RC5

Results: 37



#Item
11Electronic engineering / Embedded systems / Data transmission / Central processing unit / Atmel / Universal asynchronous receiver/transmitter / RC5 / Interrupt / Atmel AVR / Computer architecture / Microcontrollers / Electronics

AVR415: RC5 IR Remote Control Transmitter 8-bit Microcontroller Features

Add to Reading List

Source URL: www.atmel.com

Language: English - Date: 2014-10-13 01:51:10
12Central processing unit / Electronic engineering / Instruction set architectures / Atmel AVR / Norwegian Institute of Technology / Embedded systems / Processor register / 8-bit / RC5 / Computer architecture / Microcontrollers / Computer hardware

AVR410: RC5 IR Remote Control Receiver Features • • • •

Add to Reading List

Source URL: www.atmel.com

Language: English - Date: 2014-10-13 01:48:54
13Water technology / Water treatment / Filters / Reverse osmosis / Ultrafiltration / Desalination / Calcium / RC5 / Sewage treatment / Chemistry / Water pollution / Membrane technology

Smart Water Fund Project (52R-2036) “Interstage crystallization to enhance two stage reverse osmosis (RO) recovery” Milestone 6: Final Report

Add to Reading List

Source URL: clearwater.asn.au

Language: English - Date: 2014-05-08 00:52:21
14Data Encryption Standard / SHA-1 / FIPS 140-2 / FIPS 140 / HMAC / RC5 / DES-X / Block cipher / Crypto++ / Cryptography / Cryptographic software / Cryptography standards

Non-Proprietary FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
15Internal audit / JAC / Separation of duties / Auditing / RC5 / RC2

Report Summary[removed]

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2012-05-02 09:00:28
16Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]Low Cost Attacks on Tamper Resistant Devices Ross

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
17Symmetric-key algorithm / Cipher / Crypt / Feistel cipher / Block cipher / Key size / RC5 / ICE / Key / Cryptography / Key management / Blowfish

American Journal of Engineering Research (AJER[removed]American Journal of Engineering Research (AJER) e-ISSN : [removed]p-ISSN : [removed]

Add to Reading List

Source URL: www.ajer.org

Language: English - Date: 2014-07-28 18:08:04
18SHACAL / RC6 / RC5 / SHA-1 / SHA-2 / NESSIE / Crypt / Outline of cryptography / Encryption by date / Cryptography / Block ciphers / Cryptographic hash functions

Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Add to Reading List

Source URL: ccc.ustc.edu.cn

Language: English - Date: 2006-10-24 07:55:02
19Key management / Blinding / RSA / Diffie–Hellman key exchange / Digital signature / Timing attack / RC5 / Paul Kocher / Ron Rivest / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-05-25 13:00:00
20RC5 / Ron Rivest / Key schedule / Cryptography / Block ciphers / RC6

Improved Analysis of Some Simpli ed Variants of RC6 Scott Contini1, Ronald L. Rivest2, M.J.B. Robshaw1, and Yiqun Lisa Yin1

Add to Reading List

Source URL: www.crypto-world.com

Language: English - Date: 2011-04-01 07:21:41
UPDATE