Research Article

Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

Figure 11

Average time and energy to execute update operation for each hash algorithm.