1. Jo, S.-J., Kwon, Y.-J.: A hardware implementation of the underlying field arithmetic processor based on optimized unit operation components for elliptic curve cryptosystems. J. Korean Inst. Inform. Sci. Eng. Comput. Pract. 8(1), 88–95 (2002)
2. Chung, B., Lee, S., Hong, S.-M., Yoon, H.: Fast scalar multiplication algorithm on elliptic curve over optimal extension fields. J. Korea Inst. Inform. Secur. Cryptol. 15(3), 65–76 (2005)
3. Hwang, S., Lee, S.: An efficient digital contents cryptosystem using elliptic curve cryptography algorithm. J. Inform. Technol. Appl. Manag. 11(4), 25–33 (2004)
4. Lee, K.B., Park, T.H., Lim, J.I.: Security threats and countermeasures according to the environmental changes of smart work. J. Digit. Converg. 9(4), 29–40 (2011)
5. Lee, H.-Y., Kim, J.-G.: Quality evaluation model for security of DRM Software. J. Digit. Policy Manag. 11(5), 1–11 (2013)