Skip to search formSkip to main contentSkip to account menu

Symmetric-key algorithm

Known as: Symmetrical encryption, Symmetric-key cipher, Symmetric-key cryptography 
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
- The present work deals with modified advanced symmetric key cryptographic method i.e. modified DJSSA algorithm[1] for multiple… 
Highly Cited
2010
Highly Cited
2010
Advanced Encryption Standard (AES) is one of the most common symmetric encryption algorithms. The hardware complexity in AES is… 
Highly Cited
2007
Highly Cited
2007
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of… 
Highly Cited
2006
Highly Cited
2006
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that… 
Highly Cited
2005
Highly Cited
2005
Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was… 
2005
2005
The increasing need for security has caused system designers to consider placing some security support directly at the hardware… 
Highly Cited
2004
Highly Cited
2004
  • Hao YangSongwu Lu
  • 2004
  • Corpus ID: 2573296
Wireless sensor networks offer unprecedented capabilities to monitor the physical world by reporting the occurrence of… 
Highly Cited
2004
Highly Cited
2004
Key management is an essential cryptographic primitive upon which other security primitives are built. However, none of the…