-
2
-
-
79952007772
-
Chaotic encryption algorithm based on alternant of stream cipher and block cipher
-
Wang, X.Y., Wang, X.J., Zhao, J.F., Zhang, Z.F.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63(4), 587–597 (2011)
-
(2011)
Nonlinear Dyn.
, vol.63
, Issue.4
, pp. 587-597
-
-
Wang, X.Y.1
Wang, X.J.2
Zhao, J.F.3
Zhang, Z.F.4
-
3
-
-
79959528048
-
A speech encryption using fractional chaotic systems
-
Sheu, L.J.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65(1–2), 103–108 (2011)
-
(2011)
Nonlinear Dyn.
, vol.65
, Issue.1-2
, pp. 103-108
-
-
Sheu, L.J.1
-
4
-
-
59949096428
-
A block cipher with dynamic S-boxes based on tent map
-
Wang, Y., Wong, K.W., Liao, X.F., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3089–3099 (2009)
-
(2009)
Commun. Nonlinear Sci. Numer. Simul.
, vol.14
, Issue.7
, pp. 3089-3099
-
-
Wang, Y.1
Wong, K.W.2
Liao, X.F.3
Xiang, T.4
-
5
-
-
84874683457
-
New identity-based three-party authenticated key agreement protocol with provable security
-
Xiong, H., Chen, Z., Li, F.G.: New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2), 927–932 (2013)
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.2
, pp. 927-932
-
-
Xiong, H.1
Chen, Z.2
Li, F.G.3
-
6
-
-
84865646945
-
An efficient certificateless two-party authenticated key agreement protocol
-
He, D.B., Padhye, S., Chen, J.H.: An efficient certificateless two-party authenticated key agreement protocol. Comput. Math. Appl. 64(6), 1914–1926 (2012)
-
(2012)
Comput. Math. Appl.
, vol.64
, Issue.6
, pp. 1914-1926
-
-
He, D.B.1
Padhye, S.2
Chen, J.H.3
-
7
-
-
81955161281
-
An improved two-party identity-based authenticated key agreement protocol using pairings
-
Hölbl, M., Welzer, T., Brumen, B.: An improved two-party identity-based authenticated key agreement protocol using pairings. J. Comput. Syst. Sci. 78(1), 142–150 (2012)
-
(2012)
J. Comput. Syst. Sci.
, vol.78
, Issue.1
, pp. 142-150
-
-
Hölbl, M.1
Welzer, T.2
Brumen, B.3
-
8
-
-
84865071791
-
Group key agreement for secure group communication in dynamic peer systems
-
Lv, X.X., Li, H., Wang, B.C.: Group key agreement for secure group communication in dynamic peer systems. J. Parallel Distrib. Comput. 72(10), 1195–1200 (2012)
-
(2012)
J. Parallel Distrib. Comput.
, vol.72
, Issue.10
, pp. 1195-1200
-
-
Lv, X.X.1
Li, H.2
Wang, B.C.3
-
9
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
-
He, D.B., Chen, J.H., Hu, J.: An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf. Fusion 13(3), 223–230 (2012)
-
(2012)
Inf. Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
He, D.B.1
Chen, J.H.2
Hu, J.3
-
10
-
-
47549109760
-
A round-and computation-efficient three-party authenticated key exchange protocol
-
Chen, T.H., Lee, W.B., Chen, H.B.: A round-and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81(9), 1581–1590 (2008)
-
(2008)
J. Syst. Softw.
, vol.81
, Issue.9
, pp. 1581-1590
-
-
Chen, T.H.1
Lee, W.B.2
Chen, H.B.3
-
11
-
-
33751227507
-
A novel key agreement protocol based on chaotic maps
-
Xiao, D., Liao, X.F., Deng, S.J.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)
-
(2007)
Inf. Sci.
