1 |
Hoffstein, J., Pipher, J. and Silverman, J. H. (2008). An introduction to mathematical cryptography, Springer, New York.
|
2 |
Shannon, C. E. (1949). Communication theory of secrecy system. The Bell Laps Technical Journal, 28, 656-715.
|
3 |
Kahn, D. (1996). The codebreakers : The story of secret writing, Scribner's, New York.
|
4 |
Kim, D. (2012). On the development of DES round key generator based on Excel Macro. Journal of the Korean Data & Information Science Society, 23, 1203-1212.
과학기술학회마을
DOI
ScienceOn
|
5 |
Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method of obtaining digital signature and public-key cryptosystem. Communication of the Association for Computing Machinery, 21, 120-126.
DOI
ScienceOn
|
6 |
Trappe, W. and Washington, L. (2006). Introduction to cryptography and coding theory, Prentice Hall, Upper Saddle River.
|
7 |
Forouzan, B. A. (2008). Introduction to cryptography and network security, The McGraw-Hill Companies, New York.
|
8 |
Choi, H. S. and Ha, J. (2011a). Development of process-oriented education tool for Statistics with Excel Macro. Journal of the Korean Data & Information Science Society, 22, 643-650.
과학기술학회마을
|
9 |
Choi, H. S. and Ha, J. (2011b). Development of Bayes' rule education tool with Excel Macro. Journal of the Korean Data & Information Science Society, 23, 905-912.
|
10 |
Choi, H. S. and Kim, T. Y. (2010). A study on sampling using the function of excel. Journal of the Korean Data & Information Science Society, 21, 481-491.
과학기술학회마을
|