Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2017
/
Article
/
Tab 18
/
Research Article
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems
Table 18
Time of
final
operation for each hash algorithm expressed in
μ
s.
is the data size in bytes.
Blake2
Keccak
128
24.09 ± 0.01
2.13 ± 0.01