Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,954,291 papers from all fields of science
Search
Sign In
Create Free Account
Symmetric-key algorithm
Known as:
Symmetrical encryption
, Symmetric-key cipher
, Symmetric-key cryptography
Expand
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Advanced Encryption Standard process
Algorithm
Beaufort cipher
Block cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Large scale wireless sensor networks with multi-level dynamic key management scheme
O. K. Sahingoz
Journal of systems architecture
2013
Corpus ID: 39578521
2012
2012
Symmetric key Cryptography using modified DJSSA symmetric key algorithm
Dripto Chatterjee
,
J. Nath
,
Sankar Das
,
Shalabh Agarwal
,
A. Nath
2012
Corpus ID: 62126698
- The present work deals with modified advanced symmetric key cryptographic method i.e. modified DJSSA algorithm[1] for multiple…
Expand
Highly Cited
2010
Highly Cited
2010
Design of AES S-box using combinational logic optimization
Nabihah Ahmad
,
Rezaul Hasan
,
W. M. Jubadi
IEEE Symposium on Industrial Electronics and…
2010
Corpus ID: 14073387
Advanced Encryption Standard (AES) is one of the most common symmetric encryption algorithms. The hardware complexity in AES is…
Expand
Highly Cited
2008
Highly Cited
2008
Location privacy and anonymity preserving routing for wireless sensor networks
Alireza A. Nezhad
,
A. Miri
,
D. Makrakis
Comput. Networks
2008
Corpus ID: 27638042
Highly Cited
2007
Highly Cited
2007
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Tingjian Ge
,
S. Zdonik
IEEE International Conference on Data Engineering
2007
Corpus ID: 181019
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of…
Expand
Highly Cited
2006
Highly Cited
2006
Discount Anonymous On Demand Routing for Mobile Ad hoc Networks
Liu Yang
,
M. Jakobsson
,
S. Wetzel
Securecomm and Workshops
2006
Corpus ID: 6454169
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
2005
2005
ChipLock: support for secure microarchitectures
Taeho Kgil
,
Laura Falk
,
T. Mudge
CARN
2005
Corpus ID: 9213563
The increasing need for security has caused system designers to consider placing some security support directly at the hardware…
Expand
Highly Cited
2004
Highly Cited
2004
Commutative cipher based en-route filtering in wireless sensor networks
Hao Yang
,
Songwu Lu
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 2573296
Wireless sensor networks offer unprecedented capabilities to monitor the physical world by reporting the occurrence of…
Expand
Highly Cited
2004
Highly Cited
2004
Distributed symmetric key management for mobile ad hoc networks
A. C. Chan
IEEE INFOCOM
2004
Corpus ID: 16872405
Key management is an essential cryptographic primitive upon which other security primitives are built. However, none of the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE