1 |
Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method of obtaining digital signature and public-key cryptosystem. Communication of the Association for Computing Machinery, 21, 120-126.
DOI
|
2 |
Trappe, W. and Washington, L. (2006). Introduction to cryptography with coding theory, Prentice Hall, Upper Saddle River.
|
3 |
Blake, I., Seroussi, G. and Smart, N. (1999). Elliptic curves in Cryptography, London Mathematical Society, lecture note series 265, Cambridge University Press, Cambridge.
|
4 |
Kim, D. (2015). Computer intensive method for extended euclidean algorithm. Journal of the Korean Data & Information Science Society, 25, 1467-1474.
|
5 |
ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469-472.
DOI
|
6 |
Forouzan, B. A. (2008). Introduction to cryptography and network security, The McGraw-Hill Companies, New York.
|
7 |
Kim, D. (2012). On the development of DES round key generator based on Excel Macro. Journal of the Korean Data & Information Science Society, 23, 1203-1212.
DOI
|
8 |
Korea Electronic Certification Authority (Crosscert). http://www.crosscert.com.
|
9 |
Korea Financial Telecommnications & Cleanings Institute (Yessign, KFTC). http://www.yessign.com.
|
10 |
Korea Information Certificat Authority (Signgate). http://signgate.com.
|
11 |
Korea Internet & Security Agency (2011a). Development of improved certificate encryption system, Korea Internet & Security Agency, Seoul.
|
12 |
Korea Internet & Security Agency (2011b). Development of improved korean digital signature algorithem and standard, Korea Internet & Security Agency, Seoul.
|
13 |
Korea Trade Nnetwork (Tradesign). http://www.tradesign.net/.
|
14 |
Koscom (Signkorea). http://www.signkorea.com.
|
15 |
Rivest, R. L. (1992). The MD4 message digest algorithm, RFC 1320, MIT and RSA Data Security, Cambridge.
|