共 107 条
[1]
Algehawi MB(2010)A new identity based encryption (IBE) scheme using extended chebyshev polynomial over finite fields Phys. Lett. A 374 4670-4674
[2]
Azman S(2006)Some basic cryptographic requirements for chaos-based cryptosystems Int. J. Bifurcat. Chaos 16 2129-2151
[3]
Alvarez G(2005)Security of public-key cryptosystems based on chebyshev polynomials IEEE Trans. Circuits Syst. I Regul. Pap. 52 1382-1393
[4]
Li S(2007)More on security of public-key cryptosystems based on chebyshev polynomials IEEE Trans. Circuits Syst. II Express Briefs 54 795-799
[5]
Bergamo P(2008)Three weaknesses in a simple three-party key exchange protocol Inf. Sci. 178 220-229
[6]
D’Arco P(2010)Analysis and improvement of a chaos-based hash function construction Commun. Nonlinear Sci. Numer. Simul. 15 1338-1347
[7]
De Santis A(2005)Robust remote authentication scheme with smart cards Comput. Secur. 24 619-628
[8]
Kocarev L(2012)A secure chaotic maps-based key agreement protocol without using smart cards Nonlinear Dyn. 70 2401-2406
[9]
Cheong KY(2011)Modeling key compromise impersonation attacks on group key exchange protocols ACM Trans. Inf. Syst. Secur. 14 28:1-28:24
[10]
Koshiba T(2013)Chaotic maps-based password-authenticated key agreement using smart cards Commun. Nonlinear Sci. Numer. Simul. 18 1433-1440