Skip to search formSkip to main contentSkip to account menu

Symmetric-key algorithm

Known as: Symmetrical encryption, Symmetric-key cipher, Symmetric-key cryptography 
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
In this paper, we introduce the first fully implemented two way authentication security scheme for the Internet of Things (IoT… 
Highly Cited
2011
Highly Cited
2011
  • 2011
  • Corpus ID: 16582352
Interactive communication and the Internet have garnered limited interest from both futurists and systems engineers in the last… 
Highly Cited
2008
Highly Cited
2008
Hash Function Cryptanalysis.- Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.- Cryptanalysis… 
Highly Cited
2006
Highly Cited
2006
As sensor networks are deployed in adversarial environments and used for critical applications such as battlefield surveillance… 
Highly Cited
2006
Highly Cited
2006
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
Highly Cited
2004
Highly Cited
2004
Key management is an essential cryptographic primitive upon which other security primitives are built. However, none of the… 
Highly Cited
2004
Highly Cited
2004
  • Hao YangSongwu Lu
  • 2004
  • Corpus ID: 2573296
Wireless sensor networks offer unprecedented capabilities to monitor the physical world by reporting the occurrence of… 
Highly Cited
2004
Highly Cited
2004
With the rapid growth of computer networks and communication technologies, more and more computers are linked together such that… 
Highly Cited
2003
Highly Cited
2003
Emerging broadband access technologies such as 802.11 are enabling the introduction of wireless IP services to an increasing…