[1] |
KATZ J , OSTROVSKY R , YUNG M . Efficient pass-word-authenticated key exchange using human-memorable pass-words[J]. Lecture Notes in Computer Science, 2001(4):475-494.
|
[2] |
RAIMONDO M D , GENNARO R . Provably secure threshold password-authenticated key exchange[J]. Journal of Computer and System Sciences, 2006,72 (9):507-523.
|
[3] |
GUO C , CHANG C C . Chaotic maps-based password-authenticated key agreement using smart cards[J]. Communications in Nonlinear Science and Numerical Simulation, 2013,18 (6):1433-1440.
|
[4] |
LEE C C , CHEN C L , WU C Y , et al. An extended chaotic maps-based key agreement protocol with user anonymity[J]. Nonlinear Dynamics, 2012,69 (1/2):79-87.
|
[5] |
LI C T , LEE C C , WENG C Y . An extended chaotic maps based user authentication and privacy preserving scheme against DoS at-tacks in pervasive and ubiquitous computing environments[J]. Nonlinear Dynamics, 2013,74 (4):1133-1143.
|
[6] |
LI X , ZHANG Y . A simple and robust anonymous two-factor au-thenticated key exchange protocol[J]. Security and Communication Networks, 2013,6 (6):711-722.
|
[7] |
TAN Z . A chaotic maps-based authenticated key agreement proto-col with strong anonymity[J]. Nonlinear Dynamics, 2013,72 (1/2):311-320.
|
[8] |
WU F , XU L L . Security analysis and improvement of a privacy authentication scheme for telecare medical information systems[J]. Journal of Medical Systems, 2012,37 (4):1-9.
|
[9] |
LAI H , XIAO J , LI L , et al. Applying semigroup property of en-hanced chebyshev polynomials to anonymous authentication protocol[J]. Mathematical Problems in Engineering, 2012(6):589-597.
|
[10] |
LEE C C , LI C T , HSU C W . A three-party password-based authen-ticated key exchange protocol with user anonymity using extended chaotic maps[J]. Nonlinear Dynamics, 2013,73 (1/2):125-132.
|
[11] |
LIN H Y . Chaotic map-based three-party authenticated key agree-ment[J]. Security and Communication Networks, 2014,7 (12):2469-2474.
|
[12] |
LV C , MA M , LI H , et al. An novel three-party authenticated key exchange protocol using one-time key[J]. Journal of Network and Computer Applications, 2013,36 (1):498-503.
|
[13] |
TSAI H C , CHANG C C . Provably secure three party encrypted key exchange scheme with explicit authentication[J]. Information Sciences, 2013,238 (7):242-249.
|
[14] |
WANG X , ZHAO J . An improved key agreement protocol based on chaos[J]. Communications in Nonlinear Science and Numerical Simulation, 2010,15 (12):4052-4057.
|
[15] |
WU S , CHEN K , PU Q , et al. Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme[J]. In-ternational Journal of Communication Systems, 2013,26 (5):674-686.
|
[16] |
XIE Q , ZHAO J , YU X . Chaotic maps-based three-party pass-word-authenticated key agreement scheme[J]. Nonlinear Dynamics, 2013,74 (4):1021-1027.
|
[17] |
YANG J H , CAO T J . Provably secure three-party password au-thenticated key exchange protocol in the standard model[J]. Journal of Systems and Software, 2012,85 (2):340-350.
|
[18] |
YOON E J , JEON I S . An efficient and secure diffie-hellman key agreement protocol based on chebyshev chaotic map[J]. Commu-nications in Nonlinear Science and Numerical Simulation, 2011,16 (6):2383-2389.
|
[19] |
ZHAO F , GONG P , LI S , et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced chebyshev polynomials[J]. Nonlinear Dynamics, 2013,74 (1/2):419-427.
|
[20] |
ZHAO J J , GU D W . Provably secure three-party password based authenticated key exchange protocol[J]. Information Sciences, 2012,184 (1):310-323.
|
[21] |
ZHANG L . Cryptanalysis of the public key encryption based on multiple chaotic systems[J]. Chaos Solitons & Fractals, 2008,37 (3):669-674.
|
[22] |
MANGARD S , OSWALD E , STANDAERT F X . One for all-all for one:unifying standard differential power analysis attacks[J]. IET Information Security, 2011,5 (2):100-110.
|
[23] |
MESSERGES T S , DABBISH E A , SLOAN RH . Examining smart-card security under the threat of power analysis attacks[J]. IEEE Transactions on Computers, 2002,51 (5):541-552.
|
[24] |
KUMARI S , KHAN M K . Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme'[J]. International Journal of Communication Systems, 2014,27 (12):3939-3955.
|
[25] |
WANG D , MA C G , WANG P , et al. Robust smart card based password authentication scheme against smart card security breach[R]. Cryptology ePrint Archive, 2012.
|
[26] |
KOCAREV L , LIAN S G . Chaos-based cryptography:theory,algorithms and applications[M]. Berlin: Springer, 2011.
|