-
1
Integrating RC6 Stream Cipher to a Chaotic Synchronization System
Published 2024-01-01“…RC6 can be parameterized to support longer key lengths and encryption rounds, and RC6 has excellent computing speed and security. …”
Get full text
Article -
2
Multiparty Quantum Cryptography with Block Cipher RC6 (B- MQKD)
Published 2019-09-01Subjects: Get full text
Article -
3
Derivation of the human embryonic stem cell line RCe010-A (RC-6)
Published 2016-03-01“…The human embryonic stem cell line RCe010-A (RC-6) was derived from a frozen and thawed blastocyst voluntarily donated as unsuitable and surplus to fertility requirements following ethics committee approved informed consent under licence from the UK Human Fertilisation and Embryology Authority. …”
Get full text
Article -
4
Security and data encryption effect of high ciphertext based on improved RC6 algorithm for WSN
Published 2023-10-01Subjects: Get full text
Article -
5
Measurement of Encryption Quality of Bitmap Images with RC6, and two modified version Block Cipher
Published 2010-08-01“…Due to the increasinguse of images in industrial process, it is essential to protect the confidential imagedata from unauthorized access. In this paper, RC6 with two modified version 512bit RC6 and 640 bit RC6-Cascade encryption algorithms will be analyzed toinvestigate the encryption efficiency for them to digital images and providing anew mathematical measure for encryption efficiency. …”
Get full text
Article -
6
Implementasi Aplikasi Kriptografi Pada Layanan Pesan Singkat (SMS) Menggunakan Algoritma RC6 Berbasis Android
Published 2016-08-01Subjects: Get full text
Article -
7
تحسين كفاءة وإنتاجية أنظمة أمن البريد الإلكتروني الهجينة باستخدام خوارزميات التشفير RC6 – Elgamal – MD5
Published 2020-10-01“…إن هذه الأهمية للبريد الإلكتروني دعت إلى إتخاذ إجراءات ضرورية تهدف إلى تأمين المعلومات المنقولة عبر الرسائل الإلكترونية, والتي قد تكون على درجة عالية من الأهمية, ومن هذه الإجراءات استخدام التشفير.Encryption قُمنا في هذا البحث بإجراء دراسة مقارنة تحليلية لتقييم أداء وفعالية خوارزميات التشفير المُستخدمة في تصميم المُخطط الأمني العام لأنظمة التشفير الهجينة التي تقوم بتأمين رسائل البريد الإلكتروني المُتبادلة عبر شبكة الإنترنت, حيث أظهرت الدراسة أن الخوارزميات : RC6 - Elgamal - MD5 , تتميز بأداء جيد وفعالية عالية تُسهم في تحسين كفاءة وإنتاجية هذه الأنظمة. …”
Get full text
Article -
8
VHDL Implementation of Hybrid Block Cipher Method (SRC)
Published 2010-02-01“…This paper discusses the hardware design of the hybrid block cipher methodthat combines the RC6 cipher and the Serpent cipher.The block size is 128 bits, and the key can be any length up to 256 bytes. …”
Get full text
Article -
9
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA)
Published 2011-03-01“…The modified algorithm MTEA is a new secret-key block cipher of 64 bit that uses good features of Tiny Encryption Algorithm (TEA) and RC6 algorithms. The proposal algorithm uses the RC6 encryption algorithm as key scheduling to generate subkey. …”
Get full text
Article -
10
Adaptabilidade e estabilidade de genótipos de soja avaliados para resistência ao oídio Adaptability and stability of soybean genotypes evaluated for resistance to powdery mildew
Published 2008-10-01“…The results allowed to get to the following conclusions: the genotypes that showed the highest resistance levels, were, in general, also the ones of higher adaptability and stability, both for NIAFI and NIFI, standing out UFV 89-361826 T2, UFV 94-334268, UFV-16 and UFV-19, FT-10 RC5 (F3), FT-Abyara RC6 (F2), Doko RC, FT-Abyara RC5 (F4), whereas the most susceptible genotypes were the ones of worse predictability, standing out UFV 94-5126, FT-104, UFV 94-3500, FT-Cristalina, FT-Estrela and BR-16.…”
Get full text
Article -
11
СТІЙКА ФУНКЦІЯ ШИФРУВАННЯ УДОСКОНАЛЕНОГО МОДУЛЯ КРИПТОГРАФІЧНОГО ЗАХИСТУ ІНФОРМАЦІЇ В ІНФОРМАЦІЙНОКОМУНІКАЦІЙНИХ СИСТЕМАХ...
