참고문헌
- C. Paar, J. Pelzl, and B. Preneel, Understanding Cryptography : A Textbook for Students and Practitioners, Korean Publishing Company Green, 2013. Seoul.
- R.E. Smith, Authentification from Passwords to Publish Keys, Addison-Wesley, 2012. Boston.
- M. Lee, H. Yeom, Y. Song, and J. Kim., Introduction to Information Protection, Korean Publishing Company Hongreung, 2005. Seoul.
- H. Seo, “Implementing Software Passwords over the Internet,” Communications of the Korean Institute of Information Scientists and Engineers, Vol. 35, No. 1, pp. 8-15, 2017.
- N. Ferguson and B. Schneier, Practical Cryptography, Korean Publishing Company SciTech Media, 2004. GoYang.
- B.H. Kim, T.K. Kim, and J.H. Kim, "FPGA Implementation of the AES Cipher Algorithm by Using Pipelining," KIISE Transactions on Computing Practices, Vol. 8, No. 6, pp. 717-726, 2002.
- H.W. Nam, D.H. Kim, and N.S. Park, "Implementation of ARIA Encryption Algorithm based on WebCL," Proceeding of Annual Meeting and Proceedings of Korea Computer Conference, Vol. 42, No. 2, pp. 49-51, 2015.
- M.B. Song, M.K. Ko, and Y.M. Jung, "Hardware Using of the SEED Algorithm," Proceedings of Korea Information Processing society, Vol. 7, No. 2, pp. 1453-1456, 2000.
- K.H. Song, H.C. Kang, and J.C. Sung, "An Efficient New Format Preserving Encryption Algorithm to Encrypt the Personal Information," Journal of the Korea Institute of Information Security and Cryptology, Vol. 24, No. 4, pp. 753-763, 2014. https://doi.org/10.13089/JKIISC.2014.24.4.753
- S.J. Jang, "Design of the File Security Function Using Encryption Algorithm in the Windows Operating System," The Korea Institute of Information and Communication Engineering, Vol. 17, No. 3, pp. 612-618, 2013. https://doi.org/10.6109/jkiice.2013.17.3.612
- T.H. Kim, M.Y. Jang, and J.W. Chang, "Hilbert-Curve Based Multi-Dimensional Indexing Key Generation Scheme and Query Processing Algorithm for Encrypted Databases," Journal of Korea Multimedia Society, Vol. 17, No. 10, pp. 1182-1188, 2014. https://doi.org/10.9717/kmms.2014.17.10.1182
- M. Yoon, A.R. Cho, and J.W. Chang, "A Bitmap Encryption Scheme and a GPU-based Query Processing Algorithm for Spatial Database Outsourcing," Journal of Korean Institute of Information Scientists and Engineers, Vol. 41, No. 2, pp. 71-82, 2014.
- K.R. Lee, I.S. You, and K.B. Yim, "An Analysis of Agility of the Cryptography API Next Generation in Microsoft : Based on Implementation Example of Applying Cryptography Algorithm HAS-160 in South Korea," Journal of the Korea Institute of Information Security and Cryptology, Vol. 25, No. 6, pp. 1327-1339, 2015. https://doi.org/10.13089/JKIISC.2015.25.6.1327
- K.R. Lee, I.S. You, and K.B. Yim, "An Analysis of a Structure and Implementation of Error-Detection Tool of Cryptography API-Next Generation in Microsoft," Journal of the Korea Institute of Information Security and Cryptology, Vol. 26, No. 1, pp. 153-168, 2016. https://doi.org/10.13089/JKIISC.2016.26.1.153
- T.W. Kwon, H.M. Kim, and S.H. Hong, "SEED and ARIA Algorithm Design Methods Using GEZEL," Journal of the Korea Institute of Information Security and Cryptology, Vol. 24, No. 1, pp. 15-29, 2014. https://doi.org/10.13089/JKIISC.2014.24.1.15
- B.H. Jeon, S.H. Shin, K.H. Jung, J.H. Lee, and K.Y. Yoo, "Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images," Journal of Korea Multimedia Society, Vol. 18, No. 11, pp. 1332-1341, 2015. https://doi.org/10.9717/kmms.2015.18.11.1332