I want to know why is it that XOR is ignored in the computation cost of a security protocol? And is there any reference there which can prove that it is insignificant so can be ignored?

Like in a certain research paper it is stated that "In the proposed scheme, we take the

cost of concatenation (||) operations and XOR (⊕) evaluated as insignificant." why is this?

More Zeeshan Ali's questions See All
Similar questions and discussions