Skip to main content
. Author manuscript; available in PMC: 2023 Feb 4.
Published in final edited form as: Cell Syst. 2021 Aug 30;12(11):1108–1120.e4. doi: 10.1016/j.cels.2021.07.010

Figure 4.

Figure 4.

Memory and time requirements of the secure methods. Each method is divided into 4 steps, (1) key generation, (2) Encryption, (3) Evaluation, (4) Decryption. The bar plots show the time requirements (a) using 20K, 40K, and 80K target variant sets. The aggregated time (b) and the maximum memory usage of the methods are also shown (c).