2010
DOI: 10.1016/j.cnsns.2010.02.014
|View full text |Cite
|
Sign up to set email alerts
|

An improved key agreement protocol based on chaos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
62
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 119 publications
(62 citation statements)
references
References 15 publications
0
62
0
Order By: Relevance
“…A number of methods have been proposed to reduce the required computation time of T n (x) in [32]. Moreover, the trigonometric equality T n (x) = cos(n.arccos(x)) allows us to compute Chebyshev polynomials more efficiently and implement them on resource constrained devices such as RFID tags.…”
Section: Theorem 5 Our Protocol Satisfies Forward Privacy Given That mentioning
confidence: 99%
See 1 more Smart Citation
“…A number of methods have been proposed to reduce the required computation time of T n (x) in [32]. Moreover, the trigonometric equality T n (x) = cos(n.arccos(x)) allows us to compute Chebyshev polynomials more efficiently and implement them on resource constrained devices such as RFID tags.…”
Section: Theorem 5 Our Protocol Satisfies Forward Privacy Given That mentioning
confidence: 99%
“…The formal definition of Chebyshev chaotic maps that are proposed by Wang and Zho [32] are given as follows.…”
Section: Chebyshev Polynomialsmentioning
confidence: 99%
“…In this section, we briefly introduce the basic concepts of Chebyshev chaotic map [21] and its related mathematical properties. And then, the basic concepts of one-way hash function and Symmetric encryption are described.…”
Section: Preliminariesmentioning
confidence: 99%
“…Xingyuan Wang and Jianfeng Zhao in [11] have done their research work on the chaotic encryption, an enhanced key agreement protocol based on Chebyshev chaotic maps, and a public key cryptographic algorithm is utilized. The proposed key agreement protocol overcomes many drawbacks of the previous key agreement protocols based on chaos, so the security is enhanced effectively.…”
Section: Chaotic Image Encryption Schemesmentioning
confidence: 99%