Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2017
/
Article
/
Tab 5
/
Research Article
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems
Table 5
Time to execute one
update
operation for each hash algorithm. Time is in ms and the data size
is in bytes.
Blake2s
Keccak
3,03
0,01
72,8
0,2
6,00
0,02
149,5
0,4
8,98
0,02
226,1
0,6
11,94
0,04
303,0
1,0