Research Article
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems
Table 2
Operations of interest for each primitive.
| Symmetric ciphers | Hash | MAC | AEADs |
| Init | Init | Init | Init | Encryption | Update | Update | Encryption | Decryption | Final | Final | Decryption |
|
|