Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2020
/
Article
/
Tab 5
/
Research Article
Cryptographic Strength Evaluation of Key Schedule Algorithms
Table 5
Execution time for KSAs.
Block cipher
Time (sec)
AES
8
Serpent
80
PRESENT
0.0001
IDEA
0
Twofish
128