Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,414,016 papers from all fields of science
Search
Sign In
Create Free Account
Symmetric-key algorithm
Known as:
Symmetrical encryption
, Symmetric-key cipher
, Symmetric-key cryptography
Expand
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Advanced Encryption Standard process
Algorithm
Beaufort cipher
Block cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
Thomas Kothmayr
,
C. Schmitt
,
W. Hu
,
M. Brünig
,
G. Carle
37th Annual IEEE Conference on Local Computer…
2012
Corpus ID: 8924479
In this paper, we introduce the first fully implemented two way authentication security scheme for the Internet of Things (IoT…
Expand
Highly Cited
2011
Highly Cited
2011
Macchine calcolatrici e intelligenza
2011
Corpus ID: 16582352
Interactive communication and the Internet have garnered limited interest from both futurists and systems engineers in the last…
Expand
Highly Cited
2008
Highly Cited
2008
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings
T. Malkin
The Cryptographer's Track at RSA Conference
2008
Corpus ID: 41966026
Hash Function Cryptanalysis.- Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.- Cryptanalysis…
Expand
Highly Cited
2006
Highly Cited
2006
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Anthony D. Wood
,
L. Fang
,
J. Stankovic
,
T. He
ACM Workshop on Security of ad hoc and Sensor…
2006
Corpus ID: 1482280
As sensor networks are deployed in adversarial environments and used for critical applications such as battlefield surveillance…
Expand
Highly Cited
2006
Highly Cited
2006
Discount Anonymous On Demand Routing for Mobile Ad hoc Networks
Liu Yang
,
M. Jakobsson
,
S. Wetzel
Securecomm and Workshops
2006
Corpus ID: 6454169
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
Highly Cited
2004
Highly Cited
2004
Distributed symmetric key management for mobile ad hoc networks
A. C. Chan
IEEE INFOCOM
2004
Corpus ID: 16872405
Key management is an essential cryptographic primitive upon which other security primitives are built. However, none of the…
Expand
Highly Cited
2004
Highly Cited
2004
Commutative cipher based en-route filtering in wireless sensor networks
Hao Yang
,
Songwu Lu
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 2573296
Wireless sensor networks offer unprecedented capabilities to monitor the physical world by reporting the occurrence of…
Expand
Highly Cited
2004
Highly Cited
2004
An efficient and secure multi-server password authentication scheme using smart cards
Chinchen Chang
,
Jung-San Lee
International Conference on Cyberworlds
2004
Corpus ID: 23208629
With the rapid growth of computer networks and communication technologies, more and more computers are linked together such that…
Expand
Highly Cited
2003
Highly Cited
2003
Efficient authentication and key distribution in wireless IP networks
L. Salgarelli
,
M. Buddhikot
,
J. Garay
,
Sarvar Patel
,
Scott C. Miller
IEEE wireless communications
2003
Corpus ID: 725410
Emerging broadband access technologies such as 802.11 are enabling the introduction of wireless IP services to an increasing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE