Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Due to its high level of security, three-factor authentication combining password, smart card
and biometrics has received much interest in the past decades. Recently, Islam proposed a …
and biometrics has received much interest in the past decades. Recently, Islam proposed a …
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
Three-party password-based authenticated key exchange (3PAKE) protocols allow two
clients to establish a secure session key through a server over an insecure channel …
clients to establish a secure session key through a server over an insecure channel …
A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
Telecare medicine information system (TMIS) is widely used for providing a convenient and
efficient communicating platform between patients at home and physicians at medical …
efficient communicating platform between patients at home and physicians at medical …
[PDF][PDF] On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol.
Chaotic map has been receiving increasing attention in the cryptographic literature. There
are various scholars working on a particular type of authenticated key exchange protocol …
are various scholars working on a particular type of authenticated key exchange protocol …
Chaotic map based mobile dynamic ID authenticated key agreement scheme
HY Lin - Wireless Personal Communications, 2014 - Springer
When it comes to key agreement protocol, mutual authentication is regarded as a crucial
security requirement. Yet, conventional authenticated key agreement using static ID cannot …
security requirement. Yet, conventional authenticated key agreement using static ID cannot …
Chaotic maps-based three-party password-authenticated key agreement scheme
Q **e, J Zhao, X Yu - Nonlinear Dynamics, 2013 - Springer
Since chaos theory related to cryptography has been addressed widely, many chaotic maps
based two-party password-authenticated key agreement (2PAKA) schemes have been …
based two-party password-authenticated key agreement (2PAKA) schemes have been …
Secure and efficient user authentication scheme based on password and smart card for multiserver environment
Y Zhao, S Li, L Jiang - Security and Communication Networks, 2018 - Wiley Online Library
The rapid development of information and network technologies motivates the emergence of
various new computing paradigms, such as distributed computing, cloud computing, and …
various new computing paradigms, such as distributed computing, cloud computing, and …
Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps
With the aim of guaranteeing secure communication through public networks, three-factor
password authentication (TF-PWA) scheme plays a key role in many internet applications …
password authentication (TF-PWA) scheme plays a key role in many internet applications …
A new three-party-authenticated key agreement scheme based on chaotic maps without password table
Three-party-authenticated key agreement allows two users to establish a common session
key through a trusted server via an insecure communication channel. Early authenticated …
key through a trusted server via an insecure communication channel. Early authenticated …
Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
Recently, the theory and application of Chebyshev polynomials have been studied
extremely by the cryptographic research community; many symmetric and asymmetric …
extremely by the cryptographic research community; many symmetric and asymmetric …