-
1
Integrating RC6 Stream Cipher to a Chaotic Synchronization System
Published 2024-01-01“…RC6 can be parameterized to support longer key lengths and encryption rounds, and RC6 has excellent computing speed and security. …”
Get full text
Article -
2
Multiparty Quantum Cryptography with Block Cipher RC6 (B- MQKD)
Published 2019-09-01Subjects: Get full text
Article -
3
Derivation of the human embryonic stem cell line RCe010-A (RC-6)
Published 2016-03-01“…The human embryonic stem cell line RCe010-A (RC-6) was derived from a frozen and thawed blastocyst voluntarily donated as unsuitable and surplus to fertility requirements following ethics committee approved informed consent under licence from the UK Human Fertilisation and Embryology Authority. …”
Get full text
Article -
4
Security and data encryption effect of high ciphertext based on improved RC6 algorithm for WSN
Published 2023-10-01Subjects: Get full text
Article -
5
Measurement of Encryption Quality of Bitmap Images with RC6, and two modified version Block Cipher
Published 2010-08-01“…Due to the increasinguse of images in industrial process, it is essential to protect the confidential imagedata from unauthorized access. In this paper, RC6 with two modified version 512bit RC6 and 640 bit RC6-Cascade encryption algorithms will be analyzed toinvestigate the encryption efficiency for them to digital images and providing anew mathematical measure for encryption efficiency. …”
Get full text
Article -
6
Implementasi Aplikasi Kriptografi Pada Layanan Pesan Singkat (SMS) Menggunakan Algoritma RC6 Berbasis Android
Published 2016-08-01Subjects: Get full text
Article -
7
Modeling of GaN HEMTs With Open Source Qucs-S Circuit Simulation and Compact Device Modeling Technology
Published 2016“…Qucs-0.0.19-S-RC6 Simulation and Compact Device Modelling Tools Introduction to the Qucs GPL Verilog-A Module Synthesizer Qucs modelling of the ”Efficient Power Corporation (EPC)” GaN EPC2001 Power Transistor Qucs Verilog-A Modeling of the ”MIT Virtual Source GaN-RF HEMT Compact Device Model 1.0.0”: Problems Simulating with ADMS; Workarounds and Typical Simulation Data Qucs-0.0.19-S-RC6 XSPICE Code Modeling package Qucs-0.0.19-S-RC6/Ngspice/Xyce Circuit Analysis and Compact Device Parameter Extraction from Manufacturers Data or Measurements Controlled by Octave Script Files Summary…”
Get full text
Conference or Workshop Item -
8
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
Get full text
Thesis -
9
VHDL Implementation of Hybrid Block Cipher Method (SRC)
Published 2010-02-01“…This paper discusses the hardware design of the hybrid block cipher methodthat combines the RC6 cipher and the Serpent cipher.The block size is 128 bits, and the key can be any length up to 256 bytes. …”
Get full text
Article -
10
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA)
Published 2011-03-01“…The modified algorithm MTEA is a new secret-key block cipher of 64 bit that uses good features of Tiny Encryption Algorithm (TEA) and RC6 algorithms. The proposal algorithm uses the RC6 encryption algorithm as key scheduling to generate subkey. …”
Get full text
Article -
11
A biomimetic approach to the manzamine alkaloids
Published 1997“…Their molecular complexity, exemplified by Manzamine A (1) and biological activities make them challenging targets for total synthesis -4v-4XJ <q-4j rc6c="">Y v-xi-4y W k> O -4 Maivamine A (1) Keramaphadin B (2) Recently we have proposed a biogenetic theory to these compounds. …”
Journal article -
12
Diffusion analysis of EFN-MDS structure
Published 2006“…This structure is employed in several ciphers that were developed for Advanced Encryption Standard such as CAST-256, MARS and RC6. The problem with EFN is that it requires many rounds when the number of sub-blocks used in EFN is large. …”
Get full text
Conference or Workshop Item -
13
Diffusion analysis of EFN-MDS structure
Published 2006“…This structure is employed in several ciphers that were developed for Advanced Encryption Standard such as CAST-256, MARS and RC6. The problem with EFN is that it requires many rounds when the number of sub-blocks used in EFN is large. …”
Get full text
Conference or Workshop Item -
14
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…Other storage encryption algorithms, i.e. XTS-Twofish and XTS-RC6, have also been implemented in both serial and parallel designs and then evaluated. …”
Get full text
Thesis -
15
Adaptabilidade e estabilidade de genótipos de soja avaliados para resistência ao oídio Adaptability and stability of soybean genotypes evaluated for resistance to powdery mildew
Published 2008-10-01“…The results allowed to get to the following conclusions: the genotypes that showed the highest resistance levels, were, in general, also the ones of higher adaptability and stability, both for NIAFI and NIFI, standing out UFV 89-361826 T2, UFV 94-334268, UFV-16 and UFV-19, FT-10 RC5 (F3), FT-Abyara RC6 (F2), Doko RC, FT-Abyara RC5 (F4), whereas the most susceptible genotypes were the ones of worse predictability, standing out UFV 94-5126, FT-104, UFV 94-3500, FT-Cristalina, FT-Estrela and BR-16.…”
Get full text
Article -
16
СТІЙКА ФУНКЦІЯ ШИФРУВАННЯ УДОСКОНАЛЕНОГО МОДУЛЯ КРИПТОГРАФІЧНОГО ЗАХИСТУ ІНФОРМАЦІЇ В ІНФОРМАЦІЙНОКОМУНІКАЦІЙНИХ СИСТЕМАХ...
Published 2021-09-01“…Розроблено метод генерації криптографічних ключів, щоб покращити швидкість генерації ключів, з його використанням удосконалено функцію шифрування (для забезпечення удосконаленого модуля) на основі відомого і ефективного алгоритму RC6, що дозволило підвищити швидкість криптографічної обробки даних та перевірити криптостійкість алгоритму проти спеціалізованих атак лінійного та диференціального криптоаналізу…”
Get full text
Article -
17
PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices
Published 2019-10-01“…In this work, we present the performance of the AES (Advanced Encryption Standard), RC6 (Rivest Cipher 6), Twofish, SPECK128, LEA, and ChaCha20-Poly1305 algorithms in Internet of Things (IoT) devices, measuring their execution times, throughput, and power consumption, with the main goal of determining which symmetric key ciphers are best to be applied in PRISEC. …”
Get full text
Article -
18
Prevalence and risk factors of cysticercosis in cattle tracking
Published 2022-08-01“…The risk factors identified were cattle origin (RC = 4.9), grazing (RC = 6.4) and sewage destination on the property (RC = 3.6). …”
Get full text
Article -
19
A Description of MMPI-2-RF Profile of Eleven Boko Haram Terrorists
Published 2023-10-01“…More of these terrorists endorsed significant scores or symptoms of emotional/internalizing dysfunction (EID), somatic complaints (RC1), antisocial behavior (RC4), ideas of persecution (RC6), gastrointestinal complaints (GIC), neurological complaints (NUC), suicidal/death ideation (SUI), anxiety (AXY), shyness (SHY), and disaffiliativeness (DSF), while elevated scores or severe symptoms were reported on stress/worry (STW) and psychoticism (PSYC-r). …”
Get full text
Article -
20
Environmental Sustainable Cement Mortars Based on Polyethylene Terephthalate from Recycling Operations
Published 2023-03-01“…Moreover, PET mortars showed a high tensile strength and energy absorption capacity (with Rf = 1.9 ÷ 3.3 MPa, Rc = 6 ÷ 13 MPa); instead, sand samples were characterized by a brittle rupture. …”
Get full text
Article