21 research outputs found

    ๋‚ญ๋งŒ์  ๋ฌธํ™” ๋น„ํ‰์˜ ์žฌ๋ฐœ๊ฒฌ-Shelley์˜ A Defence of Poetry๋ฅผ ์ค‘์‹ฌ์œผ๋กœ

    Get PDF
    ใ€”1ใ€•์ด๊ธ€ํŠผ(Terry Eagleton)์€ Literary Theory(1983)์—์„œ ์˜๊ตญ ๋‚ญ๋งŒ๊ธฐ์— ์ˆœ๋ฌธํ•™ ๊ฐœ๋…์ด ๋“ฑ์žฅํ–ˆ๋‹ค๊ณ  ์ฃผ์žฅํ•˜๋ฉด์„œ ์ด ๋•Œ๋ถ€ํ„ฐ ๋ฌธํ•™์ด ์ƒ์ƒ์ ์ธ ๊ฒƒ๊ณผ ๋™์˜์–ด๋กœ ์“ฐ์ด๊ธฐ ์‹œ์ž‘ํ–ˆ๋‹ค๊ณ  ๋งํ•œ๋‹ค. (18) ๊ทธ๋Š” ์ƒ์ƒ์ ์ธ ๊ฒƒ, ๊ณง ์กด์žฌํ•˜์ง€ ์•Š๋Š” ๊ฒƒ์— ๊ด€ํ•ด ์“ฐ๋Š” ๊ฒƒ์ด ๋”์šฑ ๊ฐ€์น˜ ์žˆ๋Š” ๊ฒƒ์œผ๋กœ ๊ฐ„์ฃผ๋˜๋Š” ํ’ํ† ๊ฐ€ ์ž๋ฆฌ์žก๊ฒŒ ๋˜๋Š” ์‹œ์ ์ด ์ด ๋•Œ๋ผ๊ณ  ์ฃผ์žฅํ•˜๋ฉด์„œ ์ด๋ฅผ ์ด๋ฐ์˜ฌ๋กœ๊ธฐ์ด๋˜ ํƒˆ ์ด๋ฐ์˜ฌ๋กœ๊ธฐ๋ฅผ ํ‘œ๋ฐฉํ•˜๋Š” ์ˆœ๋ฌธํ•™ ๊ฐœ๋…์œผ๋กœ ๊ทœ์ •ํ•œ๋‹ค. ํ•œํŽธ ๋งฅ๊ฐ„(Jerome J. McGann)์€ The Romantic Ideology(1983)์—์„œ ๋‚ญ๋งŒ๊ธฐ ์ž‘ํ’ˆ ์ „๋ฐ˜์— ์—ญ์‚ฌ์— ๋Œ€ํ•œ ์น˜ํ™˜๊ณผ ์ด์ƒํ™”์˜ ๋“œ๋ผ๋งˆ๊ฐ€ ๋‚˜ํƒ€๋‚œ๋‹ค๊ณ  ์ฃผ์žฅํ•˜๋ฉด์„œ ๋‚ญ๋งŒ์ฃผ์˜ ๋น„ํ‰์ด ์ด๋Ÿฌํ•œ ์ดˆ์›”์ ์ธ ๋‚ญ๋งŒ์  ์ด๋ฐ์˜ฌ๋กœ๊ธฐ๋ฅผ ์žฌ์ƒ์‚ฐํ•ด ์™”๋‹ค๊ณ  ๋น„ํŒํ•œ๋‹ค.(1-3) ์ด๊ธ€ํŠผ๊ณผ ๋งฅ๊ฐ„์˜ ๊ณตํ†ต ์ „์ œ๋Š” ๋‚ญ๋งŒ๊ธฐ ๋ฌธํ•™์ด ์‚ฐ์—…ํ˜๋ช…์ด ์ „๊ฐœ๋จ์— ๋”ฐ๋ผ, ํ˜น์€ ํ”„๋ž‘์Šค ํ˜๋ช…์˜ ์ขŒ์ ˆ ์ดํ›„, ํ˜„์‹ค๊ณผ ์—ญ์‚ฌ๋กœ๋ถ€ํ„ฐ ๋ฉ€์–ด์ ธ ์ดˆ์›” ์ง€ํ–ฅ์˜ ์ด๋ฐ์˜ฌ๋กœ๊ธฐ์ ์ธ ์„ฑ๊ฒฉ์„ ๋ ๊ฒŒ ๋œ๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ์ด๋Ÿฐ ์ „์ œ ํ•˜์—์„œ๋ผ๋ฉด ๋‚ญ๋งŒ์ฃผ์˜ ์‹œ์ธ์€ ํƒ€๋ฝํ•œ ํ˜„์‹ค์—์„œ ์ž์‹ ์„ ๋ถ„๋ฆฌ์‹œํ‚จ ์ฑ„ ์ดˆ์›”์ ์ธ ์ง„์‹ค์„ ์ถ”๊ตฌํ•˜๋Š” ์ธ๋ฌผํ˜•์ด๋ผ๋Š” ๊ฒฐ๋ก ์— ์‰ฝ๊ฒŒ ์ด๋ฅผ ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋‚ญ๋งŒ์ฃผ์˜ ๋น„ํ‰์ด ๋‚ญ๋งŒ์  ์ด๋ฐ์˜ฌ๋กœ๊ธฐ๋ฅผ ์žฌ์ƒ์‚ฐํ•œ๋‹ค๋Š” ํ˜์˜๋ฅผ ๋ถ€์ •ํ•  ์ˆ˜๋งŒ์€ ์—†์ง€๋งŒ, ์ด๋Ÿฌํ•œ ์ „์ œ๋ฅผ ๋‚ญ๋งŒ๊ธฐ ์‹œ๋‚˜ ์‹œ์ธ์— ์ ์šฉํ•˜์—ฌ ์ดˆ์›”์ ์ธ ๋ฉด๋ชจ๋งŒ์„ ์ฝ์–ด๋‚ด๋Š” ๊ฒƒ์€ ๋ฐ”๋žŒ์งํ•˜์ง€ ์•Š๋‹ค๊ณ  ๋ณธ๋‹ค. ์‹ค์ œ๋กœ ๋‚ญ๋งŒ๊ธฐ ์‹œ์ธ๋“ค์€ ์‹œ๋‚˜ ์‹œ์ธ์˜ ์‚ฌํšŒ์  ๊ธฐ๋Šฅ์— ๋Œ€ํ•ด ์ง„์ง€ํ•˜๊ฒŒ ๊ณ ๋ฏผํ•œ ๋ฐ” ์žˆ๋Š”๋ฐ, ๊ทธ๋“ค์˜ ๋…ผ์˜๊ฐ€ ๊ฐ–๋Š” ํ˜„์žฌ์  ์˜์˜๋ฅผ ์งš์–ด๋ณด๋Š” ๊ฒƒ์ด ๋” ์ƒ์‚ฐ์ ์ธ ๋ฐฉํ–ฅ์ด๋ผ๋Š” ๊ฒƒ์ด ํ•„์ž์˜ ์ƒ๊ฐ์ด๋‹ค. ์ด ์— ์ด ๊ธ€์—์„œ๋Š” ์…ธ๋ฆฌ(Percy Bysshe Shelley)์˜ A Defence of Poetry(์ดํ•˜ Defence)๋ฅผ ์›Œ์ฆˆ์›Œ์Šค(William Wordsworth)์˜ Lyrical Ballads ์„œ๋ฌธ ๋“ฑ๊ณผ ํ•จ๊ป˜ ์ฝ์–ด๋ณด๋ฉด์„œ ์ด๋“ค ๋‚ญ๋งŒ๊ธฐ ์ž‘๊ฐ€๋“ค์ด ๋งํ•˜๋Š” ์‹œ์ธ๊ณผ ์‹œ, ๊ทธ๋ฆฌ๊ณ  ์ƒ์ƒ๋ ฅ์ด ๋ฌด์—‡์ธ์ง€ ๊ทœ๋ช…ํ•ด ๋ณด๊ณ ์žํ•œ๋‹ค

