-
1
-
2
-
3
-
4
Integrating RC6 Stream Cipher to a Chaotic Synchronization System
Published 2024-01-01“…RC6 can be parameterized to support longer key lengths and encryption rounds, and RC6 has excellent computing speed and security. …”
Get full text
Article -
5
Multiparty Quantum Cryptography with Block Cipher RC6 (B- MQKD)
Published 2019-09-01Subjects: Get full text
Article -
6
Derivation of the human embryonic stem cell line RCe010-A (RC-6)
Published 2016-03-01“…The human embryonic stem cell line RCe010-A (RC-6) was derived from a frozen and thawed blastocyst voluntarily donated as unsuitable and surplus to fertility requirements following ethics committee approved informed consent under licence from the UK Human Fertilisation and Embryology Authority. …”
Get full text
Article -
7
Security and data encryption effect of high ciphertext based on improved RC6 algorithm for WSN
Published 2023-10-01Subjects: Get full text
Article -
8
Measurement of Encryption Quality of Bitmap Images with RC6, and two modified version Block Cipher
Published 2010-08-01“…Due to the increasinguse of images in industrial process, it is essential to protect the confidential imagedata from unauthorized access. In this paper, RC6 with two modified version 512bit RC6 and 640 bit RC6-Cascade encryption algorithms will be analyzed toinvestigate the encryption efficiency for them to digital images and providing anew mathematical measure for encryption efficiency. …”
Get full text
Article -
9
Implementasi Aplikasi Kriptografi Pada Layanan Pesan Singkat (SMS) Menggunakan Algoritma RC6 Berbasis Android
Published 2016-08-01Subjects: Get full text
Article -
10
تحسين كفاءة وإنتاجية أنظمة أمن البريد الإلكتروني الهجينة باستخدام خوارزميات التشفير RC6 – Elgamal – MD5
Published 2020-10-01“…إن هذه الأهمية للبريد الإلكتروني دعت إلى إتخاذ إجراءات ضرورية تهدف إلى تأمين المعلومات المنقولة عبر الرسائل الإلكترونية, والتي قد تكون على درجة عالية من الأهمية, ومن هذه الإجراءات استخدام التشفير.Encryption قُمنا في هذا البحث بإجراء دراسة مقارنة تحليلية لتقييم أداء وفعالية خوارزميات التشفير المُستخدمة في تصميم المُخطط الأمني العام لأنظمة التشفير الهجينة التي تقوم بتأمين رسائل البريد الإلكتروني المُتبادلة عبر شبكة الإنترنت, حيث أظهرت الدراسة أن الخوارزميات : RC6 - Elgamal - MD5 , تتميز بأداء جيد وفعالية عالية تُسهم في تحسين كفاءة وإنتاجية هذه الأنظمة. …”
Get full text
Article -
11
Modeling of GaN HEMTs With Open Source Qucs-S Circuit Simulation and Compact Device Modeling Technology
Published 2016“…Qucs-0.0.19-S-RC6 Simulation and Compact Device Modelling Tools Introduction to the Qucs GPL Verilog-A Module Synthesizer Qucs modelling of the ”Efficient Power Corporation (EPC)” GaN EPC2001 Power Transistor Qucs Verilog-A Modeling of the ”MIT Virtual Source GaN-RF HEMT Compact Device Model 1.0.0”: Problems Simulating with ADMS; Workarounds and Typical Simulation Data Qucs-0.0.19-S-RC6 XSPICE Code Modeling package Qucs-0.0.19-S-RC6/Ngspice/Xyce Circuit Analysis and Compact Device Parameter Extraction from Manufacturers Data or Measurements Controlled by Octave Script Files Summary…”
Get full text
Conference or Workshop Item -
12
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
Get full text
Thesis -
13
VHDL Implementation of Hybrid Block Cipher Method (SRC)
Published 2010-02-01“…This paper discusses the hardware design of the hybrid block cipher methodthat combines the RC6 cipher and the Serpent cipher.The block size is 128 bits, and the key can be any length up to 256 bytes. …”
Get full text
Article -
14
Dinitrogen fixation chemistry of a molybdenum trisanilide system
Published 2009Get full text
Thesis -
15
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA)
Published 2011-03-01“…The modified algorithm MTEA is a new secret-key block cipher of 64 bit that uses good features of Tiny Encryption Algorithm (TEA) and RC6 algorithms. The proposal algorithm uses the RC6 encryption algorithm as key scheduling to generate subkey. …”
Get full text
Article -
16
Synthesis and Reversible Reductive Coupling of Cationic, Dinitrogen-Derived Diazoalkane Complexes
Published 2011“…A series of cationic diazoalkane complexes [4-RC6H4C(H)NNMo(N[t-Bu]Ar)3][AlCl4] 4-RC subscript 6 H subscript 4 C(H)NNMo(N[t-Bu]Ar) subscript 3] [AlCl subscript 4]], [1-R][AlCl4] (R = NMe2, Me, H, Br, CN; Ar = 3,5-C6H3Me2) [[1-R][AlCl subscript 4] (R = NMe subscript 2, Me, H, Br, CN; Ar = 3,5-C subscript 6 H subscript 3 Me subscript 2)] has been prepared by treatment of the N2-derived [N subscript 2 derived] diazenido complex Me3SiNNMo(N[t-Bu]Ar)3 [Me subscript 3 SiNNMo(N[t-Bu]Ar) subscript 3] with 4-RC6H4CHO [4-RC subscript 6 H subscript 4 CHO] and 2 equiv of AlCl3 [AlCl subscript 3]. …”
Get full text
Get full text
Article -
17
A biomimetic approach to the manzamine alkaloids
Published 1997“…Their molecular complexity, exemplified by Manzamine A (1) and biological activities make them challenging targets for total synthesis -4v-4XJ <q-4j rc6c="">Y v-xi-4y W k> O -4 Maivamine A (1) Keramaphadin B (2) Recently we have proposed a biogenetic theory to these compounds. …”
Journal article -
18
Diffusion analysis of EFN-MDS structure
Published 2006“…This structure is employed in several ciphers that were developed for Advanced Encryption Standard such as CAST-256, MARS and RC6. The problem with EFN is that it requires many rounds when the number of sub-blocks used in EFN is large. …”
Get full text
Conference or Workshop Item -
19
Diffusion analysis of EFN-MDS structure
Published 2006“…This structure is employed in several ciphers that were developed for Advanced Encryption Standard such as CAST-256, MARS and RC6. The problem with EFN is that it requires many rounds when the number of sub-blocks used in EFN is large. …”
Get full text
Conference or Workshop Item -
20
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…Other storage encryption algorithms, i.e. XTS-Twofish and XTS-RC6, have also been implemented in both serial and parallel designs and then evaluated. …”
Get full text
Thesis