-
1
-
2
Cost-Effective Architectures for RC5 Brute Force Cracking
Published 2005-01-01Subjects: “…RC5 cipher…”
Get full text
Article -
3
Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network
Published 2010-06-01“…Proposed 256 bits RC5 is an improvement to RC5, designed to meetthe requirements of increased security and better performance. …”
Get full text
Article -
4
دراسة أثر تغيير التقنيات الأمنية المستخدمة في البروتوكول MS-LEACH على الطاقة المستهلكة في شبكات WSN
Published 2020-07-01Subjects: “…الأمن, شبكات الحساسات اللاسلكية, بروتوكولات التوجيه الهرمي, التشفير المتناظر, كلفة الطاقة, التوجيه الآمن, Block Cipher, LEACH, SecLEACH, MS-LEACH, AES, RC5, Skipjack, رمز مصادقة الرسالة, , CBC-MAC HMAC ماتلاب.…”
Get full text
Article -
5
Adaptabilidade e estabilidade de genótipos de soja avaliados para resistência ao oídio Adaptability and stability of soybean genotypes evaluated for resistance to powdery mildew
Published 2008-10-01“…Os resultados permitiram tirar as seguintes conclusões: os genótipos que apresentaram os melhores níveis de resistência, em geral, também foram os de melhor adaptabilidade e estabilidade, tanto para NIAFI quanto para NIFI, com destaque para: UFV 89-361826 T2, UFV 94-334268, UFV-16 e UFV-19, FT-10 RC5 (F3), FT-Abyara RC6 (F2), Doko RC, FT-Abyara RC5 (F4), enquanto que os mais suscetíveis foram os de pior previsibilidade (estabilidade) de comportamento, com destaque para UFV 94-5126, FT-104, UFV 94-3500, FT-Cristalina, FT-Estrela e BR-16.…”
Get full text
Article -
6
The Predictive Role of NLR and PLR in Outcome and Patency of Lower Limb Revascularization in Patients with Femoropopliteal Disease
Published 2022-05-01“…Furthermore, for all hospitalized patients, RC 5 was an independent predictor of poor prognosis. …”
Get full text
Article -
7
-
8
Agricultural IoT Data Storage Optimization and Information Security Method Based on Blockchain
Published 2023-01-01“…Given the issues of low efficiency of agricultural Internet of Things (IoT) data collection and data storage security, this study proposes a fast and reliable storage method for IoT data based on blockchain. Firstly, it performs RC5 encryption for data in the IoT sensor module. …”
Get full text
Article -
9
Parity Check Based Fault Detection against Timing Fault Injection Attacks
Published 2022-12-01“…The efficiency of the proposed approaches is verified on RC5, AES, and DES encryption implementations by clock glitch attack. …”
Get full text
Article -
10
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
Published 2023-03-01“…Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity. …”
Get full text
Article -
11
Líneas tropicales de maíz (Zea mays L.) convertidas al carácter de calidad de proteína
Published 2014-07-01“…Las líneas sobresalientes fueron FAMV537C-2-1-1, FAMV537C-1-1-1, (D-539XCML144)F2XD539RC₂-1-1, (LT155XCML144)LT155RC₂-2-1-1 y (LT154XCML144) LT154RC₂-5-1-1, (CABGXCML144)CABG RC₂-1-1-1, con rendimientos de 7.32, 6.61, 6.39, 5.92, 5.48, 5.04 t ha-1 respectivamente. …”
Get full text
Article -
12
Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario
Published 2023-01-01“…The experimental results presented are based on the use of the encryption algorithms AES, RC5, and RSA, and our proposed model extends the advances of CC and IoT-based BD, offering a highly novel and scalable service platform to achieve better privacy and security services.…”
Get full text
Article -
13
Fault-based analysis of flexible ciphers
Published 2002-07-01“…We also give an outline of ciphers RC5 and GOST showing that they are also insecure against DFA-based attack. …”
Get full text
Article -
14
Trimodal therapy versus radical cystectomy for cT2N0M0 urothelial muscle-invasive bladder cancer: Single-center experience
Published 2023-01-01“…The TMT group had a higher percentage of local recurrence (40% vs. RC 5.2%, P = 0.018) but no significant difference in metastasis (0% vs. 10%, P = 0.420). …”
Get full text
Article -
15
Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (<b>2<sup>32</sup></b>)) a...
Published 2023-11-01“…The most commonly used cryptographic algorithms on the IoT are Advanced Encryption Standard (AES), BLOWFISH, CAMELLIA, CAST, CLEFIA, Data Encryption Standard (DES), Modular Multiplication-based Block (MMB), RC5, SERPENT, and SKIPJACK. We assume that the reader of this paper has basic knowledge of the above algorithms.…”
Get full text
Article -
16
TLQP-21 is a low potency partial C3aR activator on human primary macrophages
Published 2023-01-01Get full text
Article -
17
Εffect of cleansers on the composition and mechanical properties of orthodontic aligners in vitro
Published 2022-12-01“…The aligners were immersed in the cleaner solutions as instructed every day (15 min for RB, RC; 5 min for ST) for a two-week period. The acidity of the solutions was tested with a pH meter. …”
Get full text
Article -
18
A Perfect Security Key Management Method for Hierarchical Wireless Sensor Networks in Medical Environments
Published 2023-02-01“…In addition, using cipher block chaining-Rivest cipher 5 (CBC-RC5) in this method achieved cryptography goals such as confidentiality. …”
Get full text
Article -
19
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Published 2018-12-01“…The cryptographic modules contain algorithms based on machine learning and modern cryptographic algorithms: AES (Advanced Encryption System), SHA-256, RC4, RC5, RC6, MARS, BLOWFISH, TWOFISH, THREEFISH, RSA (Rivest-Shamir-Adleman), Elliptic Curve, and Diffie Hellman. …”
Get full text
Article -
20
Techno-Economic Analysis of a Wind-Energy-Based Charging Station for Electric Vehicles in High-Rise Buildings in Malaysia
Published 2022-07-01“…Using data from Malacca, Malaysia, and HOMER software, the project will build and optimise a standalone wind-powered charging station. An RC-5K-A wind turbine coupled to a battery and converter is the appropriate choice for the system. …”
Get full text
Article