Lecture Notes : Graduate Courses


Cryptography and Network Security


Text Book 1 : È÷·Î½ÃÀ¯Å°, "¾Ë±â½¬¿î Á¤º¸º¸È£ °³·Ð(2nd edition)", ÀÎÇÇ´ÏƼºÏ½º, 2008

Text Book 2 : ÇÏÀçö, ¹®»óÀç, "C·Î ¹è¿ì´Â ¾ÏÈ£ÇÐ ÇÁ·Î±×·¡¹Ö", (ÁÖ)YOUNG, 2011

Text Book 3 :¹Úâ¼·, " ¾ÏÈ£ À̷аú º¸¾È ", ´ë¿µ»ç

Text Book 4 : ÃÖÁظ², "³×Æ®¿öÅ© º¸¾È SoC ¼³°è", È«¸ª°úÇÐ ÃâÆÇ»ç

Text Book 5 : Stalling, Cryptography and Network Security, PH

Text Book 6 : David Bishop(±èÇüÁØ, ¼ÕÅÂ½Ä ¿ª), "Java¸¦ ÀÌ¿ëÇÑ ¾ÏÈ£ÇÐ", È«¸ª°úÇÐ ÃâÆÇ»ç

Text Book 7 : °­¼±¸í, "Visual C++ ¾Ïȣȭ ÇÁ·Î±×·¡¹Ö", FREELEC

Text Book 8 : Tom St, Denis, "BIGNum Math : implementing cryptographic multiple precision arithmetic", SYNGRESS

Text Book 9 : ¾ÏÈ£ °ü·Ã ÁÖ¿ä ³í¹® ¹× ÇÁ·Î±×·¥


¾ÏÈ£ °ü·Ã Ãßõ Web sites



Note : Please use acroread 6.0 or newer version to print PDF file

°­ÀÇ ¹× ¼¼¹Ì³ª ÀÚ·á