Clean bibliography

This commit is contained in:
Marius Drechsler 2025-06-22 17:32:35 +02:00
parent bba4f61d44
commit cc9a28c658
Signed by: marius
GPG key ID: 56D4131BA3104777

View file

@ -1,94 +1 @@
@INPROCEEDINGS{hybrid-performance,
author={Zhang, Qixin},
booktitle={2021 2nd International Conference on Computing and Data Science (CDS)},
title={An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption},
year={2021},
volume={},
number={},
pages={616-622},
keywords={Information security;Information processing;Data science;Elliptic curve cryptography;Encryption;Internet;encryption algorithm;symmetric algorithm;asymmetric algorithm;hybrid encryption},
doi={10.1109/CDS52072.2021.00111}}
@misc{performance-comparison, title={Asymmetric vs symmetric encryption-1: Comparing their performances}, url={https://securemyorg.com/asymmetric-vs-symmetric-encryption-1/}, journal={SecureMyOrg}, author={SecureMyOrg}, year={2024}, month={Dec}}
@INPROCEEDINGS{aes-performance,
author={Bhat, Bawna and Ali, Abdul Wahid and Gupta, Apurva},
booktitle={International Conference on Computing, Communication & Automation},
title={DES and AES performance evaluation},
year={2015},
volume={},
number={},
pages={887-890},
keywords={Encryption;Standards;Classification algorithms;Ciphers;Memory management;AES;DES;Cryptography;entropy},
doi={10.1109/CCAA.2015.7148500}}
@article{rsa,
title={The RSA algorithm},
author={Milanov, Evgeny},
journal={RSA laboratories},
volume={1},
number={11},
year={2009}
}
@article{dh-key-exchange,
title={Diffie-Hellman Key Exchange},
author={Exchange, Diffie-Hellman Key},
journal={Diffie\% E2},
volume={80},
year={1976}
}
@article{symmetric-vs-asymmetric,
title={Symmetric and asymmetric encryption},
author={Simmons, Gustavus J},
journal={ACM Computing Surveys (CSUR)},
volume={11},
number={4},
pages={305--330},
year={1979},
publisher={ACM New York, NY, USA}
}
@article{symmetric-security,
title={Symmetric encryption algorithms: Review and evaluation study},
author={Alenezi, Mohammed N and Alabdulrazzaq, Haneen and Mohammad, Nada Q},
journal={International Journal of Communication Networks and Information Security},
volume={12},
number={2},
pages={256--272},
year={2020},
publisher={Kohat University of Science and Technology (KUST)}
}
@article{des,
title={Data encryption standard},
author={Standard, Data Encryption and others},
journal={Federal Information Processing Standards Publication},
volume={112},
number={3},
year={1999},
publisher={De Standaard}
}
@article{tls,
title={Transport layer security},
author={Turner, Sean},
journal={IEEE Internet Computing},
volume={18},
number={6},
pages={60--63},
year={2014},
publisher={IEEE}
}
@article{pgp,
title={„PGP--Pretty Good Privacy},
author={Zimmermann, Philip},
journal={Public Key Encryption for the Masses, User's Guide},
volume={1},
year={1997}
}