Han, S.; Chang, E. Chaotic map based key agreement with/out clock synchronization. (English) Zbl 1197.94190 Chaos Solitons Fractals 39, No. 3, 1283-1289 (2009). Not reviewed. Editorial remark: There are doubts about a proper peer-reviewing procedure of this journal. The editor-in-chief has retired, but, according to a statement of the publisher, articles accepted under his guidance are published without additional control. Cited in 18 Documents MSC: 94A60 Cryptography 37N99 Applications of dynamical systems PDF BibTeX XML Cite \textit{S. Han} and \textit{E. Chang}, Chaos Solitons Fractals 39, No. 3, 1283--1289 (2009; Zbl 1197.94190) Full Text: DOI OpenURL References: [1] Alvarez, G., Security problems with a chaos-based deniable authentication scheme, Chaos, solitons & fractals, 26, 1, 7-11, (2005) · Zbl 1077.94019 [2] Bergamo, P.; D’Arco, P.; Santis, A.; Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials, IEEE trans circuits syst I, 52, 7, 1382-1393, (2005) · Zbl 1374.94775 [3] Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A., A novel algorithm for encryption based on mixture of chaotic maps, Chaos, solitons & fractals, 35, 2, 408-419, (2008) · Zbl 1134.94356 [4] Carroll, T.L.; Pecora, M., Synchronizing chaotic circuits, IEEE trans circuits syst, 38, 453-456, (1991) [5] Chang E, Han S. Using passphrase to construct key agreement. CBS-IS-2006. Technical Report, Curtin University of Technology. [6] Celka, P., Synchronization of chaotic systems through parameter adaptation, Proc int symp circuits syst, 1, 692-695, (1995) [7] Diffie, W.; Hellman, M.E., New directions in cryptography, IEEE trans inform theor, 22, 644-654, (1976) · Zbl 0435.94018 [8] Han, S., Security of a key agreement protocol based on chaotic maps, Chaos, solitons & fractals, 38, 764-768, (2008) · Zbl 1146.94304 [9] Kelber K, Falk T, Götz M, Schwarz W, Kilias T. Discrete-time chaotic coders for information encryption-Part 2: Continuous- and discrete-value realization. In: Proceedings of workshop nonlinear dynamics of electronics systems; 1996. p. 27-32. [10] Kocarev, L.; Tasev, Z., Public-key encryption based on chevyshev maps, Proc IEEE symp circuits syst (ISCAS’03), 3, 28-31, (2003) [11] Rivlin, T.J., Chebysheve polynomials, (1990), John Wiley and Sons, Inc. New York [12] Wong, K., A fast chaotic cryptographic scheme with dynamic look-up table, Phys lett A, 298, 238-242, (2002) · Zbl 0995.94029 [13] Xiao, D.; Liao, X.; Deng, S., A novel key agreement protocol based on chaotic maps, Inform sci, (2006) [14] Solak, E., Partial identification of Lorenz system and its application to key space reduction of chaotic cryptosystems, IEEE trans circuits syst II, 51, 10, 557-560, (2004) [15] Zhang, B.; Chen, M.; Zhou, D., Chaotic secure communication based on particle filtering, Chaos, solitons & fractals, 30, 5, 1273-1280, (2006) [16] Menezes, A.; van Oorschot, P.; Vanstone, S., Handbook of applied cryptography, (1997), CRC Press Boca Raton · Zbl 0868.94001 This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.