Showing 1 - 20 results of 33 for search '"RC5"', query time: 0.27s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network by Yossra H. Ali

    Published 2010-06-01
    “…Proposed 256 bits RC5 is an improvement to RC5, designed to meetthe requirements of increased security and better performance. …”
    Get full text
    Article
  5. 5

    دراسة أثر تغيير التقنيات الأمنية المستخدمة في البروتوكول MS-LEACH على الطاقة المستهلكة في شبكات WSN by Inas Laila, Hla Alkhatib

    Published 2020-07-01
    Subjects: “…الأمن, شبكات الحساسات اللاسلكية, بروتوكولات التوجيه الهرمي, التشفير المتناظر, كلفة الطاقة, التوجيه الآمن, Block Cipher, LEACH, SecLEACH, MS-LEACH, AES, RC5, Skipjack, رمز مصادقة الرسالة, , CBC-MAC HMAC ماتلاب.…”
    Get full text
    Article
  6. 6

    Adaptabilidade e estabilidade de genótipos de soja avaliados para resistência ao oídio Adaptability and stability of soybean genotypes evaluated for resistance to powdery mildew by Derval Gomes Pereira, Tuneo Sediyama, Cosme Damião Cruz, Múcio Silva Reis, José Luiz Lopes Gomes, Rita de Cássia Teixeira, Ana Paula Oliveira Nogueira

    Published 2008-10-01
    “…Os resultados permitiram tirar as seguintes conclusões: os genótipos que apresentaram os melhores níveis de resistência, em geral, também foram os de melhor adaptabilidade e estabilidade, tanto para NIAFI quanto para NIFI, com destaque para: UFV 89-361826 T2, UFV 94-334268, UFV-16 e UFV-19, FT-10 RC5 (F3), FT-Abyara RC6 (F2), Doko RC, FT-Abyara RC5 (F4), enquanto que os mais suscetíveis foram os de pior previsibilidade (estabilidade) de comportamento, com destaque para UFV 94-5126, FT-104, UFV 94-3500, FT-Cristalina, FT-Estrela e BR-16.…”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Agricultural IoT Data Storage Optimization and Information Security Method Based on Blockchain by Yingding Zhao, Qiude Li, Wenlong Yi, Huanliang Xiong

    Published 2023-01-01
    “…Given the issues of low efficiency of agricultural Internet of Things (IoT) data collection and data storage security, this study proposes a fast and reliable storage method for IoT data based on blockchain. Firstly, it performs RC5 encryption for data in the IoT sensor module. …”
    Get full text
    Article
  13. 13

    Parity Check Based Fault Detection against Timing Fault Injection Attacks by Maoshen Zhang, He Li , Peijing Wang, Qiang Liu

    Published 2022-12-01
    “…The efficiency of the proposed approaches is verified on RC5, AES, and DES encryption implementations by clock glitch attack. …”
    Get full text
    Article
  14. 14

    Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey by mohammed abd, Huda majeed, sif Ebis

    Published 2023-03-01
    “…Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity. …”
    Get full text
    Article
  15. 15

    Líneas tropicales de maíz (Zea mays L.) convertidas al carácter de calidad de proteína by Mauro Sierra Macías, Pablo Andrés Meza, Flavio Rodríguez Montalvo, Artemio Palafox Caballero, Noel Gómez Montiel

    Published 2014-07-01
    “…Las líneas sobresalientes fueron FAMV537C-2-1-1, FAMV537C-1-1-1, (D-539XCML144)F2XD539RC₂-1-1, (LT155XCML144)LT155RC₂-2-1-1 y (LT154XCML144) LT154RC₂-5-1-1, (CABGXCML144)CABG RC₂-1-1-1, con rendimientos de 7.32, 6.61, 6.39, 5.92, 5.48, 5.04 t ha-1 respectivamente. …”
    Get full text
    Article
  16. 16

    Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario by Christos L. Stergiou, Elisavet Bompoli, Konstantinos E. Psannis

    Published 2023-01-01
    “…The experimental results presented are based on the use of the encryption algorithms AES, RC5, and RSA, and our proposed model extends the advances of CC and IoT-based BD, offering a highly novel and scalable service platform to achieve better privacy and security services.…”
    Get full text
    Article
  17. 17

    Fault-based analysis of flexible ciphers by V.I.Korjik, A.Mukherjii, M.A.Eremeev, N.A.Moldovyan

    Published 2002-07-01
    “…We also give an outline of ciphers RC5 and GOST showing that they are also insecure against DFA-based attack. …”
    Get full text
    Article
  18. 18

    Trimodal therapy versus radical cystectomy for cT2N0M0 urothelial muscle-invasive bladder cancer: Single-center experience by Moayid Fallatah, Ali S Alkahtani, Majed Alrumayyan, Mohammed F Alotaibi, Sultan Alkhateeb, Alaa Ahmed Mokhtar, Waleed Altaweel

    Published 2023-01-01
    “…The TMT group had a higher percentage of local recurrence (40% vs. RC 5.2%, P = 0.018) but no significant difference in metastasis (0% vs. 10%, P = 0.420). …”
    Get full text
    Article
  19. 19

    Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (<b>2<sup>32</sup></b>)) a... by Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe

    Published 2023-11-01
    “…The most commonly used cryptographic algorithms on the IoT are Advanced Encryption Standard (AES), BLOWFISH, CAMELLIA, CAST, CLEFIA, Data Encryption Standard (DES), Modular Multiplication-based Block (MMB), RC5, SERPENT, and SKIPJACK. We assume that the reader of this paper has basic knowledge of the above algorithms.…”
    Get full text
    Article
  20. 20

    Performance evaluation of 14nm FinFET-based 6T SRAM cell functionality for DC and transient circuit analysis by Lim, Wei, Chin, Huei Chaeng, Lim, Cheng Siong, Tan, Michael Loong Peng

    Published 2014
    “…Ideal square wave and square wave with 100 RC, 5 RC, 1 RC, and 0.5 RC are asserted to the WL and the bit lines (BL&BLB) of SRAM. …”
    Get full text
    Article