{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T15:45:44Z","timestamp":1743781544760},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s10586-023-04232-2","type":"journal-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T18:02:35Z","timestamp":1704736955000},"page":"4867-4881","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication"],"prefix":"10.1007","volume":"27","author":[{"given":"Uddeshaya","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Manish","family":"Garg","sequence":"additional","affiliation":[]},{"given":"Gautam","family":"Kaushik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,8]]},"reference":[{"key":"4232_CR1","volume":"63","author":"SH Islam","year":"2021","unstructured":"Islam, S.H., Basu, S.: PB-3PAKA: password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments. J. Inf. Secur. Appl. 63, 103026 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"5","key":"4232_CR2","first-page":"123","volume":"1","author":"HR Biswas","year":"2018","unstructured":"Biswas, H.R., Hasan, M.M., Bala, S.K.: Chaos theory and its applications in our real life. Barishal Univ. J. 1(5), 123\u2013140 (2018)","journal-title":"Barishal Univ. J."},{"issue":"12","key":"4232_CR3","doi-asserted-by":"publisher","first-page":"4052","DOI":"10.1016\/j.cnsns.2010.02.014","volume":"15","author":"X Wang","year":"2010","unstructured":"Wang, X., Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 4052\u20134057 (2010)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"7","key":"4232_CR4","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo, P., D\u2019Arco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on chebyshev polynomials. IEEE Trans. Circuits Syst. I Regul. Pap. 52(7), 1382\u20131393 (2005)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"issue":"6","key":"4232_CR5","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1016\/j.cnsns.2010.09.021","volume":"16","author":"EJ Yoon","year":"2011","unstructured":"Yoon, E.J., Jeon, I.S.: An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 2383\u20132389 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"4232_CR6","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11071-013-0772-4","volume":"73","author":"CC Lee","year":"2013","unstructured":"Lee, C.C., Li, C.T., Hsu, C.W.: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73, 125\u2013132 (2013)","journal-title":"Nonlinear Dyn."},{"key":"4232_CR7","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1007\/s11071-014-1515-x","volume":"78","author":"X Hu","year":"2014","unstructured":"Hu, X., Zhang, Z.: Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol. Nonlinear Dyn. 78, 1293\u20131300 (2014)","journal-title":"Nonlinear Dyn."},{"key":"4232_CR8","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1007\/s11071-013-1020-7","volume":"74","author":"Q Xie","year":"2013","unstructured":"Xie, Q., Zhao, J., Yu, X.: Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dyn. 74, 1021\u20131027 (2013)","journal-title":"Nonlinear Dyn."},{"key":"4232_CR9","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1007\/s11071-014-1827-x","volume":"79","author":"CC Lee","year":"2015","unstructured":"Lee, C.C., Li, C.T., Chiu, S.T., Lai, Y.M.: A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn. 79, 2485\u20132495 (2015)","journal-title":"Nonlinear Dyn."},{"key":"4232_CR10","first-page":"1","volume":"17","author":"CC Lee","year":"2015","unstructured":"Lee, C.C., Chiu, S.T., Li, C.T.: Improving security of a communication-efficient three-party password authentication key exchange protocol. Int. J. Netw. Secur. 17, 1\u20136 (2015)","journal-title":"Int. J. Netw. Secur."},{"key":"4232_CR11","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.ins.2012.06.005","volume":"215","author":"S Wu","year":"2012","unstructured":"Wu, S., Pu, Q., Wang, S., He, D.: Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol. Inf. Sci. 215, 83\u201396 (2012)","journal-title":"Inf. Sci."},{"key":"4232_CR12","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1007\/s11071-014-1584-x","volume":"78","author":"SH Islam","year":"2014","unstructured":"Islam, S.H.: Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn. 78, 2261\u20132276 (2014)","journal-title":"Nonlinear Dyn."},{"key":"4232_CR13","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1007\/s11071-015-2467-5","volume":"83","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A.: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83, 2085\u20132101 (2016)","journal-title":"Nonlinear Dyn."},{"key":"4232_CR14","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s11071-014-1304-6","volume":"77","author":"MS Farash","year":"2014","unstructured":"Farash, M.S., Attari, M.A.: An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps. Nonlinear Dyn. 77, 399\u2013411 (2014)","journal-title":"Nonlinear Dyn."},{"issue":"6","key":"4232_CR15","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/24\/6\/060509","volume":"24","author":"J Shu","year":"2015","unstructured":"Shu, J.: An efficient three-party password-based key agreement protocol using extended chaotic maps. Chin. Phys. B 24(6), 060509 (2015)","journal-title":"Chin. Phys. B"},{"key":"4232_CR16","doi-asserted-by":"publisher","first-page":"2345","DOI":"10.1007\/s11071-014-1816-0","volume":"79","author":"Q Xie","year":"2015","unstructured":"Xie, Q., Hu, B., Wu, T.: Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server\u2019s public key and smart card. Nonlinear Dyn. 79, 2345\u20132358 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"4232_CR17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0153870","volume":"11","author":"Y Lu","year":"2016","unstructured":"Lu, Y., Li, L., Zhang, H., Yang, Y.: An extended chaotic maps-based three-party password-authenticated key agreement with user anonymity. PLoS ONE 11(4), e0153870 (2016)","journal-title":"PLoS ONE"},{"issue":"10","key":"4232_CR18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0203984","volume":"13","author":"Q Xie","year":"2018","unstructured":"Xie, Q., Lu, Y., Tan, X., Tang, Z., Hu, B.: Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps. PLoS ONE 13(10), e0203984 (2018)","journal-title":"PLoS ONE"},{"key":"4232_CR19","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1007\/s11071-014-1388-z","volume":"77","author":"H Lai","year":"2014","unstructured":"Lai, H., Orgun, M.A., Xiao, J., Pieprzyk, J., Xue, L., Yang, Y.: Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Nonlinear Dyn. 77, 1427\u20131439 (2014)","journal-title":"Nonlinear Dyn."