, vol.177
, Issue.4
, pp. 1136-1142
-
-
Xiao, D.1
Liao, X.F.2
Deng, S.J.3
-
12
-
-
43049150816
-
Security of a key agreement protocol based on chaotic maps
-
Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3), 764–768 (2008)
-
(2008)
Chaos Solitons Fractals
, vol.38
, Issue.3
, pp. 764-768
-
-
Han, S.1
-
13
-
-
64949092681
-
On the security of a novel key agreement protocol based on chaotic maps
-
Xiang, T., Wong, K.W., Liao, X.F.: On the security of a novel key agreement protocol based on chaotic maps. Chaos Solitons Fractals 40(2), 672–675 (2009)
-
(2009)
Chaos Solitons Fractals
, vol.40
, Issue.2
, pp. 672-675
-
-
Xiang, T.1
Wong, K.W.2
Liao, X.F.3
-
14
-
-
38349025681
-
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
-
Xiao, D., Liao, X.F., Deng, S.J.: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178(6), 1598–1602 (2008)
-
(2008)
Inf. Sci.
, vol.178
, Issue.6
, pp. 1598-1602
-
-
Xiao, D.1
Liao, X.F.2
Deng, S.J.3
-
15
-
-
62949175202
-
Chaotic map based key agreement with/out clock synchronization
-
Han, S., Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39(3), 1283–1289 (2009)
-
(2009)
Chaos Solitons Fractals
, vol.39
, Issue.3
, pp. 1283-1289
-
-
Han, S.1
Chang, E.2
-
16
-
-
70449471727
-
A chaotic maps-based key agreement protocol that preserves user anonymity
-
Dresden, Germany:
-
Tseng, H.R., Jan, R.H., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications, 2009, ICC’09, pp. 1–6. Dresden, Germany (2009)
-
(2009)
IEEE International Conference on Communications, 2009, ICC’09
, pp. 1-6
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
17
-
-
78049382801
-
An anonymous key agreement protocol based on chaotic maps
-
Niu, Y.J., Wang, X.Y.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986–1992 (2011)
-
(2011)
Commun. Nonlinear Sci. Numer. Simul.
, vol.16
, Issue.4
, pp. 1986-1992
-
-
Niu, Y.J.1
Wang, X.Y.2
-
18
-
-
84856471309
-
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
-
Yoon, E.J.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2735–2740 (2012)
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
, vol.17
, Issue.7
, pp. 2735-2740
-
-
Yoon, E.J.1
-
19
-
-
84856430473
-
Security improvement on an anonymous key agreement protocol based on chaotic maps
-
Xue, K.P., Hong, P.L.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
, vol.17
, Issue.7
, pp. 2969-2977
-
-
Xue, K.P.1
Hong, P.L.2
-
20
-
-
84875673567
-
A chaotic maps-based authenticated key agreement protocol with strong anonymity
-
Tan, Z.W.: A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72(1–2), 1–10 (2013)
-
(2013)
Nonlinear Dyn.
, vol.72
, Issue.1-2
, pp. 1-10
-
-
Tan, Z.W.1
-
21
-
-
84861748201
-
An extended chaotic maps-based key agreement protocol with user anonymity
-
Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)
-
(2012)
Nonlinear Dyn.
, vol.69
, Issue.1-2
, pp. 79-87
-
-
Lee, C.C.1
Chen, C.L.2
Wu, C.Y.3
Huang, S.Y.4
-
22
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
He, D.B., Chen, Y.T., Chen, J.H.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)
-
(2012)
Nonlinear Dyn.
, vol.69
, Issue.3
, pp. 1149-1157
-
-
He, D.B.1
Chen, Y.T.2
Chen, J.H.3
-
23
-
-
77952742569
-
An improved key agreement protocol based on chaos
-
Wang, X.Y., Zhao, J.F.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 4052–4057 (2010)
-
(2010)
Commun. Nonlinear Sci. Numer. Simul.
, vol.15
, Issue.12
, pp. 4052-4057
-
-
Wang, X.Y.1
Zhao, J.F.2
-
24
-
-
78651423836
-
An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map
-
Yoon, E.J., Jeon, I.S.: An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 2383–2389 (2011)
-
(2011)
Commun. Nonlinear Sci. Numer. Simul.
