Skip to main content

Advances, Systems and Applications

Table 3 Comparative evaluation of decryption time

From: An enhanced encryption-based security framework in the CPS Cloud

Methods

Decryption time (ms)

RSA [22]

98

Twofish Algorithm [23]

84

ICC [24]

78

FHEA [25]

67

CBM [Proposed]

55