2021 | OriginalPaper | Chapter
Encryption Schemes
Authors : Arno Mittelbach, Marc Fischlin
Published in: The Theory of Hash Functions and Random Oracles
Publisher: Springer International Publishing
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
An introduction to cryptographic primitives would not be complete without a chapter on encryption schemes. While encryption capabilities are not amongst the many properties that we often ascribe to hash functions,1 hash functions can be used in the design of encryption schemes and play a vital part in larger cryptographic protocols that deploy encryption as one component.