Fig. 9From: RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environmentRuntime required for encryption with different algorithms. a The runtime required for encryption of 128-bit security level data using different algorithms. b The runtime required for encryption of 256bit security level data using different algorithmsBack to article page