Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2017
/
Article
/
Tab 4
/
Research Article
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems
Table 4
Time to execute one
init
operation for each hash algorithm. Time is in ms.
Blake2s
Keccak
0,96
0,00
6,96
0,02