A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems
In cryptographic systems, the encryption process relies on the nonlinear mapping of original
data or plaintext to the secure data. The mapping of data is facilitated by the application of …
data or plaintext to the secure data. The mapping of data is facilitated by the application of …
An improved anonymous authentication scheme for telecare medical information systems
F Wen, D Guo - Journal of medical systems, 2014 - Springer
Telecare medical information system (TMIS) constructs an efficient and convenient
connection between patients and the medical server. The patients can enjoy medical …
connection between patients and the medical server. The patients can enjoy medical …
Ideal lattice-based anonymous authentication protocol for mobile devices
The rapid advances of wireless communication technologies along with the popularity of
mobile devices are enabling users to access various web services anywhere and anytime …
mobile devices are enabling users to access various web services anywhere and anytime …
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Q Jiang, F Wei, S Fu, J Ma, G Li, A Alelaiwi - Nonlinear Dynamics, 2016 - Springer
Due to its high level of security, three-factor authentication combining password, smart card
and biometrics has received much interest in the past decades. Recently, Islam proposed a …
and biometrics has received much interest in the past decades. Recently, Islam proposed a …
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
Three-party password-based authenticated key exchange (3PAKE) protocols allow two
clients to establish a secure session key through a server over an insecure channel …
clients to establish a secure session key through a server over an insecure channel …
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
Very recently, Lee et al.(C. Lee, C. Chen, C. Wu, S. Huang, An extended chaotic maps-
based key agreement protocol with user anonymity, Nonlinear Dynamics, doi …
based key agreement protocol with user anonymity, Nonlinear Dynamics, doi …
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
CC Lee, CW Hsu - Nonlinear Dynamics, 2013 - Springer
Recently, biometric-based remote user authentication schemes along with passwords have
drawn considerable attention in research. In 2011, Das proposed an improvement on an …
drawn considerable attention in research. In 2011, Das proposed an improvement on an …
An efficient technique for the construction of substitution box with chaotic partial differential equation
In this manuscript, we proposed a novel formation of the nonlinear component of block
cipher. The projected method is chaos based. We are merging two different structures …
cipher. The projected method is chaos based. We are merging two different structures …
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
In this paper, we propose a scheme utilizing three-party password-based authenticated key
exchange protocol with user anonymity using extended chaotic maps, which is more efficient …
exchange protocol with user anonymity using extended chaotic maps, which is more efficient …
Chaotic map based mobile dynamic ID authenticated key agreement scheme
HY Lin - Wireless Personal Communications, 2014 - Springer
When it comes to key agreement protocol, mutual authentication is regarded as a crucial
security requirement. Yet, conventional authenticated key agreement using static ID cannot …
security requirement. Yet, conventional authenticated key agreement using static ID cannot …