidar, V.2
Sud, K.K.3
-
37
-
-
79955618398
-
Fast algorithms of public key cryptosystem based on Chebyshev polynomials over finite field
-
10.1016/S1005-8885(10)60049-0
-
Li, Z.; Cui, Y.; Xu, H.: Fast algorithms of public key cryptosystem based on Chebyshev polynomials over finite field. J. China Univ. Post Telecommun. 18(2), 86-93 (2011)
-
(2011)
J. China Univ. Post Telecommun.
, vol.18
, Issue.2
, pp. 86-93
-
-
Li, Z.1
Cui, Y.2
Xu, H.3
|