2020
DOI: 10.31272/jeasd.conf.1.34
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Public Key Cryptosystem Based on Chebyshev Chaotic Map Over Finite Field

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The Chebyshev map used specifically in order to generate secret shared keys between Alice and Bob, where the generation of the secret shared keys depends on the modified algorithm introduced by [25] in order to solve the multi-keys problem.…”
Section: Secret Shared Keys Generated By Using Chebyshev Mapmentioning
confidence: 99%
See 2 more Smart Citations
“…The Chebyshev map used specifically in order to generate secret shared keys between Alice and Bob, where the generation of the secret shared keys depends on the modified algorithm introduced by [25] in order to solve the multi-keys problem.…”
Section: Secret Shared Keys Generated By Using Chebyshev Mapmentioning
confidence: 99%
“…The very important issue in both proposed algorithms is that the key space for both algorithms depends on the parameter n (number of keys) that makes the two algorithms have very large key space. This makes the attack on the two systems is very complicated because the third party must not find only one correct key to break the system as in the single map cryptosystem [25] but he must find ( ) correct keys. The key space of the two proposed systems was described according to the method of attack by the third party, either attacks the system by finding the secret keys or attacks the system by finding the shared secret keys directly.…”
Section: Key Space and Sensitivity Analysismentioning
confidence: 99%
See 1 more Smart Citation