From: An efficient and secure anonymous authentication scheme for mobile satellite communication systems
 | Cruickshank | Hwang et al. | Chang et al. | Chen et al. | Proposed |
---|---|---|---|---|---|
Hash operations | - | - | *N-(j-1)+3/3 | 1/3 | 1/4 |
MAC operations | - | - | - | 1/1 | 2/2 |
Symmetric operations | 1/1 | 2/2 | - | 1/1 | - |
Asymmetric operations | 1/1 | - | - | (0/3) | - |
Equation solving operations | - | - | - | k | - |