Return to Article Details Comparing the speed of the selected hash and encryption algorithms Download Download PDF