Skip to main content

Table 1 Implementation complexity

From: Binary phase hopping based spreading code authentication technique

Method number Code sequence generator Percentage increased (%) Correlator Percentage increased (%)
Non-authentication Authentication Non-authentication Authentication
1 1 2 100 6 7 16.7
2 1 2 100 6 7 16.7
3 2 3 50 12 14 16.7