Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,201,951 papers from all fields of science
Search
Sign In
Create Free Account
Symmetric-key algorithm
Known as:
Symmetrical encryption
, Symmetric-key cipher
, Symmetric-key cryptography
Expand
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Advanced Encryption Standard process
Algorithm
Beaufort cipher
Block cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Attribute Based Group Key Management
Mohamed Nabeel
,
E. Bertino
Transactions on Data Privacy
2014
Corpus ID: 659378
Attribute based systems enable fine-grained access control among a group of users each identified by a set of attributes. Secure…
Expand
2013
2013
S ECURE P ARTIAL I MAGE E NCRYPTION S CHEME U SING S CAN B ASED A LGORITHM
Parameshachari
,
K. Soyjaudah
,
S. Devi
2013
Corpus ID: 15624277
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies…
Expand
2012
2012
An Efficient Key Management Scheme for Wireless Sensor Networks
Dahai Du
,
Huagang Xiong
,
Hailiang Wang
Int. J. Distributed Sens. Networks
2012
Corpus ID: 33353953
Wireless sensor networks (WSNs) can be used in a wide range of environments. Due to the inherent characteristics of wireless…
Expand
2012
2012
Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks
Eraj Khan
,
E. Gabidulin
,
B. Honary
,
H. Ahmed
IET Wireless Sensor Systems
2012
Corpus ID: 37426505
As wireless sensor networks (WSN) have gained popularity due to their broader applications areas, so does the need for effective…
Expand
Highly Cited
2011
Highly Cited
2011
New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm
Neeraj Khanna
,
J. Nath
,
Joel James
,
Sayantan Chakraborty
,
A. Chakrabarti
,
A. Nath
International Conference on Communication Systems…
2011
Corpus ID: 45219711
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors…
Expand
2011
2011
Fusion of Cryptographic Watermarking Medical Image System with Reversible Property
V. P
,
V. P
2011
Corpus ID: 56231737
In todays world large amount of medical information of patients are uploaded through internet, which needs more amount of time…
Expand
Highly Cited
2010
Highly Cited
2010
Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks
Xueying Zhang
,
H. Heys
,
Cheng Li
Biennial Symposium on Communications
2010
Corpus ID: 6252356
In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless sensor networks…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
2005
2005
ChipLock: support for secure microarchitectures
Taeho Kgil
,
Laura Falk
,
T. Mudge
CARN
2005
Corpus ID: 9213563
The increasing need for security has caused system designers to consider placing some security support directly at the hardware…
Expand
Review
2000
Review
2000
Overview of IEEE 802.11b Security
Sultan Weatherspoon
2000
Corpus ID: 15065327
There is much regulatory and standards work in the area of security, especially in wireless. The wireless LAN standard IEEE 802…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE