Research Article
Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
Table 3
Comparisons of computation cost.
| |||||||||||||||||||||||||||||||||
: point-multiplication operation on elliptic curve. : point-multiplication operation on finite field. : symmetric encryption operation. : symmetric decryption operation. : hash operation. : addition operation on elliptic curve. : bilinear paring operation on elliptic curve. |