Showing 1 - 20 results of 37 for search '"RC6"', query time: 0.10s Refine Results
  1. 1

    Integrating RC6 Stream Cipher to a Chaotic Synchronization System by Feng-Hsiag Hsiao, Shou-Wen Chang

    Published 2024-01-01
    “…RC6 can be parameterized to support longer key lengths and encryption rounds, and RC6 has excellent computing speed and security. …”
    Get full text
    Article
  2. 2
  3. 3

    Derivation of the human embryonic stem cell line RCe010-A (RC-6) by P.A. De Sousa, B.J. Tye, K. Bruce, P. Dand, G. Russell, D.M. Collins, H. Bradburn, J. Gardner, J.M. Downie, M. Bateman, A. Courtney

    Published 2016-03-01
    “…The human embryonic stem cell line RCe010-A (RC-6) was derived from a frozen and thawed blastocyst voluntarily donated as unsuitable and surplus to fertility requirements following ethics committee approved informed consent under licence from the UK Human Fertilisation and Embryology Authority. …”
    Get full text
    Article
  4. 4
  5. 5

    Measurement of Encryption Quality of Bitmap Images with RC6, and two modified version Block Cipher by Baedaa H. Helal, Ashwaq T. Hashim

    Published 2010-08-01
    “…Due to the increasinguse of images in industrial process, it is essential to protect the confidential imagedata from unauthorized access. In this paper, RC6 with two modified version 512bit RC6 and 640 bit RC6-Cascade encryption algorithms will be analyzed toinvestigate the encryption efficiency for them to digital images and providing anew mathematical measure for encryption efficiency. …”
    Get full text
    Article
  6. 6
  7. 7

    Modeling of GaN HEMTs With Open Source Qucs-S Circuit Simulation and Compact Device Modeling Technology by Brinson, Mike, Kuznetsov, Vadim

    Published 2016
    “…Qucs-0.0.19-S-RC6 Simulation and Compact Device Modelling Tools Introduction to the Qucs GPL Verilog-A Module Synthesizer Qucs modelling of the ”Efficient Power Corporation (EPC)” GaN EPC2001 Power Transistor Qucs Verilog-A Modeling of the ”MIT Virtual Source GaN-RF HEMT Compact Device Model 1.0.0”: Problems Simulating with ADMS; Workarounds and Typical Simulation Data Qucs-0.0.19-S-RC6 XSPICE Code Modeling package Qucs-0.0.19-S-RC6/Ngspice/Xyce Circuit Analysis and Compact Device Parameter Extraction from Manufacturers Data or Measurements Controlled by Octave Script Files Summary…”
    Get full text
    Conference or Workshop Item
  8. 8

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
    Get full text
    Thesis
  9. 9

    VHDL Implementation of Hybrid Block Cipher Method (SRC) by Ashwaq T. Hishem, Najwa M. Hassen, Ekhlas M. Farhan

    Published 2010-02-01
    “…This paper discusses the hardware design of the hybrid block cipher methodthat combines the RC6 cipher and the Serpent cipher.The block size is 128 bits, and the key can be any length up to 256 bytes. …”
    Get full text
    Article
  10. 10

    A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) by Gaidaa Saeed Mahdi

    Published 2011-03-01
    “…The modified algorithm MTEA is a new secret-key block cipher of 64 bit that uses good features of Tiny Encryption Algorithm (TEA) and RC6 algorithms. The proposal algorithm uses the RC6 encryption algorithm as key scheduling to generate subkey. …”
    Get full text
    Article
  11. 11

    A biomimetic approach to the manzamine alkaloids by Spring, DR, Baldwin, J, Whitehead, R, Bischoff, L, Claridge, T

    Published 1997
    “…Their molecular complexity, exemplified by Manzamine A (1) and biological activities make them challenging targets for total synthesis -4v-4XJ <q-4j rc6c="">Y v-xi-4y W k&gt; O -4 Maivamine A (1) Keramaphadin B (2) Recently we have proposed a biogenetic theory to these compounds. …”
    Journal article
  12. 12

    Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah

    Published 2006
    “…This structure is employed in several ciphers that were developed for Advanced Encryption Standard such as CAST-256, MARS and RC6. The problem with EFN is that it requires many rounds when the number of sub-blocks used in EFN is large. …”
    Get full text
    Conference or Workshop Item
  13. 13

    Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…This structure is employed in several ciphers that were developed for Advanced Encryption Standard such as CAST-256, MARS and RC6. The problem with EFN is that it requires many rounds when the number of sub-blocks used in EFN is large. …”
    Get full text
    Conference or Workshop Item
  14. 14

