An efficient three-party password-based key agreement protocol using extended chaotic maps*
Shu Jiana),b)†
       
Authentication phase of Farash et al .’s protocol.