Skip to search formSkip to main contentSkip to account menu

Symmetric-key algorithm

Known as: Symmetrical encryption, Symmetric-key cipher, Symmetric-key cryptography 
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies… 
Highly Cited
2011
Highly Cited
2011
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors… 
Highly Cited
2007
Highly Cited
2007
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of… 
Highly Cited
2006
Highly Cited
2006
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
2005
2005
The increasing need for security has caused system designers to consider placing some security support directly at the hardware… 
Highly Cited
2004
Highly Cited
2004
  • Hao YangSongwu Lu
  • 2004
  • Corpus ID: 2573296
Wireless sensor networks offer unprecedented capabilities to monitor the physical world by reporting the occurrence of… 
2000
2000
We are facing an growing demand in deploying large scale sensor networks in the real world. However, there are still many…