±³°ú¸ñ¸í: ¾ÏÈ£¿Í Á¤º¸º¸¾È Ư°­ (ICE824) ±³¼ö¸í: ±è±¤Á¶ ÇÐÁ¡/½Ã¼ö: 3/3

1. °­ÀÇ°³¿ä

2. ±³Àç(µµ¼­¸í, ÀúÀÚ, ÃâÆÇ»ç) ¹× Âü°í¼­             - A.Menezes, Elliptic Curve Public Key Cryptosystem,  Kluwer Pub., 1993
            - R. Lidl and H. Niederreiter, Introduction to Finite Fields and Their Applications,
                                                        Cambridge University Press, 1996.
            - Advances in Cryptology -Crypto, Eurocrypt, Asiacrypt,
                                    Lecture Notes in Computer Science, Springer-VerlagÀÇ °ü·Ã ³í¹®
            - Handouts

3. ½ÃÇè ¹× Æò°¡

4. °­Àdz»¿ë
 

        Week
 °­ÀÇ ³»¿ë  ºñ °í
        1ÁÖ
     (6.28.~7.2)
1. Introduction, Project Assignment
2. Elementary Number Theory
        2ÁÖ
    (7.5.~7.9)
3. Polynomial Basis
4. Optimal Normal Basis
        3ÁÖ
    (7.12.~7.16)
5. Elliptic Curves (I)
6. Elliptic Curves (II)
         4ÁÖ
    (7.19.~7.23)
Áß°£½ÃÇè Written
          5ÁÖ
    (7.26.~7.30)
7. Simple Protocols
8. Elliptic Curve Encryption
         6ÁÖ
    (8.2.~8.7)
9. Advanced Protocols
10. Advanced Protocols
         7ÁÖ
    (8.9.~8.13)
11. Recent Topics(I)
12. Recent Topics(II)
Take Home
        8ÁÖ
    (8.16.~8.20)
±â¸»½ÃÇè

         (Note) The contents of lecture are subject to change according to the level of class.
 

5. °­ÀÇ OHP ¹× Term Projects

 (ÁÖÀÇ : Á¢±Ù ÅëÁ¦°¡ µÇ¾î ÀÖÀ¸´Ï ¾çÇØ ¹Ù¶÷.)