Fig. 9

Comparison of the suggested HPE-based security model over other classical frameworks in terms of “(a) Decryption time, (b) Encryption time, (c) Key sensitivity, (d) Memory size, and (e) Total computational time”.

Comparison of the suggested HPE-based security model over other classical frameworks in terms of “(a) Decryption time, (b) Encryption time, (c) Key sensitivity, (d) Memory size, and (e) Total computational time”.