Published 2021-09-01“…Розроблено метод генерації криптографічних ключів, щоб покращити швидкість генерації ключів, з його використанням удосконалено функцію шифрування (для забезпечення удосконаленого модуля) на основі відомого і ефективного алгоритму RC6, що дозволило підвищити швидкість криптографічної обробки даних та перевірити криптостійкість алгоритму проти спеціалізованих атак лінійного та диференціального криптоаналізу…”
Get full text
Article -
12
PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices
Published 2019-10-01“…In this work, we present the performance of the AES (Advanced Encryption Standard), RC6 (Rivest Cipher 6), Twofish, SPECK128, LEA, and ChaCha20-Poly1305 algorithms in Internet of Things (IoT) devices, measuring their execution times, throughput, and power consumption, with the main goal of determining which symmetric key ciphers are best to be applied in PRISEC. …”
Get full text
Article -
13
Prevalence and risk factors of cysticercosis in cattle tracking
Published 2022-08-01“…The risk factors identified were cattle origin (RC = 4.9), grazing (RC = 6.4) and sewage destination on the property (RC = 3.6). …”
Get full text
Article -
14
A Description of MMPI-2-RF Profile of Eleven Boko Haram Terrorists
Published 2023-10-01“…More of these terrorists endorsed significant scores or symptoms of emotional/internalizing dysfunction (EID), somatic complaints (RC1), antisocial behavior (RC4), ideas of persecution (RC6), gastrointestinal complaints (GIC), neurological complaints (NUC), suicidal/death ideation (SUI), anxiety (AXY), shyness (SHY), and disaffiliativeness (DSF), while elevated scores or severe symptoms were reported on stress/worry (STW) and psychoticism (PSYC-r). …”
Get full text
Article -
15
Environmental Sustainable Cement Mortars Based on Polyethylene Terephthalate from Recycling Operations
Published 2023-03-01“…Moreover, PET mortars showed a high tensile strength and energy absorption capacity (with Rf = 1.9 ÷ 3.3 MPa, Rc = 6 ÷ 13 MPa); instead, sand samples were characterized by a brittle rupture. …”
Get full text
Article -
16
Gift-Giving Philosophy as Part of a Typological Model of Festivities
Published 2023-09-01Get full text
Article -
17
Culturable bacteria diversity in stem liquid and resina from Populus euphratica and screening of plant growth-promoting bacteria
Published 2022-12-01“…The germination rate, plant height, and dry weight of the maize seedlings treated with strains BB33-1, TC10 and RC6 are significantly higher than those of the control group. …”
Get full text
Article -
18
-
19
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Published 2018-12-01“…The cryptographic modules contain algorithms based on machine learning and modern cryptographic algorithms: AES (Advanced Encryption System), SHA-256, RC4, RC5, RC6, MARS, BLOWFISH, TWOFISH, THREEFISH, RSA (Rivest-Shamir-Adleman), Elliptic Curve, and Diffie Hellman. …”
Get full text
Article -
20
Effect of Different Cooling Methods on the Quality of Low-temperature Cooked Pork
Published 2023-01-01“…The highest and the lowest mass loss were observed in RC (6.67%) and FC (4.47%) (P<0.05) separately. VRC had minimum L*, a* and maximum b* (P<0.05). …”
Get full text
Article