Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Symmetric-key algorithm

Known as: Symmetrical encryption, Symmetric-key cipher, Symmetric-key cryptography 
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Highly Cited
2008
Highly Cited
2008
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively… Expand
  • figure 1
Highly Cited
2006
Highly Cited
2006
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party (a server) in a… Expand
  • table 1
Highly Cited
2002
Highly Cited
2002
Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 8
Highly Cited
2001
Highly Cited
2001
We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2001
Highly Cited
2001
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2000
Highly Cited
2000
Many emerging network applications are based upon a group communications model. As a result, securing group communications, i.e… Expand
Highly Cited
1999
Highly Cited
1999
This document standardizes one particular Diffie-Hellman variant, based on the ANSI X9.42 draft, developed by the ANSI X9F1… Expand
Highly Cited
1997
Highly Cited
1997
This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with… Expand
Highly Cited
1997
Highly Cited
1997
A sound pressure level meter adapted for use in monitoring noise levels, particularly for use by law enforcement agencies wherein… Expand