Academic literature on the topic 'Symmetry key'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Symmetry key.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Symmetry key"
Elliott, J. P. "Key to symmetry." Nature 313, no. 6001 (1985): 409. http://dx.doi.org/10.1038/313409b0.
Full textSkinner, Mhairi. "Symmetry is key." Nature Reviews Cancer 9, no. 11 (2009): 769. http://dx.doi.org/10.1038/nrc2757.
Full textLi, Chunbiao, Jiayu Sun, Tianai Lu, and Tengfei Lei. "Symmetry Evolution in Chaotic System." Symmetry 12, no. 4 (2020): 574. http://dx.doi.org/10.3390/sym12040574.
Full textZhang, Hongjia, Junwen Huang, Xin Xu, Qiang Fang, and Yifei Shi. "Symmetry-Aware 6D Object Pose Estimation via Multitask Learning." Complexity 2020 (October 21, 2020): 1–7. http://dx.doi.org/10.1155/2020/8820500.
Full textSenjanović, Goran. "Is left–right symmetry the key?" Modern Physics Letters A 32, no. 04 (2017): 1730004. http://dx.doi.org/10.1142/s021773231730004x.
Full textMandal, Satyendra Nath, Subhankar Dutta, and Ritam Sarkar. "Block Based Symmetry Key Visual Cryptography." International Journal of Computer Network and Information Security 4, no. 9 (2012): 10–19. http://dx.doi.org/10.5815/ijcnis.2012.09.02.
Full textPIRANDOLA, STEFANO. "SYMMETRIC COLLECTIVE ATTACKS FOR THE EAVESDROPPING OF SYMMETRIC QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, supp01 (2008): 765–71. http://dx.doi.org/10.1142/s0219749908004080.
Full textSievers, Silvan, Martin Wehrle, Malte Helmert, and Michael Katz. "Strengthening Canonical Pattern Databases with Structural Symmetries." Proceedings of the International Symposium on Combinatorial Search 8, no. 1 (2021): 91–99. http://dx.doi.org/10.1609/socs.v8i1.18429.
Full textLi, Weijun, Guoliang Yang, Zhangyou Xiong, Xiaojuan Zhu, and Xinyu Ma. "A Traffic Flow Prediction Model Based on Dynamic Graph Convolution and Adaptive Spatial Feature Extraction." Symmetry 17, no. 7 (2025): 1007. https://doi.org/10.3390/sym17071007.
Full textZheng Mingliang. "Disturbance Decoupling for a Class of Nonlinear Control Systems Based on Lie Symmetry Method." Journal of Electrical Systems 20, no. 3 (2024): 3650–61. https://doi.org/10.52783/jes.5252.
Full textDissertations / Theses on the topic "Symmetry key"
Reyes, Elisabeth. "Evolutionary history of floral key innovations in angiosperms." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS489/document.
Full textAzam, Junaid. "Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143634.
Full textTalluri, Sai Raghu. "Towards Designing Energy Efficient Symmetric Key Protocols." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/853.
Full textČanda, Valér. "Scalable symmetric block ciphers based on group bases." [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962789755.
Full textGhosh, Debeshi D. "Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10263604.
Full textKamineni, Surya Bharat. "Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6874.
Full textMay, Lauren Jeanette. "Design, analysis and implementation of symmetric block ciphers." Thesis, Queensland University of Technology, 2002.
Find full textKasparek, Alexander J. "Secure Key Agreement for Wearable Medical Devices." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1333.
Full textHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.
Full textHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.
Full textBooks on the topic "Symmetry key"
I, MacGregor William, and National Institute of Standards and Technology (U.S.), eds. Symmetric key injection onto smart cards. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008.
Find full textBaksi, Anubhab. Classical and Physical Security of Symmetric Key Cryptographic Algorithms. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6522-6.
