Computer Science ›› 2019, Vol. 46 ›› Issue (1): 175-181.doi: 10.11896/j.issn.1002-137X.2019.01.027
• Information Security • Previous Articles Next Articles
WANG Song-wei, CHEN Jian-hua
CLC Number:
[1]LIAO X,SHU C.Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pi-xels[J].Journal of Visual Communication & Image Representation,2015,28:21-27.<br /> [2]LAMPORT L.Password authentication with insecure communication[J].Communications of the Acm,1981,24(24):770-772.<br /> [3]CHANG C C,WU T C.Remote password authentication with smart cards[J].IEE Proceedings E-Computers and Digital Techniques,1993,138(3):165-168.<br /> [4]KOCAREV L.Chaos-based cryptography:a brief overview[J].Circuits & Systems Magazine IEEE,2001,1(3):6-21.<br /> [5]DACHSELT F,SCHWARZ W.Chaos and cryptography[J].IEEE Transactions on Circuits & Systems I Fundamental Theory & Applications,2002,48(12):1498-1509.<br /> [6]KOCAREV L,TASEV Z.Public-key encryption based on Chebyshev maps[C]//International Symposium on Circuits and Systems.IEEE,2003:28-31.<br /> [7]XIAO D,LIAO X,WONG K W.An efficient entire chaos-based scheme for deniable authentication[J].Chaos Solitons & Fractals,2005,23(4):1327-1331.<br /> [8]BERGAMO P,D'ARCO P,SANTIS A D,et al.Security of public-key cryptosystems based on Chebyshev polynomials[J].IEEE Transactions on Circuits & Systems I Regular Papers,2005,52(7):1382-1393.<br /> [9]XIAO D,LIAO X,DENG S.A novel key agreement protocol based on chaotic maps[J].Information Sciences,2007,177(4):1136-1142.<br /> [10]GUO X,ZHANG J.Secure group key agreement protocol based on chaotic Hash[J].Information Sciences,2010,180(20):4069-4074.<br /> [11]XUE K,HONG P.Security improvement on an anonymous key agreement protocol based on chaotic maps[J].Communications in Nonlinear Science & Numerical Simulation,2012,17(7):2969-2977.<br /> [12]TAN Z.A chaotic maps-based authenticated key agreement protocol with strong anonymity[J].Nonlinear Dynamics,2013,72(1-2):311-320.<br /> [13]LEE C C,CHEN C L,WU C Y,et al.An extended chaotic maps-based key agreement protocol with user anonymity[J].Nonlinear Dynamics,2012,69(1-2):79-87.<br /> [14]HE D,CHEN Y,CHEN J.Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol[J].Nonlinear Dynamics,2012,69(3):1149-1157.<br /> [15]SHU J.Authentication Key Agreement Protocol Based on Extended Chaos Mapping[J].Acta Physical Sinica,2014,63(5):88-92.(in Chinese)<br /> 舒剑.基于扩展混沌映射的认证密钥协商协议[J].物理学报,2014,63(5):88-92.<br /> [16]LIN H Y.Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme[J].Wireless Personal Communications,2014,78(2):1487-1494.<br /> [17]ZHU H.Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme[M].New Jersey:John Wiley & Sons,Inc.,2015:2981-2991.<br /> [18]TONG T,CHEN J H.Improved Chaotic Maps Based Mobile Authenticated scheme[J].Application Research of Computers,2017,34(8):2443-2447.(in Chinese)<br /> 童彤,陈建华.一个改进的基于混沌映射的移动端认证协议[J].计算机应用研究,2017,34(8):2443-2447.<br /> [19]DOLEV D,YAO A.On the Security of Public Key Protocols [J].IEEE Transactions on Information Theory,1983,29(2):198-208.<br /> [20]KOCHER P C,JAFFE J,JUN B.Differential Power Analysis[C]//Proceedings of the 19th Annual International Cryptology Conferece on Advances in Crytology.1999:388-397.<br /> [21]MESSERGES T S,DABBISH E A,SLOAN R H.Examining Smart-Card Security under the Threat of Power Analysis Attacks[J].IEEE Transactions on Computers,2002,51(5):541-552.<br /> [22]BRIER E,CLAVIER C,OLIVIER F.Correlation Power Analysis with a Leakage Model[J].Ches,2004,37(22):16-29.<br /> [23]ABRAMOWITZ M.Handbook of Mathematical Functions with Formulas,Graphs,and Mathematical Tables[M].New York:Dover Publications,1974.