Research Article
On the RCCA Security of Hybrid Signcryption for Internet of Things
Table 1
The hybrid cryptology and their security notion.
| ||||||||||||||||||||||||||||||||||||
KEM: key encapsulation mechanism, DEM: data encapsulation mechanism. |
| ||||||||||||||||||||||||||||||||||||
KEM: key encapsulation mechanism, DEM: data encapsulation mechanism. |