컴퓨터 보안

1.Chapter 1. Security Concepts

post-thumbnail

2.Chapter 2. Introduction to Number Theory

post-thumbnail

3.Chapter 3. Classical Encryption Techniques

post-thumbnail

4.Chapter 4. Block Ciphers and the Data Encryption Standard

post-thumbnail

5.Chapter 5. Finite Field

post-thumbnail

6.Chapter 6. Advanced Encryption Standard

post-thumbnail

7.Chapter 7. Block Cipher Operation

post-thumbnail

8.Chapter 8. Random Bit Generation and Stream Ciphers

post-thumbnail

9.Chapter 9. Public Key Cryptography and RSA

post-thumbnail

10.Chapter 10. Other Public-Key Cryptosystems

post-thumbnail

11.Chapter 11. Cryptographic Hash Function

post-thumbnail

12.Chapter 12. Message Authentication Codes

post-thumbnail

13.Chapter 13. Digital Signatures

post-thumbnail

14.Chapter 14. Key Management and Distribution

post-thumbnail