    ๋™ํ˜•์•”ํ˜ธ๋ฅผ ์ด์šฉํ•œ ์•ˆ์ „ํ•œ ์—ฐ์‚ฐ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› ์ž์—ฐ๊ณผํ•™๋Œ€ํ•™ ์ˆ˜๋ฆฌ๊ณผํ•™๋ถ€, 2017. 8. ์ฒœ์ •ํฌ.(Fully) Homomorphic encryption (FHE, HE) is one of the natural and powerful tools for ensuring privacy of sensitive data since it enables to handle ciphertexts without decryption and thus allow complicated computations on the encrypted data. Due to this property, homomorphic encryption can be applied to many scenarios in the real life, especially, databases. Until now, most of homomorphic encryption schemes restrict a plaintext space as an integer and thus numeric data should be represented by integers. However, there are many applications working in the real number system that operate on very sensitive information, for example, user's location information and patient's medical information. Usually, these information can be represented by the real numbers and thus it should be encoded into the integers. The general decimal representation requires \emph{quite large} plaintext space and a polynomial representation also requires a \emph{higher degree} of polynomials, which has a bad influence to the performance of FHE scheme. In this thesis, we employ continued fraction to represent real numbers and to alleviate this inefficiency. With continued fraction, real numbers can be represented by a set of \emph{quite small} integers and it makes performance improvement than other encoding techniques. Moreover, we can develop a set of algorithms and circuits using continued fraction for the following operations: homomorphic integer division, equality circuit and comparison circuits over the real numbers. First, we suggest an algorithm for homomorphic integer division using continued fraction and restoring division algorithm. Since the integer is not closed under the division, the most of homomorphic encryption schemes cannot support the division, however, we