Research Article

Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

Table 2

Operations of interest for each primitive.

Symmetric ciphers HashMACAEADs

InitInitInitInit
EncryptionUpdateUpdateEncryption
DecryptionFinalFinalDecryption