Research Article

Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

Table 17

Energy consumption to execute init operations for each hash algorithm. The consumption is expressed in J.

Blake2 Keccak

ā€‰