참고문헌
- 한종욱, 조현숙, "영상보안시스템 기술 동향", 한국정보보호학회논문지, Vol. 19, No. 5, 2009, pp. 29-37.
- Taewoong Seo, Myunggyun Jeong, and Changsoo Kim, "A Study on Vulnerabilities of Monitoring and Control System based on IT Convergence Technology," The 6th International Conference on Multi-media Information Technology and Applications, pp. 245-247, 2010.
- 유지영, 이재일, "신규 IT 서비스 도입 확산을 위한 정보보호," 한국정보처리학회 정보처리학회지, 제17권, 제2호, pp. 10-17, 2010.
- 서태웅, 이성렬, 배병철, 윤이중, 김창수, "CCTV 보안관제 취약성 및 성능 분석", 한국멀티미디어학회논문지, Vol. 15, No. 1, 2012, pp. 93-100. https://doi.org/10.9717/kmms.2012.15.1.093
- William Stallings, "Cryptography and Network Security Principles and Practices," 2006.
- Neal Koblitz, "A course in Number Theory and Cryptography", 1994.
- 한국인터넷진흥원, "암호 알고리즘 및 키 길이 이용 안내서," 2013.
- Christof paar and Jan Pelzl, "Unnderstanding Cryptography a Textbook for Students and Practitioners", 2009.
- Alfred Menezes, Paul C.van and Scott Vanstone, "HANDBOOK of APPLIED CRYPTOGRAPHY," June, 1996.
- Neal Koblitz, "A course in Number Theory and Cryptography", 1994.
- Carlisle Adams and Steve Lloyd, Effective way for security PKI, Seoul, Infobook, 2003.
- Seok-ho Kim, "Comparison and analysis on efficiency of scalar multiplication for Elliptic Curve Cryptosystem," M. S. dissertation, Korea Maritime and Ocean University graduate school, Busan, 2003.
- Yeong-ja Kim, "Design and implementation of a security messenger system using elliptic curve cryptosystem," M. S. dissertation, Chung-Ang University Information graduate school, Seoul, 2004.
- IETF Std. RFC 6979, Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA), IETF, T. Pornin, August 2013.
- Song-hwan Lim, "The efficiency analysis of ECDSA using improved element algorithm," M. S. dissertation, Dongguk University Graduate School of International Affairs & Information, Seoul, 2000.
- IETF Std. RFC 4050, Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures, IETF, S. Blake-Wilson, G. Karlinger, T. Kobayashi, Y. Wang, April 2005.
- William Stallings, "Cryptography and Network Security Principles and Practices", 2006.
- 정도, "NAF와 Look-Up 테이블을 이용한타원곡선 스칼라 곱셈 가속화", 한밭대학교, 석사학위논문, 2016.
- K. J. Ha, C. H. Seo, D. Y. Kim, "Design of validation System for a Crypto-Algorithm Implementation," Journal of the Korea
- https://www.keylength.com/en/4/, June 10, 2018.
- https://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication#cite_note-guide-1