A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term forecast becomes impossible by the iterations of a chaotic map. These features look similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. In this research, we propose an authentication pro-tocol by three times of the authentication interaction. This authentication protocol based on the iteration of the coupled logistic maps in a public-key cryptography. We investigate the vulnerability of this user authentica-tion protocol. 1
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Abstract—A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Abstract A chaotic map has sensitivity to changes in the initial conditions and parameters, and a lo...
Chaotic maps have been applied in the design of authenticated key agreement protocols, which allow c...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
[[abstract]]A key agreement protocol is used to derive a shared secure session key by two or more pa...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
Three-party authentication key exchange (3PAKE) is a protocol that allows two users to set up a comm...
User anonymity is one of the key security features of an authenticated key agreement especially for ...
Message authentication, which ensures that a received message comes from its acclaimed sender, is of...
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in...
[[abstract]]Three-party authenticated key exchange (3PAKE) protocol allows two communication users t...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Abstract—A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Abstract A chaotic map has sensitivity to changes in the initial conditions and parameters, and a lo...
Chaotic maps have been applied in the design of authenticated key agreement protocols, which allow c...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
[[abstract]]A key agreement protocol is used to derive a shared secure session key by two or more pa...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
Three-party authentication key exchange (3PAKE) is a protocol that allows two users to set up a comm...
User anonymity is one of the key security features of an authenticated key agreement especially for ...
Message authentication, which ensures that a received message comes from its acclaimed sender, is of...
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in...
[[abstract]]Three-party authenticated key exchange (3PAKE) protocol allows two communication users t...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...