Full textWorkshop on Japan Linear Collider (JLC) (4th 1993 KEK). Proceedings of the Fourth Workshop on Japan Linear Collider (JLC): KEK, March 22-23, 1993. Edited by Kurihara Y and Kō-enerugī Butsurigaku Kenkyūjo (Japan). National Laboratory for High Energy Physics, 1994.
Find full textInternational Symposium on Surface and Interface: Properties of Different Symmetry Crossing (2000 Nagoya-shi, Japan). ISSI PDSC-2000: International Symposium on Surface and Interface: Properties of Different Symmetry Crossing 2000, Aichi-ken Sangyo Boueki-kan, Nagoya, Japan, 17-20 October 2000. North-Holland, 2001.
Find full textInternational Symposium on Surface and Interface: Properties of Different Symmetry Crossing (2000 Nagoya-shi, Japan). ISSI PDSC-2000: International Symposium on Surface and Interface: Properties of Different Symmetry Crossing 2000, Aichi-ken Sangyo Boueki-kan, Nagoya, Japan, 17-20 October 2000. North-Holland, 2001.
Find full textSarkar, Rumu. A Fearful Symmetry. Praeger, 2010. http://dx.doi.org/10.5040/9798216968054.
Full textBook chapters on the topic "Symmetry key"
Kim, Chang Boo, Young Chul Ahn, Bo Yeon Kim, Chong Du Cho, and Hyeon Gyu Beom. "Finite Element Analysis of Blower Impeller Using Cyclic Symmetry." In Key Engineering Materials. Trans Tech Publications Ltd., 2007. http://dx.doi.org/10.4028/0-87849-456-1.1082.
Full textHong, Kyung Min, Young June Kang, Nak Kyu Park, and Weon Jae Ryu. "A Study on the Vibration Characteristics of Symmetry and Asymmetry Laminated Composite Materials by Using ESPI." In Key Engineering Materials. Trans Tech Publications Ltd., 2007. http://dx.doi.org/10.4028/0-87849-456-1.2366.
Full textLi, Yujie, Benying Tan, Shuxue Ding, Christian Desrosiers, and Ahmad Chaddad. "Symmetry Structured Analysis Sparse Coding for Key Frame Extraction." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0_43.
Full textJona-Lasinio, Giovanni. "Spontaneous Symmetry Breaking in Particle Physics." In Springer Proceedings in Physics. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23042-4_17.
Full textVishio, Anton. "16. A Myth of Recurrence in Iannis Xenakis’s La Légende d’Eer." In Meta-Xenakis. Open Book Publishers, 2024. http://dx.doi.org/10.11647/obp.0390.18.
Full textSergeev, Alexander, Mikhail Sergeev, Nikolaj Balonin, and Anton Vostrikov. "Symmetry Indices as a Key to Finding Matrices of Cyclic Structure for Noise-Immune Coding." In Intelligent Decision Technologies. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5925-9_19.
Full textDelfs, Hans, and Helmut Knebl. "Symmetric-Key Encryption." In Information Security and Cryptography. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-87126-9_2.
Full textDelfs, Hans, and Helmut Knebl. "Symmetric-Key Encryption." In Information Security and Cryptography. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/3-540-49244-5_2.
Full textDelfs, Hans, and Helmut Knebl. "Symmetric-Key Cryptography." In Information Security and Cryptography. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47974-2_2.
Full textSniatala, Pawel, S. S. Iyengar, and Sanjeev Kaushik Ramani. "Symmetric Key Cryptography." In Evolution of Smart Sensing Ecosystems with Tamper Evident Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77764-7_7.
Full textConference papers on the topic "Symmetry key"
Dai, Linjie, and Neil C. Greenham. "Nano Tweaks to Ultrafast Non-Equilibrium Dynamics." In Frontiers in Optics. Optica Publishing Group, 2024. https://doi.org/10.1364/fio.2024.jtu4a.69.
