1 |
Taewoong Seo, Myunggyun Jeong, and Changsoo Kim, "A Study on Vulnerabilities of Monitoring and Control System based on IT Convergence Technology," The 6th International Conference on Multi-media Information Technology and Applications, pp. 245-247, 2010.
|
2 |
유지영, 이재일, "신규 IT 서비스 도입 확산을 위한 정보보호," 한국정보처리학회 정보처리학회지, 제17권, 제2호, pp. 10-17, 2010.
|
3 |
서태웅, 이성렬, 배병철, 윤이중, 김창수, "CCTV 보안관제 취약성 및 성능 분석", 한국멀티미디어학회논문지, Vol. 15, No. 1, 2012, pp. 93-100.
DOI
|
4 |
William Stallings, "Cryptography and Network Security Principles and Practices," 2006.
|
5 |
Neal Koblitz, "A course in Number Theory and Cryptography", 1994.
|
6 |
한국인터넷진흥원, "암호 알고리즘 및 키 길이 이용 안내서," 2013.
|
7 |
Christof paar and Jan Pelzl, "Unnderstanding Cryptography a Textbook for Students and Practitioners", 2009.
|
8 |
Alfred Menezes, Paul C.van and Scott Vanstone, "HANDBOOK of APPLIED CRYPTOGRAPHY," June, 1996.
|
9 |
Neal Koblitz, "A course in Number Theory and Cryptography", 1994.
|
10 |
Carlisle Adams and Steve Lloyd, Effective way for security PKI, Seoul, Infobook, 2003.
|
11 |
Seok-ho Kim, "Comparison and analysis on efficiency of scalar multiplication for Elliptic Curve Cryptosystem," M. S. dissertation, Korea Maritime and Ocean University graduate school, Busan, 2003.
|
12 |
Yeong-ja Kim, "Design and implementation of a security messenger system using elliptic curve cryptosystem," M. S. dissertation, Chung-Ang University Information graduate school, Seoul, 2004.
|
13 |
IETF Std. RFC 6979, Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA), IETF, T. Pornin, August 2013.
|
14 |
https://www.keylength.com/en/4/, June 10, 2018.
|
15 |
Song-hwan Lim, "The efficiency analysis of ECDSA using improved element algorithm," M. S. dissertation, Dongguk University Graduate School of International Affairs & Information, Seoul, 2000.
|
16 |
IETF Std. RFC 4050, Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures, IETF, S. Blake-Wilson, G. Karlinger, T. Kobayashi, Y. Wang, April 2005.
|
17 |
William Stallings, "Cryptography and Network Security Principles and Practices", 2006.
|
18 |
정도, "NAF와 Look-Up 테이블을 이용한타원곡선 스칼라 곱셈 가속화", 한밭대학교, 석사학위논문, 2016.
|
19 |
K. J. Ha, C. H. Seo, D. Y. Kim, "Design of validation System for a Crypto-Algorithm Implementation," Journal of the Korea
|
20 |
https://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication#cite_note-guide-1
|
21 |
한종욱, 조현숙, "영상보안시스템 기술 동향", 한국정보보호학회논문지, Vol. 19, No. 5, 2009, pp. 29-37.
|