Skip to main content
. 2019 Mar 9;21(3):268. doi: 10.3390/e21030268

Figure 14.

Figure 14

Performance graph of the proposed cryptographic method with parallel processing implemented in a Personal Computer Dual-core CPU 2.7 GHz.