suggest a transformation from rational numbers to continued fractions being encrypted and it allows to divide two encrypted integers. Further, we can evaluate a polynomial whose coefficients are in the rational numbers. Second, we describe comparison circuits over the encrypted real numbers including equality circuits. Since comparing two continued fraction is also easy as much as comparing two decimal numbers, we can build \emph{more efficient} comparison circuits while maintaining the small message space utilizing the homomorphic comparison circuits over the integers. With our efficient comparison circuits, we can apply to the real-type database which indicates each numeric data is represented by the real numbers and our circuits enable to sorting and private database queries such as retrieval queries and aggregate queries, which makes database useful. Finally, we present a proof of correct decryption in a single party homomorphic encryption. Although a server evaluates some polynomial being encrypted, the server cannot know any information about the result. Thus, if a server is interested in the result, a data owner returns the decryption result. The problem is that the server should believe the data owner at this time because the data owner can manipulate the decryption result and the server cannot recognize it. We prevent this situation by utilizing one-time message authentication code. Moreover, this technique can be applied to many scenarios, especially, a protocol for authentication of biometrics.1 Introduction 1 1.1 Overview and Contributions 2 1.1.1 Homomorphic Integer Division 2 1.1.2 Homomorphic Comparisons over the Real Numbers 4 1.1.3 Integrity of Homomorphic Evaluations 6 2 Preliminaries 9 2.1 Notation 9 2.2 Continued Fraction 9 2.3 Homomorphic Encryption 14 2.4 Homomorphic Comparisons over the Integers 16 2.4.1 Equality Circuit over the Integers 16 2.4.2 Greater-Than and Less-Than Circuits over the Integers 17 2.5 Fuzzy Extractor 18 2.5.1 Reusable Fuzzy Extractor 19 3 