<br /> [24]JIANG J C,PENG Y H.Chaos of the tchebycheff polynomials[J].Natural Science Journal of Xiangtan University,1996(3):37-39.(in Chinese)<br /> 蒋建初,彭跃辉.切比雪夫多项式的混沌性[J].湘潭大学自科学报,1996(3):37-39.<br /> [25]ZHANG L.Cryptanalysis of the public key encryption based on multiple chaotic systems[J].Chaos Solitons & Fractals,2008,37(3):669-674.<br /> [26]LIU J F,ZHOU M T.Research and taxonnmy of Replay At-tacks on Security Protocol [J].Application Research of Compu-ters,2007,24(3):135-139.(in Chinese)<br /> 刘家芬,周明天.对安全协议重放攻击的分类研究[J].计算机应用研究,2007,24(3):135-139.<br /> [27]WANG Z C,YANG S P.Research on Principles and Methods of Designing Authentication Protocols against replay Attack [J].Computer Engineering and Design,2008,29(20):5163-5165.(in chinese)<br /> 王正才,杨世平.抗重放攻击认证协议的设计原则和方法研究[J].计算机工程与设计,2008,29(20):5163-5165.<br /> [28]LI M G,SONG H N.Research on Computer Clock Synchronization Technology [J].Journal of System Simulation,2002,14(4):477-480.(in Chinese)<br /> 李明国,宋海娜.计算机时钟同步技术研究[J].系统仿真学报,2002,14(4):477-480.<br /> [29]SUN N,XIONG W,DING Y Z.Study and Application of Clock Synchronization[J].Computer Engineering and Applications,2003,39(27):177-179.(in chinese)<br /> 孙娜,熊伟,丁宇征.时钟同步的研究与应用[J].计算机工程与应用,2003,39(27):177-179.<br /> [30]WANG D.Research on Password-Based Remote User Authentication scheme using Smart-Cards[D].Harbin:Harbin Enginee-ring University,2013.(in Chinese)<br /> 汪定.基于智能卡的远程用户口令认证协议研究[D].哈尔滨:哈尔滨工程大学,2013.<br /> [31]WANG S B.An Improved Remote User Authentication Scheme[J].Computer Engineering & Science,2011,33(1):51-55. |
[1] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[2] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
[3] | LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362. |
[4] | GAO Jie, LIU Sha, HUANG Ze-qiang, ZHENG Tian-yu, LIU Xin, QI Feng-bin. Deep Neural Network Operator Acceleration Library Optimization Based on Domestic Many-core Processor [J]. Computer Science, 2022, 49(5): 355-362. |
[5] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[6] | ZHAO Luo-cheng, QU Zhi-hao, XIE Zai-peng. Study on Communication Optimization of Federated Learning in Multi-layer Wireless Edge Environment [J]. Computer Science, 2022, 49(3): 39-45. |
[7] | WANG Xiang-yu, YANG Ting. Routing Directory Server Defined by Smart Contract [J]. Computer Science, 2021, 48(6A): 504-508. |
[8] | LIU Qi, CHEN Hong-mei, LUO Chuan. Method for Prediction of Red Blood Cells Supply Based on Improved Grasshopper Optimization Algorithm [J]. Computer Science, 2021, 48(2): 224-230. |
[9] | CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190. |
[10] | LIAN Wen-juan, ZHAO Duo-duo, FAN Xiu-bin, GENG Yu-nian, FAN Xin-tong. CFL_BLP_BC Model Based on Authentication and Blockchain [J]. Computer Science, 2021, 48(11): 36-45. |
[11] | NI Liang, WANG Nian-ping, GU Wei-li, ZHANG Qian, LIU Ji-zhao, SHAN Fang-fang. Research on Lattice-based Quantum-resistant Authenticated Key Agreement Protocols:A Survey [J]. Computer Science, 2020, 47(9): 293-303. |
[12] | WU Yu-hong and HU Xiang-dong. Study on Security of Industrial Internet Network Transmission [J]. Computer Science, 2020, 47(6A): 360-363. |
[13] | MO Tian-qing and HE Yong-mei. SIP Authentication Key Agreement of Protocol Based on Certificateless [J]. Computer Science, 2020, 47(6A): 413-419. |
[14] | CHEN Meng-dong, GUO Dong-sheng, XIE Xiang-hui, WU Dong. Design and Implementation of Rule Processor Based on Heterogeneous Computing Platform [J]. Computer Science, 2020, 47(4): 312-317. |
[15] | PAN Ji-fei,HUANG De-cai. Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group [J]. Computer Science, 2020, 47(3): 273-280. |
|