Common use of Table 6 Clause in Contracts

Table 6. Security and performance features using m = 16. Sk is the pairwise key size, traitor node capture size nc, number of possible master key solutions Φ. ∗Computation times are for the MICAz ▇▇▇▇ with an eight-bit CPU at 8 MHz with 4 KB ROM 4 KB RAM 128 KB flash. η N p = 13 p = 17 p = 31 Qo (bytes) Tc∗omp (ms) Sk “ 64 bits Sk “ 80 bits Sk “ 128 bits log(nc) log(Φ) log(nc) log(Φ) log(nc) log(Φ) 6 6 7.36 9.01 10.67 23.40 24.50 25.46 6.76 8.40 10.05 23.16 24.30 25.46 5.00 22.64 576 175 7 6.52 8.09 23.86 24.90 672 200 8 768 225 7 6 9.11 11.08 13.04 24.30 25.46 26.60 8.50 10.46 12.41 24.30 25.46 26.45 6.61 8.47 10.37 23.63 24.90 25.97 672 229 8 896 296 8 6 10.88 13.14 15.41 25.28 26.45 27.46 10.26 25.09 8.28 10.47 12.69 24.71 25.97 27.04 768 292 7 12.52 14.78 26.30 27.32 896 335 Legend: Key sizes 64 bits, 80 bits, 96 bits, 128 bits 7. Discussions‌

Appears in 1 contract

Sources: Authenticated Key Agreement Scheme

Table 6. Security and performance features using m = 16. Sk is the pairwise key size, traitor node capture size nc, number of possible master key solutions Φ. ∗Computation times are for the MICAz ▇▇▇▇ with an eight-bit CPU at 8 MHz with 4 KB ROM 4 KB RAM 128 KB flash. η N p = 13 p = 17 p = 31 Qo (bytes) Tc∗omp (ms) Sk 64 bits Sk 80 bits Sk 128 bits log(nc) log(Φ) log(nc) log(Φ) log(nc) log(Φ) 6 6 7.36 9.01 10.67 23.40 24.50 25.46 6.76 8.40 10.05 23.16 24.30 25.46 5.00 22.64 576 175 7 6.52 8.09 23.86 24.90 672 200 8 768 225 7 6 9.11 11.08 13.04 24.30 25.46 26.60 8.50 10.46 12.41 24.30 25.46 26.45 6.61 8.47 10.37 23.63 24.90 25.97 672 229 8 896 296 8 6 10.88 13.14 15.41 25.28 26.45 27.46 10.26 25.09 8.28 10.47 12.69 24.71 25.97 27.04 768 292 7 12.52 14.78 26.30 27.32 896 335 Legend: Key sizes 64 bits, 80 bits, 96 bits, 128 bits 7. Discussions‌

Appears in 1 contract

Sources: Authenticated Key Agreement Scheme