Research Article

A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

Table 5

Comparison of computational overhead between our scheme and other schemes during all phases.

Phase [13][14][3] [15] Ours

Registration
Login + authentication
Password change

Total

Note: : the time to compute a one-way hash function; : the time to compute a modular exponentiation; : the time to compute a point multiplication on the elliptic curve group; : the time to compute a point addition on the elliptic curve group.