Research Article

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace

Table 7

The time overhead of implementing protocols.

NameIDHIDHSMADHMADHSINSINSLMANSMANSL

Time0.9160.7891.5670.1320.0370.0300.1000.096