Lecture Notes : Graduate Courses
Cryptography and Network Security
Text Book 1 : È÷·Î½ÃÀ¯Å°, "¾Ë±â½¬¿î Á¤º¸º¸È£ °³·Ð(2nd edition)", ÀÎÇÇ´ÏƼºÏ½º, 2008
Text Book 2 : ÇÏÀçö, ¹®»óÀç, "C·Î ¹è¿ì´Â ¾ÏÈ£ÇÐ ÇÁ·Î±×·¡¹Ö", (ÁÖ)YOUNG, 2011
Text Book 3 :¹Úâ¼·, " ¾ÏÈ£ À̷аú º¸¾È ", ´ë¿µ»ç
Text Book 4 : ÃÖÁظ², "³×Æ®¿öÅ© º¸¾È SoC ¼³°è", È«¸ª°úÇÐ ÃâÆÇ»ç
Text Book 5 : Stalling, Cryptography and Network Security, PH
Text Book 6 : David Bishop(±èÇüÁØ, ¼ÕÅÂ½Ä ¿ª), "Java¸¦ ÀÌ¿ëÇÑ ¾ÏÈ£ÇÐ", È«¸ª°úÇÐ ÃâÆÇ»ç
Text Book 7 : °¼±¸í, "Visual C++ ¾ÏÈ£È ÇÁ·Î±×·¡¹Ö", FREELEC
Text Book 8 : Tom St, Denis, "BIGNum Math : implementing cryptographic multiple precision arithmetic", SYNGRESS
Text Book 9 : ¾ÏÈ£ °ü·Ã ÁÖ¿ä ³í¹® ¹× ÇÁ·Î±×·¥
¾ÏÈ£ °ü·Ã Ãßõ Web sites
Note : Please use acroread 6.0 or newer version to print PDF file
°ÀÇ ¹× ¼¼¹Ì³ª ÀÚ·á