diff --git a/bibliography.bib b/bibliography.bib index 45ae5cc..8b13789 100644 --- a/bibliography.bib +++ b/bibliography.bib @@ -1,94 +1 @@ -@INPROCEEDINGS{hybrid-performance, - author={Zhang, Qixin}, - booktitle={2021 2nd International Conference on Computing and Data Science (CDS)}, - title={An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption}, - year={2021}, - volume={}, - number={}, - pages={616-622}, - keywords={Information security;Information processing;Data science;Elliptic curve cryptography;Encryption;Internet;encryption algorithm;symmetric algorithm;asymmetric algorithm;hybrid encryption}, - doi={10.1109/CDS52072.2021.00111}} - -@misc{performance-comparison, title={Asymmetric vs symmetric encryption-1: Comparing their performances}, url={https://securemyorg.com/asymmetric-vs-symmetric-encryption-1/}, journal={SecureMyOrg}, author={SecureMyOrg}, year={2024}, month={Dec}} - -@INPROCEEDINGS{aes-performance, - author={Bhat, Bawna and Ali, Abdul Wahid and Gupta, Apurva}, - booktitle={International Conference on Computing, Communication & Automation}, - title={DES and AES performance evaluation}, - year={2015}, - volume={}, - number={}, - pages={887-890}, - keywords={Encryption;Standards;Classification algorithms;Ciphers;Memory management;AES;DES;Cryptography;entropy}, - doi={10.1109/CCAA.2015.7148500}} - -@article{rsa, - title={The RSA algorithm}, - author={Milanov, Evgeny}, - journal={RSA laboratories}, - volume={1}, - number={11}, - year={2009} -} - -@article{dh-key-exchange, - title={Diffie-Hellman Key Exchange}, - author={Exchange, Diffie-Hellman Key}, - journal={Diffie\% E2}, - volume={80}, - year={1976} -} - - -@article{symmetric-vs-asymmetric, - title={Symmetric and asymmetric encryption}, - author={Simmons, Gustavus J}, - journal={ACM Computing Surveys (CSUR)}, - volume={11}, - number={4}, - pages={305--330}, - year={1979}, - publisher={ACM New York, NY, USA} -} - -@article{symmetric-security, - title={Symmetric encryption algorithms: Review and evaluation study}, - author={Alenezi, Mohammed N and Alabdulrazzaq, Haneen and Mohammad, Nada Q}, - journal={International Journal of Communication Networks and Information Security}, - volume={12}, - number={2}, - pages={256--272}, - year={2020}, - publisher={Kohat University of Science and Technology (KUST)} -} - -@article{des, - title={Data encryption standard}, - author={Standard, Data Encryption and others}, - journal={Federal Information Processing Standards Publication}, - volume={112}, - number={3}, - year={1999}, - publisher={De Standaard} -} - -@article{tls, - title={Transport layer security}, - author={Turner, Sean}, - journal={IEEE Internet Computing}, - volume={18}, - number={6}, - pages={60--63}, - year={2014}, - publisher={IEEE} -} - -@article{pgp, - title={„PGP--Pretty Good Privacy}, - author={Zimmermann, Philip}, - journal={Public Key Encryption for the Masses, User's Guide}, - volume={1}, - year={1997} -} -