2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2014
DOI: 10.1109/iih-msp.2014.30
|View full text |Cite
|
Sign up to set email alerts
|

Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…The researchers in [52] revealed that scheme [51] lacks this important feature of perfect forward secrecy. Again, schemes [53,54] have lower computational cost than our proposed scheme. This is mainly due to the fact that quadratic residues are employed in protecting a user's password in our proposed CBAKE scheme.…”
Section: Performance Analysismentioning
confidence: 84%
See 1 more Smart Citation
“…The researchers in [52] revealed that scheme [51] lacks this important feature of perfect forward secrecy. Again, schemes [53,54] have lower computational cost than our proposed scheme. This is mainly due to the fact that quadratic residues are employed in protecting a user's password in our proposed CBAKE scheme.…”
Section: Performance Analysismentioning
confidence: 84%
“…Hence, it is worth mentioning that the ET's efficiency in CBAKE is unaffected by the modular squaring operation. Additionally, no symmetric encryption/decryption operations are carried out by schemes [40,48,[50][51][52][53][54] and CBAKE so they achieve lower computational costs from a user perspective. Moreover, CBAKE [ has significant security properties than other related schemes.…”
Section: Performance Analysismentioning
confidence: 99%