Symmetric-key algorithm

Known as: Symmetrical encryption, Symmetric-key cipher, Symmetric-key cryptography 
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Music and its attributes have been used in cryptography from early days. Today music is vastly used in information hiding with… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2012
2012
The present work deals with modified advanced symmetric key cryptographic method i.e. modified DJSSA algorithm[1] for multiple… (More)
Is this relevant?
2011
2011
In the present work the authors introduced a new symmetric key cryptographic method for encryption as well as decryption of any… (More)
  • table I
  • table IX
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2010
2010
Any communication in the language that you and I speak—that is the human language, takes the form of plain text or clear text… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party (a server) in a… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2000
Highly Cited
2000
 Symmetric Key System h d k  a shared symmetric key d l d d b d develop campus-wide distributed computing environment… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of… (More)
Is this relevant?