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…Other storage encryption algorithms, i.e. XTS-Twofish and XTS-RC6, have also been implemented in both serial and parallel designs and then evaluated. …”
    Get full text
    Thesis
  15. 15

    Adaptabilidade e estabilidade de genótipos de soja avaliados para resistência ao oídio Adaptability and stability of soybean genotypes evaluated for resistance to powdery mildew by Derval Gomes Pereira, Tuneo Sediyama, Cosme Damião Cruz, Múcio Silva Reis, José Luiz Lopes Gomes, Rita de Cássia Teixeira, Ana Paula Oliveira Nogueira

    Published 2008-10-01
    “…The results allowed to get to the following conclusions: the genotypes that showed the highest resistance levels, were, in general, also the ones of higher adaptability and stability, both for NIAFI and NIFI, standing out UFV 89-361826 T2, UFV 94-334268, UFV-16 and UFV-19, FT-10 RC5 (F3), FT-Abyara RC6 (F2), Doko RC, FT-Abyara RC5 (F4), whereas the most susceptible genotypes were the ones of worse predictability, standing out UFV 94-5126, FT-104, UFV 94-3500, FT-Cristalina, FT-Estrela and BR-16.…”
    Get full text
    Article
  16. 16

    СТІЙКА ФУНКЦІЯ ШИФРУВАННЯ УДОСКОНАЛЕНОГО МОДУЛЯ КРИПТОГРАФІЧНОГО ЗАХИСТУ ІНФОРМАЦІЇ В ІНФОРМАЦІЙНОКОМУНІКАЦІЙНИХ СИСТЕМАХ... by Tetiana Smirnova, Yuliia Burmak, Oleksandr Ulichev, Pavlo Usik, Oleksandr Dorenskyi

    Published 2021-09-01
    “…Розроблено метод генерації криптографічних ключів, щоб покращити швидкість генерації ключів, з його використанням удосконалено функцію шифрування (для забезпечення удосконаленого модуля) на основі відомого і ефективного алгоритму RC6, що дозволило підвищити швидкість криптографічної обробки даних та перевірити криптостійкість алгоритму проти спеціалізованих атак лінійного та диференціального криптоаналізу…”
    Get full text
    Article
  17. 17

    PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices by Daniel A. F. Saraiva, Valderi Reis Quietinho Leithardt, Diandre de Paula, André Sales Mendes, Gabriel Villarrubia González, Paul Crocker

    Published 2019-10-01
    “…In this work, we present the performance of the AES (Advanced Encryption Standard), RC6 (Rivest Cipher 6), Twofish, SPECK128, LEA, and ChaCha20-Poly1305 algorithms in Internet of Things (IoT) devices, measuring their execution times, throughput, and power consumption, with the main goal of determining which symmetric key ciphers are best to be applied in PRISEC. …”
    Get full text
    Article
  18. 18

    Prevalence and risk factors of cysticercosis in cattle tracking by C.T.D. Duarte, P.S.A. Pinto, L.F. Silva, E. Acevedo Nieto, J.A.N. Vitorino, T.O. Santos

    Published 2022-08-01
    “…The risk factors identified were cattle origin (RC = 4.9), grazing (RC = 6.4) and sewage destination on the property (RC = 3.6). …”
    Get full text
    Article
  19. 19

    A Description of MMPI-2-RF Profile of Eleven Boko Haram Terrorists by Temitope Folashade Aroyewun, Helen Osinowo, Asma Perveen, Khadijah Aroyewun-Adekomaiya

    Published 2023-10-01
    “…More of these terrorists endorsed significant scores or symptoms of emotional/internalizing dysfunction (EID), somatic complaints (RC1), antisocial behavior (RC4), ideas of persecution (RC6), gastrointestinal complaints (GIC), neurological complaints (NUC), suicidal/death ideation (SUI), anxiety (AXY), shyness (SHY), and disaffiliativeness (DSF), while elevated scores or severe symptoms were reported on stress/worry (STW) and psychoticism (PSYC-r). …”
    Get full text
    Article
  20. 20

    Environmental Sustainable Cement Mortars Based on Polyethylene Terephthalate from Recycling Operations by Francesco Todaro, Andrea Petrella, Giusy Santomasi, Sabino De Gisi, Michele Notarnicola

    Published 2023-03-01
    “…Moreover, PET mortars showed a high tensile strength and energy absorption capacity (with Rf = 1.9 ÷ 3.3 MPa, Rc = 6 ÷ 13 MPa); instead, sand samples were characterized by a brittle rupture. …”
    Get full text
    Article