Skip to search formSkip to main contentSkip to account menu

Symmetric-key algorithm

Known as: Symmetrical encryption, Symmetric-key cipher, Symmetric-key cryptography 
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors… 
Highly Cited
2009
Highly Cited
2009
Location privacy of mobile users (MUs) in wireless communication networks is very important. Ensuring location privacy for an MU… 
Highly Cited
2007
Highly Cited
2007
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
Review
2005
Review
2005
The authors present a comparative survey of private-key cryptographic algorithm implementations on field programmable gate arrays… 
Highly Cited
2004
Highly Cited
2004
  • Hao YangSongwu Lu
  • 2004
  • Corpus ID: 2573296
Wireless sensor networks offer unprecedented capabilities to monitor the physical world by reporting the occurrence of… 
2000
2000
We are facing an growing demand in deploying large scale sensor networks in the real world. However, there are still many… 
Review
2000
Review
2000
There is much regulatory and standards work in the area of security, especially in wireless. The wireless LAN standard IEEE 802…