, vol.16
, Issue.6
, pp. 2383-2389
-
-
Yoon, E.J.1
Jeon, I.S.2
-
25
-
-
84867956932
-
-
Lai, H., Xiao, J., Li, L., et al.: Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol. Math. Probl. Eng. Article ID 454823, 17 pages(2012)
-
Lai, H., Xiao, J., Li, L., et al.: Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol. Math. Probl. Eng. Article ID 454823, 17 pages(2012). doi:10.1155/2012/454823
-
-
-
-
26
-
-
84883751308
-
Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
-
Zhao, F.J., Gong, P., Li, S., Li, M.G., Li, P.: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. 74(1–2), 419–427 (2013)
-
(2013)
Nonlinear Dyn.
, vol.74
, Issue.1-2
, pp. 419-427
-
-
Zhao, F.J.1
Gong, P.2
Li, S.3
Li, M.G.4
Li, P.5
-
27
-
-
84888643068
-
Chaotic maps-based three-party password-authenticated key agreement scheme
-
Xie, Q., Zhao, J.M., Yu, X.Y.: Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dyn. 74(4), 1021–1027 (2013)
-
(2013)
Nonlinear Dyn.
, vol.74
, Issue.4
, pp. 1021-1027
-
-
Xie, Q.1
Zhao, J.M.2
Yu, X.Y.3
-
28
-
-
84902266968
-
-
Farash, M.S., Attari, M.A.: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn. (2014, in press)
-
Farash, M.S., Attari, M.A.: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn. (2014, in press). doi:10.1007/s11071-014-1304-6
-
-
-
-
29
-
-
84879782333
-
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
-
Lee, C.C., Li, C.T., Hsu, C.W.: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73(1), 125–132 (2013)
-
(2013)
Nonlinear Dyn.
, vol.73
, Issue.1
, pp. 125-132
-
-
Lee, C.C.1
Li, C.T.2
Hsu, C.W.3
-
30
-
-
84888642495
-
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
-
Li, C.T., Lee, C.C., Weng, C.Y.: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4), 1133–1143 (2013)
-
(2013)
Nonlinear Dyn.
, vol.74
, Issue.4
, pp. 1133-1143
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
31
-
-
84899085643
-
An extended chaotic-maps-based protocol with key agreement for multiserver environments
-
Lee, C.C., Lou, D.C., Li, C.T., Hsu, C.W.: An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn. 76(1), 853–866 (2014)
-
(2014)
Nonlinear Dyn.
, vol.76
, Issue.1
, pp. 853-866
-
-
Lee, C.C.1
Lou, D.C.2
Li, C.T.3
Hsu, C.W.4
-
32
-
-
84871955339
-
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
-
Lee, C.C., Hsu, C.W.: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1), 201–211 (2013)
-
(2013)
Nonlinear Dyn.
, vol.71
, Issue.1
, pp. 201-211
-
-
Lee, C.C.1
Hsu, C.W.2
-
33
-
-
40249103088
-
Cryptanalysis of the public key encryption based on multiple chaotic systems
-
Zhang, L.H.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669–674 (2008)
-
(2008)
Chaos Solitons Fractals
, vol.37
, Issue.3
, pp. 669-674
-
-
Zhang, L.H.1
-
34
-
-
77949485060
-
A chaos-based hash function with both modification detection and localization capabilities
-
Xiao, D., Shih, F.Y., Liao, X.F.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254–2261 (2010)
-
(2010)
Commun. Nonlinear Sci. Numer. Simul.
, vol.15
, Issue.9
, pp. 2254-2261
-
-
Xiao, D.1
Shih, F.Y.2
Liao, X.F.3
-
35
-
-
0000523051
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. R. Soc. Lond. A Math. Phys. Sci. 1989(426), 233–271 (1871)
-
(1871)
Proc. R. Soc. Lond. A Math. Phys. Sci.
, vol.1989
, Issue.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
|