},{"key":"4232_CR20","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1007\/s11071-015-1937-0","volume":"80","author":"X Li","year":"2015","unstructured":"Li, X., Niu, J., Kumari, S., Khan, M.K., Liao, J., Liang, W.: Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol. Nonlinear Dyn. 80, 1209\u20131220 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"4232_CR21","first-page":"61","volume":"1","author":"CM Chen","year":"2016","unstructured":"Chen, C.M., Xu, L., Wu, T.Y., Li, C.R.: On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 1(2), 61\u201366 (2016)","journal-title":"J. Netw. Intell."},{"key":"4232_CR22","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ins.2015.03.050","volume":"312","author":"SH Islam","year":"2015","unstructured":"Islam, S.H.: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf. Sci. 312, 104\u2013130 (2015)","journal-title":"Inf. Sci."},{"key":"4232_CR23","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1007\/s00500-017-2504-z","volume":"22","author":"CT Li","year":"2018","unstructured":"Li, C.T., Chen, C.L., Lee, C.C., Weng, C.Y., Chen, C.M.: A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft. Comput. 22, 2495\u20132506 (2018)","journal-title":"Soft. Comput."},{"issue":"9","key":"4232_CR24","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0273664","volume":"17","author":"KS Pak","year":"2022","unstructured":"Pak, K.S., Kim, M.H., Pak, S.H., Ho, C.M.: Improved anonymity preserving three-party mutual authentication key exchange protocol based on chaotic maps. PLoS ONE 17(9), e0273664 (2022)","journal-title":"PLoS ONE"},{"issue":"4","key":"4232_CR25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0232277","volume":"15","author":"CC Tung","year":"2020","unstructured":"Tung, C.C., Chi, L.C., Chang, L.I.: Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments. PLoS ONE 15(4), e0232277 (2020)","journal-title":"PLoS ONE"},{"key":"4232_CR26","doi-asserted-by":"publisher","first-page":"66150","DOI":"10.1109\/ACCESS.2020.2979251","volume":"8","author":"Y Zheng","year":"2020","unstructured":"Zheng, Y., Hu, S., Wei, L., Chen, Y., Wang, H., Yang, Y., Li, Y., Xu, B., Huang, W., Chen, L.: Design and analysis of a security-enhanced three-party authenticated key agreement protocol based on chaotic maps. IEEE Access. 8, 66150\u201366162 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2979251","journal-title":"IEEE Access."},{"issue":"3","key":"4232_CR27","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit. Fractals 37(3), 669\u2013674 (2008)","journal-title":"Chaos Solit. Fractals"},{"key":"4232_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s41635-017-0025-y","volume":"2","author":"Y Lyu","year":"2018","unstructured":"Lyu, Y., Mishra, P.: A survey of side-channel attacks on caches and countermeasures. J. Hardw. Syst. Secur. 2, 33\u201350 (2018)","journal-title":"J. Hardw. Syst. Secur."},{"key":"4232_CR29","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology (CRYPTO 99): 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15\u201319, pp. 388\u2013397. 1999 Proceedings Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"4232_CR30","unstructured":"Tarnovsky, C., Nohl, K.: Reviving smart card analysis. Chaos Communication Camp. (2011)"},{"issue":"2","key":"4232_CR31","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W Diffie","year":"1992","unstructured":"Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Des. Codes Cryptogr. 2(2), 107\u2013125 (1992)","journal-title":"Des. Codes Cryptogr."},{"key":"4232_CR32","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2013.08.020","volume":"58","author":"H Yang","year":"2014","unstructured":"Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., Vasilakos, A.V.: Provably secure three-party authenticated key agreement protocol using smart cards. Comput. Netw. 58, 29\u201338 (2014)","journal-title":"Comput. Netw."},{"issue":"2","key":"4232_CR33","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00196790","volume":"3","author":"K Gaarder","year":"1991","unstructured":"Gaarder, K., Snekkenes, E.: Applying a formal analysis technique to the ccitt x. 509 strong two-way authentication protocol. J. Cryptol. 3(2), 81\u201398 (1991)","journal-title":"J. Cryptol."},{"key":"4232_CR34","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. cryptology eprint archive. (2004)"},{"key":"4232_CR35","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.future.2017.08.029","volume":"84","author":"X Li","year":"2018","unstructured":"Li, X., Wu, F., Khan, M.K., Xu, L., Shen, J., Jo, M.: A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Futur. Gener. Comput. Syst. 84, 149\u2013159 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4232_CR36","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1007\/s11042-017-4390-x","volume":"77","author":"S Kumari","year":"2018","unstructured":"Kumari, S., Das, A.K., Li, X., Wu, F., Khan, M.K., Jiang, Q., Islam, S.H.: A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multimedia Tools Appl. 77, 2359\u20132389 (2018)","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"4232_CR37","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0213976","volume":"14","author":"K Pak","year":"2019","unstructured":"Pak, K., Pak, S., Ho, C., Pak, M., Hwang, C.: Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps. PLoS ONE 14(3), e0213976 (2019)","journal-title":"PLoS ONE"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04232-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04232-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04232-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T14:37:54Z","timestamp":1722609474000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04232-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["4232"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04232-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2024,1,8]]},"assertion":[{"value":"19 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they do not have any potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}