A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems

M Khan, T Shah, H Mahmood, MA Gondal… - Nonlinear Dynamics, 2012 - Springer
In cryptographic systems, the encryption process relies on the nonlinear mapping of original
data or plaintext to the secure data. The mapping of data is facilitated by the application of …

An improved anonymous authentication scheme for telecare medical information systems

F Wen, D Guo - Journal of medical systems, 2014 - Springer
Telecare medical information system (TMIS) constructs an efficient and convenient
connection between patients and the medical server. The patients can enjoy medical …

Ideal lattice-based anonymous authentication protocol for mobile devices

Q Feng, D He, S Zeadally, N Kumar… - IEEE Systems …, 2018 - ieeexplore.ieee.org
The rapid advances of wireless communication technologies along with the popularity of
mobile devices are enabling users to access various web services anywhere and anytime …

Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy

Q Jiang, F Wei, S Fu, J Ma, G Li, A Alelaiwi - Nonlinear Dynamics, 2016 - Springer
Due to its high level of security, three-factor authentication combining password, smart card
and biometrics has received much interest in the past decades. Recently, Islam proposed a …

An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps

MS Farash, MA Attari - Nonlinear Dynamics, 2014 - Springer
Three-party password-based authenticated key exchange (3PAKE) protocols allow two
clients to establish a secure session key through a server over an insecure channel …

Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol

D He, Y Chen, J Chen - Nonlinear Dynamics, 2012 - Springer
Very recently, Lee et al.(C. Lee, C. Chen, C. Wu, S. Huang, An extended chaotic maps-
based key agreement protocol with user anonymity, Nonlinear Dynamics, doi …

A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps

CC Lee, CW Hsu - Nonlinear Dynamics, 2013 - Springer
Recently, biometric-based remote user authentication schemes along with passwords have
drawn considerable attention in research. In 2011, Das proposed an improvement on an …

An efficient technique for the construction of substitution box with chaotic partial differential equation

M Khan, T Shah, MA Gondal - Nonlinear Dynamics, 2013 - Springer
In this manuscript, we proposed a novel formation of the nonlinear component of block
cipher. The projected method is chaos based. We are merging two different structures …

A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

CC Lee, CT Li, CW Hsu - Nonlinear Dynamics, 2013 - Springer
In this paper, we propose a scheme utilizing three-party password-based authenticated key
exchange protocol with user anonymity using extended chaotic maps, which is more efficient …

Chaotic map based mobile dynamic ID authenticated key agreement scheme

HY Lin - Wireless Personal Communications, 2014 - Springer
When it comes to key agreement protocol, mutual authentication is regarded as a crucial
security requirement. Yet, conventional authenticated key agreement using static ID cannot …