Showing 1 - 20 results of 49 for search '"RC6"', query time: 0.15s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Integrating RC6 Stream Cipher to a Chaotic Synchronization System by Feng-Hsiag Hsiao, Shou-Wen Chang

    Published 2024-01-01
    “…RC6 can be parameterized to support longer key lengths and encryption rounds, and RC6 has excellent computing speed and security. …”
    Get full text
    Article
  5. 5
  6. 6

    Derivation of the human embryonic stem cell line RCe010-A (RC-6) by P.A. De Sousa, B.J. Tye, K. Bruce, P. Dand, G. Russell, D.M. Collins, H. Bradburn, J. Gardner, J.M. Downie, M. Bateman, A. Courtney

    Published 2016-03-01
    “…The human embryonic stem cell line RCe010-A (RC-6) was derived from a frozen and thawed blastocyst voluntarily donated as unsuitable and surplus to fertility requirements following ethics committee approved informed consent under licence from the UK Human Fertilisation and Embryology Authority. …”
    Get full text
    Article
  7. 7
  8. 8

    Measurement of Encryption Quality of Bitmap Images with RC6, and two modified version Block Cipher by Baedaa H. Helal, Ashwaq T. Hashim

    Published 2010-08-01
    “…Due to the increasinguse of images in industrial process, it is essential to protect the confidential imagedata from unauthorized access. In this paper, RC6 with two modified version 512bit RC6 and 640 bit RC6-Cascade encryption algorithms will be analyzed toinvestigate the encryption efficiency for them to digital images and providing anew mathematical measure for encryption efficiency. …”
    Get full text
    Article
  9. 9
  10. 10

    تحسين كفاءة وإنتاجية أنظمة أمن البريد الإلكتروني الهجينة باستخدام خوارزميات التشفير RC6 – Elgamal – MD5 by Shadi Alsaghir

    Published 2020-10-01
    “…إن هذه الأهمية للبريد الإلكتروني دعت إلى إتخاذ إجراءات ضرورية تهدف إلى تأمين المعلومات المنقولة عبر الرسائل الإلكترونية, والتي قد تكون على درجة عالية من الأهمية, ومن هذه الإجراءات استخدام التشفير.Encryption         قُمنا في هذا البحث بإجراء دراسة مقارنة تحليلية لتقييم أداء وفعالية خوارزميات التشفير المُستخدمة في تصميم المُخطط الأمني العام لأنظمة التشفير الهجينة التي تقوم بتأمين رسائل البريد الإلكتروني المُتبادلة عبر شبكة الإنترنت, حيث أظهرت الدراسة أن الخوارزميات : RC6 - Elgamal - MD5 , تتميز بأداء جيد وفعالية عالية تُسهم في تحسين كفاءة وإنتاجية هذه الأنظمة. …”
    Get full text
    Article
  11. 11

    Modeling of GaN HEMTs With Open Source Qucs-S Circuit Simulation and Compact Device Modeling Technology by Brinson, Mike, Kuznetsov, Vadim

    Published 2016
    “…Qucs-0.0.19-S-RC6 Simulation and Compact Device Modelling Tools Introduction to the Qucs GPL Verilog-A Module Synthesizer Qucs modelling of the ”Efficient Power Corporation (EPC)” GaN EPC2001 Power Transistor Qucs Verilog-A Modeling of the ”MIT Virtual Source GaN-RF HEMT Compact Device Model 1.0.0”: Problems Simulating with ADMS; Workarounds and Typical Simulation Data Qucs-0.0.19-S-RC6 XSPICE Code Modeling package Qucs-0.0.19-S-RC6/Ngspice/Xyce Circuit Analysis and Compact Device Parameter Extraction from Manufacturers Data or Measurements Controlled by Octave Script Files Summary…”
    Get full text
    Conference or Workshop Item
  12. 12

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
    Get full text
    Thesis
  13. 13

    VHDL Implementation of Hybrid Block Cipher Method (SRC) by Ashwaq T. Hishem, Najwa M. Hassen, Ekhlas M. Farhan

    Published 2010-02-01
    “…This paper discusses the hardware design of the hybrid block cipher methodthat combines the RC6 cipher and the Serpent cipher.The block size is 128 bits, and the key can be any length up to 256 bytes. …”
    Get full text
    Article
  14. 14
  15. 15

    A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) by Gaidaa Saeed Mahdi

    Published 2011-03-01
    “…The modified algorithm MTEA is a new secret-key block cipher of 64 bit that uses good features of Tiny Encryption Algorithm (TEA) and RC6 algorithms. The proposal algorithm uses the RC6 encryption algorithm as key scheduling to generate subkey. …”
    Get full text
    Article
  16. 16

    Synthesis and Reversible Reductive Coupling of Cationic, Dinitrogen-Derived Diazoalkane Complexes by Curley, John J., Murahashi, Tetsuro, Cummins, Christopher C.

    Published 2011
    “…A series of cationic diazoalkane complexes [4-RC6H4C(H)NNMo(N[t-Bu]Ar)3][AlCl4] 4-RC subscript 6 H subscript 4 C(H)NNMo(N[t-Bu]Ar) subscript 3] [AlCl subscript 4]], [1-R][AlCl4] (R = NMe2, Me, H, Br, CN; Ar = 3,5-C6H3Me2) [[1-R][AlCl subscript 4] (R = NMe subscript 2, Me, H, Br, CN; Ar = 3,5-C subscript 6 H subscript 3 Me subscript 2)] has been prepared by treatment of the N2-derived [N subscript 2 derived] diazenido complex Me3SiNNMo(N[t-Bu]Ar)3 [Me subscript 3 SiNNMo(N[t-Bu]Ar) subscript 3] with 4-RC6H4CHO [4-RC subscript 6 H subscript 4 CHO] and 2 equiv of AlCl3 [AlCl subscript 3]. …”
    Get full text
    Get full text
    Article
  17. 17

    A biomimetic approach to the manzamine alkaloids by Spring, DR, Baldwin, J, Whitehead, R, Bischoff, L, Claridge, T

    Published 1997
    “…Their molecular complexity, exemplified by Manzamine A (1) and biological activities make them challenging targets for total synthesis -4v-4XJ <q-4j rc6c="">Y v-xi-4y W k&gt; O -4 Maivamine A (1) Keramaphadin B (2) Recently we have proposed a biogenetic theory to these compounds. …”
    Journal article
  18. 18

    Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah

    Published 2006
    “…This structure is employed in several ciphers that were developed for Advanced Encryption Standard such as CAST-256, MARS and RC6. The problem with EFN is that it requires many rounds when the number of sub-blocks used in EFN is large. …”
    Get full text
    Conference or Workshop Item
  19. 19

    Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…This structure is employed in several ciphers that were developed for Advanced Encryption Standard such as CAST-256, MARS and RC6. The problem with EFN is that it requires many rounds when the number of sub-blocks used in EFN is large. …”
    Get full text
    Conference or Workshop Item
  20. 20

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…Other storage encryption algorithms, i.e. XTS-Twofish and XTS-RC6, have also been implemented in both serial and parallel designs and then evaluated. …”
    Get full text
    Thesis