참고문헌
- ISO/IEC 11770-1 Information technology-Security techniques-Key management- Part 1 : Framework ISO/IEC
- ISO/IEC 11770-2 Information technology-Security techniques-Key management- Part 2 : Mechanism using symmetric techniques ISO/IEC
- ISO/IEC 11770-3 Information technology-Security techniques-Key management- Part 3 : Mechanism using asymmetric techniques ISO/IEC
- ISO 11568-1 Banking-Key management(retail)-Part 1 : Introduction to key management ISO
- ISO 11568-2 Banking-Key management(retail)-Part 2 : Key management techniques for symmetric ciphers ISO
- ISO 11568-3 Banking-Key management(retail)-Part 3 : Key life cycle for symmetric ciphers ISO
- ISO 11568-4 Banking-Key management(retail)-Part 4 : Key management techniques using public key cryptography ISO
- ISO 11568-5 Banking-Key management(retail)-Part 5 : Key life cycle for public key cryptosystems ISO
- ISO 11568-6 Banking-Key management(retail)-Part 6 : Key management schemes ISO
- KSIAM 춘계학술회의 블록 암호 알고리즘의 분석 기법 임채훈
- Advances in Cryptography - CRYPT '96, LNCS 1109 Keyschedule cryptanalysis of IDEA, DES, GOST, SAFER, and triple-DES J.Kelsey;B.Schneier;D.Wagner
- Advances in Cryptography - EURO CRYPT'93, LNCS 765 New types of crypt-analytic attacks using related keys E.Biham
- Handbook of Applied Cryptography A.J.Menezes;P.C.van Oorschot;S.A.Vanstone
- Advances in Cryptography - ASIACRYPT'96, LNCS 1163 Minding your p's and q's R.Anderson;S.Vaudenay
- Advances in Cryptogrpahy - CRYPTO'97, LNCS 1294 A recovery attack on discrete log-based schemes using a prime order subgroup C.H.Lim;P.J.Lee
- IEEE Transactions on Information Theory 40:1 An Attack on the Interlock Protocol When Used for Authentication S.M.Bellovin;M.Merritt
- Advances in Cryptography - CRYPT'94, LNCS 839 On the risk of opening distributed keys M.Burmester
- Advances in Cryptography - CRYPT '96, LNCS 1109 Timing attacks on implementation of Diffie-Hellman, RSA, DSS and other systems P.Kocher
- Journal of Cryptology Differential cryptanalysis of DES-like crypto-systems E.Biham;A.Shamir
- Advances in Cryptography - EUROCRYPT'93, LNCS 765 Linear cryptanalysis method for DES cipher M.Matsui
- Information and Communications Security, LNCS 1334 A new and optimal chosenmessage attack on RSA-Type cryptosystems D.Bleichenbacher;M.Joye;J.J.Quisquater
- Proc. of ICICS'97 Related-key cryptanalysis of 3-Way, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA J.Kelsey;B.Schneier;D.Wagner
- Advances in Cryptography - EURO CRYPT'96, LNCS 1070 Finding a small root of a bivariate integer equation : factoring with high bits known D.Coppersmith
- Federal Information Processing Standards Publication 185 Escrowed Encryption stan- dard NIST
- Advances in Cryptography - CRYPT'95, LNCS 963 Escrow Encryption Systems Visited : Attacks, Analysis and Designs Yair Frankel;Moti Yung
- The 2nd ACM Conference on Computer and Communication Security Protocol Failure in the Escrowed Encryption Standard Matt Blaze
- Advances in Cryptography - CRYPT'92, LNCS 740 Fair public-key cryptosystems Sivio Micali
- Advances in Cryptogrpahy - CRYPT'95, LNCS 963 Fair systems, Revisited Joseph Kilian
- Proc. of 12th ACM Symposium on Operation System Principles Reducing risks from poorly chosen keys T.M.A.Lomas;L.Gong;J.H.Saltzer;R.M Needham
- Proc. of 2nd AES Candidate Conference Resistance against implementation attacks : a comparative study of the AES propo sals J.Daemen;V.Rijmen