Skip to search formSkip to main contentSkip to account menu

Symmetric-key algorithm

Known as: Symmetrical encryption, Symmetric-key cipher, Symmetric-key cryptography 
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies… 
Highly Cited
2011
Highly Cited
2011
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors… 
2011
2011
Cloud computing entails a novel security threat: The cloud service provider is entrusted with the data of all its customers. This… 
2011
2011
In todays world large amount of medical information of patients are uploaded through internet, which needs more amount of time… 
Highly Cited
2010
Highly Cited
2010
In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless sensor networks… 
2007
2007
Key agreement is a central problem to build up secure infrastructures for networks. Public key technology may not be suitable in… 
2006
2006
Wireless Sensor Networks (WSNs) enabled with authenticated querying [1] allows only the authorized users to inject queries into… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
Review
2000
Review
2000
There is much regulatory and standards work in the area of security, especially in wireless. The wireless LAN standard IEEE 802… 
Review
1998
Review
1998
1, ABSTRACT Mobile agents roaming the net in pursuit of information in exchange for different forms of payments, as well as the…