Skip to main content

Advances, Systems and Applications

Table 2 The execution time of the required cryptographic operations

From: AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments

Notation

Description

Execution time (ms)

\({T}_{h}\)

Time of one-way hash function.

0.0023

\({T}_{m}\)

Time of point addition.

0.0288

\({T}_{P}\)

Time of ECC Scalar multiplication.

2.226

\({T}_{inv}\)

Time of multiplicative inverse over ECC.

190.189E + 06

\({T}_{SED}\)

Time of symmetric key encryption/decryption.

0.0046

\({T}_{AED}\)

Time of ECC encryption/decryption.

3.85

\({T}_{F}\)

Time for fuzzy extraction

2.226