1 |
Microsoft, "Using Cryptography," Microsoft Developer Network, http://msdn.microsoft.com/en-us/library/aa388162(VS.85).aspx
|
2 |
Microsoft, "Cryptograpgy API: Next Gene ration," Microsoft Developer Network, http://msdn.microsoft.com/en-us/libr ary/aa376210(VS.85).aspx
|
3 |
Nick Wienholt, "Windows Cryptography API: Next Generation(CNG)," Codeguru, http://www.codeguru.com/columns/kate/article.php/c13813, 2007
|
4 |
Quartz, "Next Generation of Cryptograpg y for Microsoft Windows Vista," Codeproject, http://www.codeproject.com/KB/vista-security/CryptographyNextGenDemo.aspx, 2007
|
5 |
Jaecheon Byun, Kyungroul Lee, Wansoo Kim, Ilsun You, and Kangbin Yim, "Analysis of agility on a new crypto framework CNG," KSII-A'10, pp. 77-78, Oct. 2010
|
6 |
K. Lee, Y. Lee, J. Park, I. You, and K. Yim, "Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)," In Proceedings of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 709-713, Jul. 2013
|
7 |
Kyungroul Lee, Ilsun You, and Kangbin Yim, "Vulnerability Analysis on the CNG Crypto Library," In Proceedings of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing(IMIS), Jul. 2015
|
8 |
Hyoungshick Kim, Junho Huh, and Ross Anderson, "On the Security of Internet Banking in South Korea," CS-RR-10-01, Computer Science Group, Oxford University Computing Laboratory, 2011
|