×

Chaotic map based key agreement with/out clock synchronization. (English) Zbl 1197.94190

Not reviewed.
Editorial remark: There are doubts about a proper peer-reviewing procedure of this journal. The editor-in-chief has retired, but, according to a statement of the publisher, articles accepted under his guidance are published without additional control.

MSC:

94A60 Cryptography
37N99 Applications of dynamical systems
PDF BibTeX XML Cite
Full Text: DOI

References:

[1] Alvarez, G., Security problems with a chaos-based deniable authentication scheme, Chaos, solitons & fractals, 26, 1, 7-11, (2005) · Zbl 1077.94019
[2] Bergamo, P.; D’Arco, P.; Santis, A.; Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials, IEEE trans circuits syst I, 52, 7, 1382-1393, (2005) · Zbl 1374.94775
[3] Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A., A novel algorithm for encryption based on mixture of chaotic maps, Chaos, solitons & fractals, 35, 2, 408-419, (2008) · Zbl 1134.94356
[4] Carroll, T.L.; Pecora, M., Synchronizing chaotic circuits, IEEE trans circuits syst, 38, 453-456, (1991)
[5] Chang E, Han S. Using passphrase to construct key agreement. CBS-IS-2006. Technical Report, Curtin University of Technology.
[6] Celka, P., Synchronization of chaotic systems through parameter adaptation, Proc int symp circuits syst, 1, 692-695, (1995)
[7] Diffie, W.; Hellman, M.E., New directions in cryptography, IEEE trans inform theor, 22, 644-654, (1976) · Zbl 0435.94018
[8] Han, S., Security of a key agreement protocol based on chaotic maps, Chaos, solitons & fractals, 38, 764-768, (2008) · Zbl 1146.94304
[9] Kelber K, Falk T, Götz M, Schwarz W, Kilias T. Discrete-time chaotic coders for information encryption-Part 2: Continuous- and discrete-value realization. In: Proceedings of workshop nonlinear dynamics of electronics systems; 1996. p. 27-32.
[10] Kocarev, L.; Tasev, Z., Public-key encryption based on chevyshev maps, Proc IEEE symp circuits syst (ISCAS’03), 3, 28-31, (2003)
[11] Rivlin, T.J., Chebysheve polynomials, (1990), John Wiley and Sons, Inc. New York
[12] Wong, K., A fast chaotic cryptographic scheme with dynamic look-up table, Phys lett A, 298, 238-242, (2002) · Zbl 0995.94029
[13] Xiao, D.; Liao, X.; Deng, S., A novel key agreement protocol based on chaotic maps, Inform sci, (2006)
[14] Solak, E., Partial identification of Lorenz system and its application to key space reduction of chaotic cryptosystems, IEEE trans circuits syst II, 51, 10, 557-560, (2004)
[15] Zhang, B.; Chen, M.; Zhou, D., Chaotic secure communication based on particle filtering, Chaos, solitons & fractals, 30, 5, 1273-1280, (2006)
[16] Menezes, A.; van Oorschot, P.; Vanstone, S., Handbook of applied cryptography, (1997), CRC Press Boca Raton · Zbl 0868.94001
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.