Fig. 10From: RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environmentRunning time required for decryption of different algorithms. a The runtime required for decrypting 128-bit security level data using different algorithms. b The runtime required for decrypting 256-bit security level data using different algorithmsBack to article page