Algorithms for Homomorphic Integer Division 22 3.1 Overview and RelatedWorks 22 3.2 Restoring Division Algorithm 24 3.3 Homomorphic Integer Division 27 3.3.1 Algorithm 28 3.3.2 Efficiency 29 3.4 Homomorphic Arithmetics over the Polynomials 31 3.4.1 Description 31 4 Algorithms for Homomorphic Comparisons over the Real Numbers 33 4.1 Overview and Related Works 33 4.2 Comparing Two Continued Fractions 37 4.2.1 Our Idea: Comparing Two CFs in the Clear 37 4.3 EqualityCircuit 39 4.3.1 Construction 40 4.3.2 Complexity 40 4.4 Greater-Than and Less-Than 41 4.4.1 Construction 41 4.4.2 Complexity 42 4.5 Implementation 44 4.5.1 Environment 44 4.5.2 Scheme Parameters 45 4.5.3 Experimental Results and Comparisons 46 4.6 Applications to Database Service 48 4.6.1 Sorting 48 4.6.2 Private Database Queries 49 5 Algorithms for Integrity-based Homomorphic Evaluations 54 5.1 Overview and RelatedWorks 54 5.2 Models and Settings 57 5.2.1 System Model and Participants 57 5.2.2 Threat Model 57 5.2.3 Security Model 58 5.3 Integrity of Homomorphic Evaluations 59 5.3.1 Message Authentication Code 59 5.3.2 Protocol Constructions 60 5.3.3 Security Proof 63 5.4 Application to Biometric Authentication 72 5.4.1 How Ghostshell Works 72 5.4.2 Analysis 73 5.4.3 Optimization 74 5.5 Implementation 79 5.5.1 Micro-experiments 80 5.6 Reusable Fuzzy Extractor for the Hamming Distance 83 5.6.1 Insecurity of Previous Reusable Fuzzy Extractor 84 5.6.2 Revising Reusable Fuzzy Extractor 85 5.6.3 Revising Idea 86 5.6.4 Our Construction 87 5.6.5 Analyisis 88 6 Conclusion 90 Abstract (in Korean) 100Docto

    ํ•œ๊ตญ ๋…ธ์ธ์—์„œ์˜ ์ƒˆ๋กœ์šด ๋…ธ์‡  ์ฒ™๋„ ๊ฐœ๋ฐœ: ๊ธฐ์กด์˜ ํ˜•์งˆ ๋…ธ์‡  ๋ชจ๋ธ๊ณผ์˜ ๋น„๊ต

    No full text
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์˜ํ•™๊ณผ, 2014. 