symmetric key cryptography


Also found in: Encyclopedia.

symmetric key cryptography

References in periodicals archive ?
2003), Cellular Programming and Symmetric Key Cryptography Systems, In: Genetic and Evolutionary Computation Conference GECCO 03, Erick Cantu-Paz et al (Eds.
The RF360 will also feature innovative, fast hardware co-processors on the chip which support both public key cryptography (RSA, Elliptic Curve) and symmetric key cryptography (DES/Triple DES, AES).
Symmetric key cryptography is used to encrypt each packet instead of public key cryptography because it is considerably less computationally intensive.
Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis
To secure communications between the host site and the server, itrust uses symmetric key cryptography.

Full browser ?