@INPROCEEDINGS{hybrid-performance, author={Zhang, Qixin}, booktitle={2021 2nd International Conference on Computing and Data Science (CDS)}, title={An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption}, year={2021}, volume={}, number={}, pages={616-622}, keywords={Information security;Information processing;Data science;Elliptic curve cryptography;Encryption;Internet;encryption algorithm;symmetric algorithm;asymmetric algorithm;hybrid encryption}, doi={10.1109/CDS52072.2021.00111}} @misc{performance-comparison, title={Asymmetric vs symmetric encryption-1: Comparing their performances}, url={https://securemyorg.com/asymmetric-vs-symmetric-encryption-1/}, journal={SecureMyOrg}, author={SecureMyOrg}, year={2024}, month={Dec}} @INPROCEEDINGS{aes-performance, author={Bhat, Bawna and Ali, Abdul Wahid and Gupta, Apurva}, booktitle={International Conference on Computing, Communication & Automation}, title={DES and AES performance evaluation}, year={2015}, volume={}, number={}, pages={887-890}, keywords={Encryption;Standards;Classification algorithms;Ciphers;Memory management;AES;DES;Cryptography;entropy}, doi={10.1109/CCAA.2015.7148500}} @article{rsa, title={The RSA algorithm}, author={Milanov, Evgeny}, journal={RSA laboratories}, volume={1}, number={11}, year={2009} } @article{dh-key-exchange, title={Diffie-Hellman Key Exchange}, author={Exchange, Diffie-Hellman Key}, journal={Diffie\% E2}, volume={80}, year={1976} } @article{symmetric-vs-asymmetric, title={Symmetric and asymmetric encryption}, author={Simmons, Gustavus J}, journal={ACM Computing Surveys (CSUR)}, volume={11}, number={4}, pages={305--330}, year={1979}, publisher={ACM New York, NY, USA} } @article{symmetric-security, title={Symmetric encryption algorithms: Review and evaluation study}, author={Alenezi, Mohammed N and Alabdulrazzaq, Haneen and Mohammad, Nada Q}, journal={International Journal of Communication Networks and Information Security}, volume={12}, number={2}, pages={256--272}, year={2020}, publisher={Kohat University of Science and Technology (KUST)} } @article{des, title={Data encryption standard}, author={Standard, Data Encryption and others}, journal={Federal Information Processing Standards Publication}, volume={112}, number={3}, year={1999}, publisher={De Standaard} } @article{tls, title={Transport layer security}, author={Turner, Sean}, journal={IEEE Internet Computing}, volume={18}, number={6}, pages={60--63}, year={2014}, publisher={IEEE} } @article{pgp, title={„PGP--Pretty Good Privacy}, author={Zimmermann, Philip}, journal={Public Key Encryption for the Masses, User's Guide}, volume={1}, year={1997} }