Research Article
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment
Table 5
Computing time of cryptographic operations.
| Operations | Computing time |
| SHA-256 | 13 μs | SHA-512 | 32 μs | AES-128 Encryption | 64 μs | AES-128 Decryption | 117μs | AES-256 Encryption | 90 μs | AES-256 Decryption | 165 μs | Curve25519 Point Multiplication | 72 ms | P521 Point Multiplication | 1053 ms |
|
|