Security and Communication Networks / 2020 / Article / Tab 2

Research Article

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains

Table 2

The variable symbols and the corresponding variable names.

SymbolsDescription

The output length of hash function
The length of a hash chain
The length of Mignotte’s sequence
The computational overhead of a hash function
The computational overhead of generating a random number
The computational overhead of mapping a random number to one single bit using Hard Core Predicate
The computational overhead of generating a secret shadow in SRHC-TD
The computational overhead of computing in SRHC-TD
The computational overhead of a left shift operation
The computational overhead of an XOR operation
The computational overhead of computing solutions to equations

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.