Comparing Cryptographic Key Sizes II