1 |
W. Stallings, Cryptography and Network Security, Prentice Hall, 1998.
|
2 |
B. Schneier, Applied Cryptography : Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., New York, USA, 1994.
|
3 |
D. R. Stinson, Cryptography Theory and Practice, Chapman & Hall/CRC, 2002.
|
4 |
H. Miyano, AMethod to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis, Abstracts of ASIACRYPT91, 1991.
|
5 |
서광석, 김창한, 암호학과 대수학, 북스힐, 1999.
|
6 |
T. Siegenthaler, "Decrypting a Class of Stream Ciphers Using Ciphertext Only," IEEE Trans. on Computer, Vol. C-34, No. 1, pp. 81-85, Jan. 1985.
DOI
|
7 |
R. Rueppel, "Stream Ciphers," Contemporary Cryptology: The science of Infor. Integrity, New York, IEEE Pres, pp. 65-134, 1991.
|
8 |
이병관, 전자상거래 보안, 남두도서, 2002.
|