Lecture Notes


Cryptography and Information Security


Textbook


    Text Book 1 : È÷·Î½ÃÀ¯Å°, "¾Ë±â½¬¿î Á¤º¸º¸È£ °³·Ð(2ÆÇ)", ÀÎÇÇ´ÏƼºÏ½º, 2008

    Text Book 2 : ÇÏÀçö, ¹®»óÀç, "C·Î ¹è¿ì´Â ¾ÏÈ£ÇÐ ÇÁ·Î±×·¡¹Ö", (ÁÖ)YOUNG, 2011

    Text Book 3 :¹Úâ¼·, " ¾ÏÈ£ À̷аú º¸¾È ", ´ë¿µ»ç

    Text Book 4 : ÃÖÁظ², "³×Æ®¿öÅ© º¸¾È SoC ¼³°è", È«¸ª°úÇÐ ÃâÆÇ»ç

    Text Book 5 : Stalling, Cryptography and Network Security, PH

    Text Book 6 : David Bishop(±èÇüÁØ, ¼ÕÅÂ½Ä ¿ª), "Java¸¦ ÀÌ¿ëÇÑ ¾ÏÈ£ÇÐ", È«¸ª°úÇÐ ÃâÆÇ»ç

    Text Book 7 : °­¼±¸í, "Visual C++ ¾Ïȣȭ ÇÁ·Î±×·¡¹Ö", FREELEC

    Text Book 8 : Tom St, Denis, "BIGNum Math : implementing cryptographic multiple precision arithmetic", SYNGRESS

    Text Book 9 : ¾ÏÈ£ °ü·Ã ÁÖ¿ä ³í¹® ¹× ÇÁ·Î±×·¥


¾ÏÈ£ °ü·Ã Ãßõ Web sites



°­ÀÇ ³ëÆ® (I) : Cryptography and Information Security



Return to Home


Last Modified January 2, 2013 by Byeong-Yoon Choi( bychoi@deu.ac.kr)