-
1
-
2
-
3
Cost-Effective Architectures for RC5 Brute Force Cracking
Published 2005-01-01Subjects: “…RC5 cipher…”
Get full text
Article -
4
Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network
Published 2010-06-01“…Proposed 256 bits RC5 is an improvement to RC5, designed to meetthe requirements of increased security and better performance. …”
Get full text
Article -
5
دراسة أثر تغيير التقنيات الأمنية المستخدمة في البروتوكول MS-LEACH على الطاقة المستهلكة في شبكات WSN
Published 2020-07-01Subjects: “…الأمن, شبكات الحساسات اللاسلكية, بروتوكولات التوجيه الهرمي, التشفير المتناظر, كلفة الطاقة, التوجيه الآمن, Block Cipher, LEACH, SecLEACH, MS-LEACH, AES, RC5, Skipjack, رمز مصادقة الرسالة, , CBC-MAC HMAC ماتلاب.…”
Get full text
Article -
6
Adaptabilidade e estabilidade de genótipos de soja avaliados para resistência ao oídio Adaptability and stability of soybean genotypes evaluated for resistance to powdery mildew
Published 2008-10-01“…Os resultados permitiram tirar as seguintes conclusões: os genótipos que apresentaram os melhores níveis de resistência, em geral, também foram os de melhor adaptabilidade e estabilidade, tanto para NIAFI quanto para NIFI, com destaque para: UFV 89-361826 T2, UFV 94-334268, UFV-16 e UFV-19, FT-10 RC5 (F3), FT-Abyara RC6 (F2), Doko RC, FT-Abyara RC5 (F4), enquanto que os mais suscetíveis foram os de pior previsibilidade (estabilidade) de comportamento, com destaque para UFV 94-5126, FT-104, UFV 94-3500, FT-Cristalina, FT-Estrela e BR-16.…”
Get full text
Article -
7
-
8
-
9
-
10
The Predictive Role of NLR and PLR in Outcome and Patency of Lower Limb Revascularization in Patients with Femoropopliteal Disease
Published 2022-05-01“…Furthermore, for all hospitalized patients, RC 5 was an independent predictor of poor prognosis. …”
Get full text
Article -
11
-
12
Agricultural IoT Data Storage Optimization and Information Security Method Based on Blockchain
Published 2023-01-01“…Given the issues of low efficiency of agricultural Internet of Things (IoT) data collection and data storage security, this study proposes a fast and reliable storage method for IoT data based on blockchain. Firstly, it performs RC5 encryption for data in the IoT sensor module. …”
Get full text
Article -
13
Parity Check Based Fault Detection against Timing Fault Injection Attacks
Published 2022-12-01“…The efficiency of the proposed approaches is verified on RC5, AES, and DES encryption implementations by clock glitch attack. …”
Get full text
Article -
14
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
Published 2023-03-01“…Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity. …”
Get full text
Article -
15
Líneas tropicales de maíz (Zea mays L.) convertidas al carácter de calidad de proteína
Published 2014-07-01“…Las líneas sobresalientes fueron FAMV537C-2-1-1, FAMV537C-1-1-1, (D-539XCML144)F2XD539RC₂-1-1, (LT155XCML144)LT155RC₂-2-1-1 y (LT154XCML144) LT154RC₂-5-1-1, (CABGXCML144)CABG RC₂-1-1-1, con rendimientos de 7.32, 6.61, 6.39, 5.92, 5.48, 5.04 t ha-1 respectivamente. …”
Get full text
Article -
16
Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario
Published 2023-01-01“…The experimental results presented are based on the use of the encryption algorithms AES, RC5, and RSA, and our proposed model extends the advances of CC and IoT-based BD, offering a highly novel and scalable service platform to achieve better privacy and security services.…”
Get full text
Article -
17
Fault-based analysis of flexible ciphers
Published 2002-07-01“…We also give an outline of ciphers RC5 and GOST showing that they are also insecure against DFA-based attack. …”
Get full text
Article -
18
Trimodal therapy versus radical cystectomy for cT2N0M0 urothelial muscle-invasive bladder cancer: Single-center experience
Published 2023-01-01“…The TMT group had a higher percentage of local recurrence (40% vs. RC 5.2%, P = 0.018) but no significant difference in metastasis (0% vs. 10%, P = 0.420). …”
Get full text
Article -
19
Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (<b>2<sup>32</sup></b>)) a...
Published 2023-11-01“…The most commonly used cryptographic algorithms on the IoT are Advanced Encryption Standard (AES), BLOWFISH, CAMELLIA, CAST, CLEFIA, Data Encryption Standard (DES), Modular Multiplication-based Block (MMB), RC5, SERPENT, and SKIPJACK. We assume that the reader of this paper has basic knowledge of the above algorithms.…”
Get full text
Article -
20
Performance evaluation of 14nm FinFET-based 6T SRAM cell functionality for DC and transient circuit analysis
Published 2014“…Ideal square wave and square wave with 100 RC, 5 RC, 1 RC, and 0.5 RC are asserted to the WL and the bit lines (BL&BLB) of SRAM. …”
Get full text
Article