Lecture Notes
Cryptography and Information Security
Textbook
Text Book 1 : È÷·Î½ÃÀ¯Å°, "¾Ë±â½¬¿î Á¤º¸º¸È£ °³·Ð(2ÆÇ)", ÀÎÇÇ´ÏƼºÏ½º, 2008
Text Book 2 : ÇÏÀçö, ¹®»óÀç, "C·Î ¹è¿ì´Â ¾ÏÈ£ÇÐ ÇÁ·Î±×·¡¹Ö", (ÁÖ)YOUNG, 2011
Text Book 3 :¹Úâ¼·, " ¾ÏÈ£ À̷аú º¸¾È ", ´ë¿µ»ç
Text Book 4 : ÃÖÁظ², "³×Æ®¿öÅ© º¸¾È SoC ¼³°è", È«¸ª°úÇÐ ÃâÆÇ»ç
Text Book 5 : Stalling, Cryptography and Network Security, PH
Text Book 6 : David Bishop(±èÇüÁØ, ¼ÕÅÂ½Ä ¿ª), "Java¸¦ ÀÌ¿ëÇÑ ¾ÏÈ£ÇÐ", È«¸ª°úÇÐ ÃâÆÇ»ç
Text Book 7 : °¼±¸í, "Visual C++ ¾ÏÈ£È ÇÁ·Î±×·¡¹Ö", FREELEC
Text Book 8 : Tom St, Denis, "BIGNum Math : implementing cryptographic multiple precision arithmetic", SYNGRESS
Text Book 9 : ¾ÏÈ£ °ü·Ã ÁÖ¿ä ³í¹® ¹× ÇÁ·Î±×·¥
¾ÏÈ£ °ü·Ã Ãßõ Web sites
°ÀÇ ³ëÆ® (I) : Cryptography and Information Security
Return to Home
Last Modified January 2, 2013 by Byeong-Yoon Choi(
bychoi@deu.ac.kr)