Full textLin, Jie, Hoi-Kwong Lo, Jacob Johannsson, Mattia Montagna, and Manfred von Willich. "Distributed Symmetric Key Establishment: a Scalable Quantum-Safe Key Distribution Protocol." In 2024 IEEE 49th Conference on Local Computer Networks (LCN). IEEE, 2024. http://dx.doi.org/10.1109/lcn60385.2024.10639637.
Full textBange, S., A. Jäckle, S. König, et al. "MEMS Gyro Compassing: Is Symmetry the Key?" In 2023 DGON Inertial Sensors and Systems (ISS). IEEE, 2023. http://dx.doi.org/10.1109/iss58390.2023.10361927.
Full textHan, Yang, Ming Gao, Ping-xing Chen, and Cheng-zu Li. "Novel Robust Quantum Key Distribution Protocol with Symmetry." In 2008 International Conference on Computer Science and Information Technology (ICCSIT). IEEE, 2008. http://dx.doi.org/10.1109/iccsit.2008.129.
Full textTONEV, D., G. DE ANGELIS, A. GADEA, et al. "TRANSITION PROBABILITIES: A KEY TO PROVE THE X(5) SYMMETRY." In Proceedings of the 8th International Spring Seminar on Nuclear Physics. WORLD SCIENTIFIC, 2005. http://dx.doi.org/10.1142/9789812702265_0036.
Full textTabak, Iris. "Key Components in the "Teacher as Partner": What Makes Symmetry in Teacher-Student Interactions Work?" In 2020 AERA Annual Meeting. AERA, 2020. http://dx.doi.org/10.3102/1583314.
Full textRodriguez, M., and N. W. Mureithi. "Cylinder Wake Dynamics in the Presence of Stream-Wise Harmonic Forcing." In ASME 2006 Pressure Vessels and Piping/ICPVT-11 Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/pvp2006-icpvt-11-93847.
Full textStanishevskiy, YaroslaV. "THE SYMMETRY IN THE SYSTEMS OF KEY-RELATIONSHIP AND THE PROBLEM OF REVERSIBILITY OF THE RELATIONS BETWEEN THE TONALITIES." In SGEM 2014 Scientific SubConference on ARTS, PERFORMING ARTS, ARCHITECTURE AND DESIGN. Stef92 Technology, 2014. http://dx.doi.org/10.5593/sgemsocial2014/b41/s12.011.
Full textSabo, Anica. "Understanding the Phenomenon of Symmetry in a Musical Work (Possible Aspects of Analytical Application)." In Iskošeni ugao Dragutina Gostuškog. Muzikološki institut SANU Beograd, 2024. https://doi.org/10.46793/dgost23.119s.
Full textLi, Zhi, Jie Lin, Danchen Zhou, Bo Zhang, and Hai Li. "Local Symmetry Based Hint Extraction of B-Rep Model for Machining Feature Recognition." In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-85509.
Full textReports on the topic "Symmetry key"
Hoyer, P., M. Pei, and S. Machani. Portable Symmetric Key Container (PSKC). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6030.
Full textTurner, S. CMS Symmetric Key Management and Distribution. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5275.
Full textDoherty, A., M. Pei, S. Machani, and M. Nystrom. Dynamic Symmetric Key Provisioning Protocol (DSKPP). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6063.
Full textCooper, David A., and William I. MacGregor. Symmetric key injection onto smart cards. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.ir.7539.
Full textTurner, S., and R. Housley. Cryptographic Message Syntax (CMS) Symmetric Key Package Content Type. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6031.
Full textSmyshlyaev, S., ed. Re-keying Mechanisms for Symmetric Keys. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8645.
Full textOrman, H., and P. Hoffman. Determining Strengths For Public Keys Used For Exchanging Symmetric Keys. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3766.
Full textHousley, R., T. Polk, S. Hartman, and D. Zhang. Database of Long-Lived Symmetric Cryptographic Keys. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7210.
Full textTurner, S. Algorithms for Cryptographic Message Syntax (CMS) Protection of Symmetric Key Package Content Types. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6160.
Full textKempf, J., and R. Koodli. Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5269.
Full text