2. ๊น€์ฒ ํ˜ธ.Background: Frailty is related to adverse outcomes in the elderly. However, current status and clinical significance of frailty has not been evaluated for the Korean elderly population. We aimed to investigate the usefulness of established frailty criteria for community-dwelling Korean elderly. We also tried to develop and validate a new frailty index based on a multidimensional model. Methods: We studied 693 participants of the Korean Longitudinal Study on Health and Aging (KLoSHA). We developed a new frailty index (KLoSHA Frailty Index, KFI) and compared predictability of it with the established frailty indexes from the Cardiovascular Health Study (CHS) and Study of Osteoporotic Fracture (SOF). Mortality, hospitalization, and functional decline were evaluated. Results: The prevalence of frailty was 9.2% (SOF index), 13.2% (CHS index), and 15.6% (KFI). Frailty status by CHS and KFI correlated with each other, but SOF did not correlate with KFI. During the follow-up period (5.6 ยฑ 0.9 years), 97 participants (14.0%) died. Frailty defined by KFI predicted mortality better than CHS index (c-index: 0.713 and 0.596, respectivelyp<0.001, better for KFI). In contrast, frailty by SOF index was not related to mortality. The KFI showed better predictability for following functional decline than CHS index (area under the receiver-operating characteristic curve was 0.937 for KFI and 0.704 for CHS index, p=0.001). However, the SOF index could not predict subsequent functional decline. Frailty by the KFI (OR=2.13, 95% CI 1.04-4.35) and CHS index (OR=2.24, 95% CI 1.05-4.76) were significantly associated with hospitalization. In contrast, frailty by the SOF index was not significantly correlated with hospitalization (OR=1.43, 95% CI 0.68-3.01). Conclusions: Prevalence of frailty was higher in Korea compared to previous studies in other countries. A novel frailty index (KFI), which includes domains of comprehensive geriatric assessment, is a valid criterion for the evaluation and prediction of frailty in the Korean elderly population.Abstract i Table of Contents iii List of tables and figures iv Introduction 1 Materials and Methods 4 Results 11 Discussion 25 References 29 Abstract (Korean) 31Maste

    The Gothic in the 1790s: from Pamela to Northanger Abbey

