The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Symmetric-key (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-2000 (18) 2001-2002 (16) 2003 (20) 2004 (22) 2005 (41) 2006 (24) 2007 (46) 2008 (50) 2009 (33) 2010 (20) 2011-2012 (24) 2013 (17) 2014 (15) 2015 (17) 2016 (27) 2017 (22) 2018 (18) 2019 (23) 2020 (24) 2021 (25) 2022 (27) 2023-2024 (14)
Publication types (Num. hits)
article(186) book(1) incollection(2) inproceedings(339) phdthesis(15)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 293 occurrences of 177 keywords

Results
Found 543 publication records. Showing 543 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Dan Forsberg Use Cases of Implicit Authentication and Key Establishment with Sender and Receiver ID Binding. Search on Bibsonomy WOWMOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Zhijie Shi, Xiao Yang 0001, Ruby B. Lee Arbitrary Bit Permutations in One or Two Cycles. Search on Bibsonomy ASAP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Sung-Min Lee 0006, Tai-Yun Kim Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature. Search on Bibsonomy SAFECOMP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Wen-Shenq Juang A Simple and Efficient Conference Scheme for Mobile Communications. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Symmetric cryptosystems, Network security, Mobile communications, One-way hash functions, Conference keys
17Adam L. Young, Moti Yung Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography
15Akinori Kawachi, Christopher Portmann On the Power of Quantum Encryption Keys. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan A Secure Authenticated Key Agreement Protocol For Wireless Security. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Biswajit Panja, Sanjay Kumar Madria An Energy and Communication Efficient Group Key in Sensor Networks Using Elliptic Curve Polynomial. Search on Bibsonomy ADHOC-NOW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Fang Liu 0025, Jose Manny Rivera, Xiuzhen Cheng 0001 Location-aware key establishment in wireless sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF in-situ key establishment, security, wireless sensor networks
15DaeHun Nyang, Abedelaziz Mohaisen Cooperative Public Key Authentication Protocol in Wireless Sensor Network. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public Key Authentication, Cooperative Protocol, Voting
15Muxiang Zhang Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Benny Applebaum, David Cash, Chris Peikert, Amit Sahai Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key-dependent message security, Learning problems, Encryption, Lattice-based cryptography
15Dan Feng 0001, Lanxiang Chen, Lingfang Zeng, Zhongying Niu FPGA/ASIC based Cryptographic Object Store System. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato On The Security of Key Derivation Functions. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Adrian Perrig, Dawn Song Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Gill R. Tsouri Securing wireless communication with implanted medical devices using reciprocal carrier-phase quantization. Search on Bibsonomy WOWMOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, network security, Key predistribution
14Neeraj Kumar Nehra, R. B. Patel MASLKE: Mobile Agent Based Secure Location aware Key Establishment in sensor networks. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas La Porta Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF probabilistic key management, probabilistic authentication, hybrid network security, Heterogeneous sensor networks
14David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Ting Yuan, Shiyong Zhang, YiPing Zhong A Matrix-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14E. C. Park, Ian F. Blake Reducing Communication Overhead of Key Distribution Schemes for Wireless Sensor Networks. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Sungyoung Lee, Heejo Lee A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Haowen Chan, Adrian Perrig PIKE: peer intermediaries for key establishment in sensor networks. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Ross J. Anderson, Haowen Chan, Adrian Perrig Key Infection: Smart Trust for Smart Dust. Search on Bibsonomy ICNP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Ran Canetti, Shai Halevi, Jonathan Katz A Forward-Secure Public-Key Encryption Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bilinear Diffie-Hellman, Encryption, Forward security, Key exposure
14Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. Search on Bibsonomy ICNP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck CryptoGraphics: Secret Key Cryptography Using Graphics Cards. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Graphics Processing Unit, Stream Ciphers, Block Ciphers, AES
14Yevgeniy Dodis, Joel Spencer On the (non)Universality of the One-Time Pad. Search on Bibsonomy FOCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Stefano Basagni, Kris Herrin, Danilo Bruschi, Emilia Rosti Secure pebblenets. Search on Bibsonomy MobiHoc The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security, wireless sensor networks, ad hoc networks, key management
13Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Vimala Devi Parthasarathy, Kalaichelvi Visvalingam Healthcare data security in cloud storage using light weight symmetric key algorithm. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Pousali Dey, Pratyay Mukherjee, Swagata Sasmal, Rohit Sinha 0001 HiSE: Hierarchical (Threshold) Symmetric-key Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
13Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf Robust and lightweight symmetric key exchange algorithm for next-generation IoE. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Hongyuan Wang, Wanting Zhu, Baokai Zu, Yafang Li An Efficient and Universal Real-Time Data Integrity Verification Scheme Based on Symmetric Key in Stream Computing System. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Jie Lin, Manfred von Willich, Hoi-Kwong Lo Composable Security of Distributed Symmetric Key Exchange Protocol. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha A Survey on Fault Attacks on Symmetric Key Cryptosystems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Shiyao Chen, Chun Guo 0002, Jian Guo 0001, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
13Shiyao Chen, Chun Guo 0002, Jian Guo 0001, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa Accountable Ring Signatures from Symmetric-Key Primitives. Search on Bibsonomy candar The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Taniya Hasija, K. R. Ramkumar, Bhupendra Singh, Amanpreet Kaur, Sudesh Kumar Mittal Symmetric Key Cryptography: Review, Algorithmic Insights, and Challenges in the Era of Quantum Computers. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, An Braeken, Madhusanka Liyanage An improved and provably secure symmetric-key based 5G-AKA Protocol. Search on Bibsonomy Comput. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Kristtopher Kayo Coelho, Michele Nogueira, Mateus Coutinho Marim, Edelberto Franco Silva, Alex Borges Vieira, José Augusto Miranda Nacif LORENA: Low memORy symmEtric-Key geNerAtion Method for Based on Group Cryptography Protocol Applied to the Internet of Healthcare Things. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Vincent Omollo Nyangaresi, Musheer Ahmad 0002, Ahmed Alkhayyat, Wei Feng 0011 Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things. Search on Bibsonomy Expert Syst. J. Knowl. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13R. Rajashree, Vijayakumar Peroumal, Lalit Kishore, K. Venkata Diwakar Reddy, Srujan Reddy, M. Jagannath Implementation of high speed and lightweight symmetric key encryption algorithm-based authentication protocol for resource constrained devices. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Miodrag J. Mihaljevic, Aleksandar Radonjic, Lianhai Wang, Shujiang Xu Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel. Search on Bibsonomy Symmetry The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Manreet Sohal, Sandeep Sharma 0002 BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Subhadeep Koley A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wentian Cai, Huijun Yao A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mustafizur Rahman, Liang Zhou 0004, Shantanu Chakrabartty SPoTKD: A Protocol for Symmetric Key Distribution Over Public Channels Using Self-Powered Timekeeping Devices. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Michele Fabbrini FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Thibaut Vandervelden, Ruben de Smet, Kris Steenhaut, An Braeken Symmetric-Key-Based Authentication among the Nodes in a Wireless Sensor and Actuator Network. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Piotr Palka, Rafael A. Perez, Tianyang Fang, Jafar Saniie Design Flow of Blowfish Symmetric-Key Block Cipher on FPGA. Search on Bibsonomy EIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Pegah Nikbakht Bideh, Christian Gehrmann RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air. Search on Bibsonomy CPSIOTSEC@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. Search on Bibsonomy CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives. Search on Bibsonomy TCC (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mohit Chandra Saxena, Preeti Bajaj A Novel method of End-to-End data security using symmetric key based data encryption and SDWAN networking. Search on Bibsonomy IC3I The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives. Search on Bibsonomy ACNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. Search on Bibsonomy ACISP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Poulami Das 0003, Julia Hesse, Anja Lehmann DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password. Search on Bibsonomy AsiaCCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Anit Kumar Ghosal, Satrajit Ghosh, Dipanwita Roychowdhury Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model. Search on Bibsonomy ProvSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Junchao Ma, Mustafa A. Al Sibahee, Mustafa S. Khalefa, Dhafer G. Honi MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones. Search on Bibsonomy FABULOUS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Bikash Debnath, Jadav Chandra Das, Debashis De SQCA: symmetric key-based crypto-codec for secure nano-communication using QCA. Search on Bibsonomy Photonic Netw. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Sreeparna Chakrabarti, G. N. K. Suresh Babu The Security Enhancement of Symmetric Key Crypto Mechanism based on Double Stage Secret Model. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Jorge Munilla, Mike Burmester, Raquel Barco An enhanced symmetric-key based 5G-AKA protocol. Search on Bibsonomy Comput. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Kalyanapu Srinivas, V. Janaki Symmetric key generation algorithm using image-based chaos logistic maps. Search on Bibsonomy Int. J. Adv. Intell. Paradigms The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, S. Mary Saira Bhanu ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Min-Yan Tsai, Hsin-Hung Cho A High Security Symmetric Key Generation by Using Genetic Algorithm Based on a Novel Similarity Model. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord Symmetric Key Exchange with Full Forward Security and Robust Synchronization. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
13Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
13Amril Syalim, Takashi Nishide, Kouichi Sakurai Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
13Gizem Kara, Oguz Yayla Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
13Ripon Patgiri symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
13Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha 0001 Amortized Threshold Symmetric-key Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
13Mircea Digulescu Applications of SKREM-like symmetric key ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
13RatnaKumari Challa, VijayaKumari Gunta Towards the Construction of Reed-Muller Code Based Symmetric Key FHE. Search on Bibsonomy Ingénierie des Systèmes d Inf. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13K. Sundara Krishnan, S. P. Raja 0001, B. Jaison A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing. Search on Bibsonomy Inf. Technol. Control. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Sijo V. Panicker, P. Mohamed Shameem, N. R. Mruthula Aggregated symmetric key-based hierarchical group data sharing in cloud. Search on Bibsonomy Int. J. Comput. Aided Eng. Technol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Xinrui Ge, Jia Yu 0005, Hanlin Zhang, Chengyu Hu, Zengpeng Li, Zhan Qin, Rong Hao Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha 0001 Amortized Threshold Symmetric-key Encryption. Search on Bibsonomy CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Anubhab Baksi Classical and Physical Security of Symmetric Key Cryptographic Algorithms. Search on Bibsonomy VLSI-SoC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord Symmetric Key Exchange with Full Forward Security and Robust Synchronization. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Taerim Lee, Ho-Se Moon, Juwook Jang Data encryption method using CP-ABE with symmetric key algorithm in blockchain network. Search on Bibsonomy ICTC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Eik List Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers. Search on Bibsonomy 2021   RDF
13Daniel Coggia Techniques of cryptanalysis for symmetric-key primitives. (Techniques de cryptanalyse dédiées au chiffrement à bas coût). Search on Bibsonomy 2021   RDF
13Simon Landry Étude de la résistance des algorithmes cryptographiques symétriques face à la cryptanalyse moderne. (Study of the resistance of symmetric-key algorithms against modern cryptanalysis). Search on Bibsonomy 2021   RDF
13Anubhab Baksi Classical and physical security of symmetric key cryptographic algorithms Search on Bibsonomy 2021   DOI  RDF
13Yi-Li Huang, Fang-Yie Leu, Ruey-Kai Sheu, Jung-Chun Liu, Heru Susanto A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13An Braeken Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability. Search on Bibsonomy Comput. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13SungJin Yu, YoungHo Park 0005 Comments on "ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments". Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Zeeshan Ali, Sajid Hussain, Haseeb Ur Rehman, Asmaa Munshi, Misbah Liaqat, Neeraj Kumar 0001, Shehzad Ashraf Chaudhry ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Borislav Stoyanov, Gyurhan H. Nedzhibov Symmetric Key Encryption Based on Rotation-Translation Equation. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Placide Shabisha, An Braeken, Kris Steenhaut Symmetric Key-Based Secure Storage and Retrieval of IoT Data on a Semi-trusted Cloud Server. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13R. Geetha, T. Padmavathy, T. Thilagam, A. Lallithasree Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Xunhua Wang, Ben Huson Robust distributed symmetric-key encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
13Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha Fault Attacks In Symmetric Key Cryptosystems. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
13Shweta Agrawal, Shota Yamada 0001 CP-ABE for Circuits (and more) in the Symmetric Key Setting. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
Displaying result #101 - #200 of 543 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license