An efficient three-party password-based key agreement protocol using extended chaotic maps
*
Shu Jian
a),
b)†
Authentication phase of Farash et al .’s protocol.