참고문헌
- W. Diffie and M. Hellman, 'New Directions in Cryptography,' IEEE Transactions on Information Theory, Vol. IT-22, pp. 644-654, 1976
- T. EIGamal, 'A Public-Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms,' IEEE Transaction on Information Theory, Vol. IT-31, pp. 469-472, 1985
- N. Koblitz, 'Elliptic Curve Cryptosystems,' Mathematics of Computation, Vol. 48, No. 177, pp. 203-209, 1987 https://doi.org/10.2307/2007884
- H. W. Lenstra, Jr., 'Integer Programming with a Fixed Number of Variables,' Math. of Operations Research, Vol. 8, No.4, pp. 538-548, 1983
- R. J. McEliece, 'A Public-Key Cryptosystem Based on Algebraic Coding Theory,' Deep Space Network Progress Report, pp. 42-44, 1978
- R. C. Merkle and M. E. Eellman, 'Hiding Information and Signature in Trap-door Knapsacks,' IEEE Transactions on Information Theory, Vol. IT-24, pp. 525-530, 1978 https://doi.org/10.1109/TIT.1978.1055927
- M. O. Rabin, 'Digital Signatures and Public- Key Functions as Intractable as Factorization,' MIT Laboratory for Computer Science, Technical Report, 1979
- R. L. Hivest, A. Shamir, and L. Adleman, 'A Method for Obtaining Digital Signatures and Public-key Cryptosystems,' Comm. ACM, Vol. 21, pp. 120-126, 1978 https://doi.org/10.1145/359340.359342
- S. Sahni, 'Computationally Related Problems,' SIAM J. Comput., Vol. 3, pp. 262-279, 1974 https://doi.org/10.1137/0203021
- A. Shamir, 'On the Cryptocomplexity of Knapsack System,' Proc. 11th ACM Symp. on Theory of Computing, pp. 118-129, 1979 https://doi.org/10.1145/800135.804405
- A. Shamir, 'A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem,' Proceedings of the 23rd Annual Symposium on the Foundations of Computer Science(IEEE), pp. 145-152, 1982
- Howard Anton, Elementary Linear Algebra, Anton Textbooks, 1987
- Michael R. Garey and David S. Johnson, Computers and Intractability, Freeman, 1979
- Charles P. Pfleeger, Security in Computing, Prentice-Hall, 1997
- Kenneth H. Rogen, Elementary Number Theory and Its Application, Addison-Wesley,1993
- Bruce Schneier, Applied Cryptography, Wiley, 1996