Cryptography based on chaos theory has developed fast in the past few years, but most of the researches focus on secret key cryptography. There are few public key encryption algorithms and cryptographic protocols based on chaos, which are also of great importance for network security. We introduce a
On key agreement protocols based on tamper-proof hardware
β Scribed by Yuliang Zheng
- Publisher
- Elsevier Science
- Year
- 1995
- Tongue
- English
- Weight
- 476 KB
- Volume
- 53
- Category
- Article
- ISSN
- 0020-0190
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Recently, Tseng et al. proposed a novel key agreement protocol based on chaotic maps. They claimed that the protocol achieved session key agreement between a server and a user, and allowed the user to anonymously interact with the server. This paper, however, will demonstrate that Tseng et al.'s pro
This paper proposes a new efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. The proposed key agreement protocol uses the semigroup property of Chebyshev polynomials to agree Diffie-Hellman based session key. The proposed protocol provides strong security comp