Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,668,842 papers from all fields of science
Search
Sign In
Create Free Account
Symmetric-key algorithm
Known as:
Symmetrical encryption
, Symmetric-key cipher
, Symmetric-key cryptography
Expand
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Advanced Encryption Standard process
Algorithm
Beaufort cipher
Block cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
S ECURE P ARTIAL I MAGE E NCRYPTION S CHEME U SING S CAN B ASED A LGORITHM
Parameshachari
,
K. Soyjaudah
,
S. Devi
2013
Corpus ID: 15624277
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies…
Expand
Highly Cited
2011
Highly Cited
2011
New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm
Neeraj Khanna
,
J. Nath
,
Joel James
,
Sayantan Chakraborty
,
A. Chakrabarti
,
A. Nath
International Conference on Communication Systems…
2011
Corpus ID: 45219711
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors…
Expand
Highly Cited
2008
Highly Cited
2008
Location privacy and anonymity preserving routing for wireless sensor networks
Alireza A. Nezhad
,
A. Miri
,
D. Makrakis
Comput. Networks
2008
Corpus ID: 27638042
Highly Cited
2007
Highly Cited
2007
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Tingjian Ge
,
S. Zdonik
IEEE International Conference on Data Engineering
2007
Corpus ID: 181019
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of…
Expand
Review
2006
Review
2006
Identity-based key agreement and encryption for wireless sensor networks
Geng Yang
,
Chunming Rong
,
Christian Veigner
,
Jiangtao Wang
,
Hongbing Cheng
2006
Corpus ID: 17287670
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
2005
2005
ChipLock: support for secure microarchitectures
Taeho Kgil
,
Laura Falk
,
T. Mudge
CARN
2005
Corpus ID: 9213563
The increasing need for security has caused system designers to consider placing some security support directly at the hardware…
Expand
Review
2005
Review
2005
Comparative survey of high-performance cryptographic algorithm implementations on FPGAs
K. Järvinen
,
M. Tommiska
,
J. Skyttä
2005
Corpus ID: 58547414
The authors present a comparative survey of private-key cryptographic algorithm implementations on field programmable gate arrays…
Expand
Highly Cited
2004
Highly Cited
2004
Commutative cipher based en-route filtering in wireless sensor networks
Hao Yang
,
Songwu Lu
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 2573296
Wireless sensor networks offer unprecedented capabilities to monitor the physical world by reporting the occurrence of…
Expand
2000
2000
Security and Deployment Issues in a Sensor Network
Mike L. C. Chen
,
Weidong Cui
,
Victor Wen
2000
Corpus ID: 15564946
We are facing an growing demand in deploying large scale sensor networks in the real world. However, there are still many…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE