Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2017
/
Article
/
Tab 7
/
Research Article
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems
Table 7
Time to execute one
final
operation for each hash algorithm. Time is in ms and
is the data size in bytes.
ā
Blake2s
Keccak
128
6,27
0,02
4,1
0,02