    No full text
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์˜์–ด์˜๋ฌธํ•™๊ณผ, 2012. 8. ์œ ๋ช…์ˆ™.์™€ํŠธ(Ian Watt)๊ฐ€ ใ€Ž์†Œ์„ค์˜ ๋ฐœํฅใ€(The Rise of the Novel, 1957)์„ ํ†ตํ•ด ํ™•๋ฆฝํ•œ ์˜๊ตญ์†Œ์„ค์‚ฌ๋ฅผ ๋น„ํŒํ•˜๋ฉด์„œ ์†Œ์„ค์‚ฌ ๋‹ค์‹œ ์“ฐ๊ธฐ๋ฅผ ์‹œ๋„ํ•œ ๋Œ€ํ‘œ์ ์ธ ๋น„ํ‰๊ฐ€๋กœ๋Š” ๋งฅํ‚ค์–ธ(Michael McKeon)๊ณผ ์•”์ŠคํŠธ๋กฑ(Nancy Armstrong)์„ ๋“ค ์ˆ˜ ์žˆ๋‹ค. ๋งฅํ‚ค์–ธ๊ณผ ์•”์ŠคํŠธ๋กฑ์˜ ์—ฐ๊ตฌ๋ฅผ ํ˜„ ์‹œ์ ์—์„œ ํ‰๊ฐ€ํ•  ๋•Œ, ์—ฌ์„ฑ๊ณผ ๊ฐ€์ •์†Œ์„ค๋กœ ๋…ผ์˜๋ฅผ ์ขํžŒ ์•”์ŠคํŠธ๋กฑ์˜ ใ€Ž์š•๋ง๊ณผ ๊ฐ€์ •์†Œ์„คใ€(Desire and Domestic Novel, 1987)์ด ํ•œ์ธต ํฐ ํŒŒ๊ธ‰๋ ฅ์„ ๊ฐ€์ง„๋‹ค. ์•”์ŠคํŠธ๋กฑ์€ ๋ฆฌ์ฒ˜๋“œ์Šจ(Samuel Richardson)์˜ ใ€ŽํŒŒ๋ฉœ๋ผ, ๋ณด์ƒ๋ฐ›์€ ๋•์„ฑใ€(Pamela, or Virtue Rewarded, 1740)์„ ๊ธฐ๋ณธ ํ…์ŠคํŠธ๋กœ ํ•˜์—ฌ ์˜ค์Šคํ‹ด(Jane Austen)์œผ๋กœ ์—ฐ๊ฒฐ๋˜๋Š” ๊ฐ€์ •์†Œ์„ค์˜ ์—ญ์‚ฌ๋กœ์„œ ์˜๊ตญ์†Œ์„ค์˜ ๋ฐœํฅ ๊ณผ์ •์„ ๋‹ค์‹œ ์“ด๋‹ค. ์ด ๊ณผ์ •์—์„œ ์•”์ŠคํŠธ๋กฑ์˜ ๊ด€์‹ฌ์—์„œ ๋ฐฐ์ œ๋œ ํ๋ฆ„, ์ฆ‰ ๋ฆฌ์ฒ˜๋“œ์Šจ ์ดํ›„ 18์„ธ๊ธฐ์  ๊ฐ์„ฑ์ด ์ถ”๊ตฌํ–ˆ๋˜ ์ด์ƒ์ด ์—ฌ๋Ÿฌ ์šฐ์—ฌ๊ณก์ ˆ์„ ๊ฑฐ์ณ ์˜ค์Šคํ‹ด์— ์ด๋ฅด๋Š” ๊ณผ์ •์ด ์ด ๋…ผ๋ฌธ์˜ ๊ด€์‹ฌ์‚ฌ์ด๋‹ค. ์ด ๋…ผ๋ฌธ์—์„œ๋Š” ํŠนํžˆ 18์„ธ๊ธฐ ํ›„๋ฐ˜๋ถ€ํ„ฐ ํ”ฝ์…˜์˜ ์–‘์‚ฐ์— ๊ฒฐ์ •์  ์—ญํ• ์„ ํ•œ ๊ณ ๋”•์†Œ์„ค์„ ์ง‘์–ด๋„ฃ์–ด ใ€ŽํŒŒ๋ฉœ๋ผใ€์—์„œ ์˜ค์Šคํ‹ด ์†Œ์„ค๋กœ ๊ฐ€๋Š” ๊ณผ์ •์„ ์žฌ์กฐ๋ช…ํ•œ๋‹ค. ์•”์ŠคํŠธ๋กฑ๋„ 18์„ธ๊ธฐ ๊ฐ์„ฑ์˜ ๋ฌธํ™”์™€ ์†Œ์„ค์˜ ๋ถ€์ƒ์„ ์—ฐ๊ฒฐํ•˜๊ณ  ์žˆ์ง€๋งŒ, ์ด ๋…ผ๋ฌธ์—์„œ๋Š” ๋•์„ฑ๊ณผ ์พŒ๋ฝ์˜ ํ•ฉ์น˜๋ฅผ ๋ชฉํ‘œ๋กœ ํ•œ ์Šค์ฝ”ํ‹€๋žœ๋“œ ๊ณ„๋ชฝ์ฃผ์˜๋ฅผ ๊ทธ ๋ฐฐ๊ฒฝ์œผ๋กœ ๋ถ€๊ฐํ•˜๊ณ ์ž ํ•œ๋‹ค. ๋•์„ฑ๊ณผ ์พŒ๋ฝ์„ ํ•ฉ์น˜ํ•˜๊ณ ์ž ํ•˜๋Š” ๊ณผ์ •์—์„œ ๋“œ๋Ÿฌ๋‚˜๋Š” ๊ท ์—ด์ƒ์ด ใ€ŽํŒŒ๋ฉœ๋ผใ€ ์ดํ›„ ๊ณ„์† ๋‚˜ํƒ€๋‚˜๋Š” ๋ฐ”, ์ด๋ฅผ ๊ณ ๋”•์†Œ์„ค๊ณผ ๊ทผ๋Œ€์  ์˜๋ฏธ์˜ ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ์—์„œ ์ฝ์–ด๋‚ผ ๊ฒƒ์ด๋ฉฐ ๋ณธ๊ฒฉ์†Œ์„ค์˜ ์ •๋ฆฝ์ด ๊ณ ๋”•๋ฌธํ•™์ด๋ผ๋Š” ์žฅ๋ฅด๋ฌธํ•™๊ณผ์˜ ๊ด€๊ณ„ ์„ค์ •์„ ํ†ตํ•ด ์ด๋ค„์ง„๋‹ค๋Š” ์ ๋„ ์ง€์ ํ•˜๊ณ ์ž ํ•œ๋‹ค. ์—ฌ์„ฑ์˜ ์š•๋ง, ์—ฌ์„ฑ์˜ ์ฝ์„๊ฑฐ๋ฆฌ๋ฅผ ํ†ต์ œํ•˜๊ณ  ์ง€๋ฐฐํ•จ์œผ๋กœ์จ ํŠน์ •ํ•œ ์ฃผ์ฒด์„ฑ์„ ๊ตฌ์„ฑํ•˜๋ ค๋Š” ์‹œ๋„๋Š” 18์„ธ๊ธฐ ๋ฌธํ™”๊ถŒ๋ ฅ์œผ๋กœ์„œ ์†Œ์„ค์˜ ์ •์ฐฉ์— ์ผ์กฐํ•œ๋‹ค. ๊ฐ€์ • ์ด๋ฐ์˜ฌ๋กœ๊ธฐ๊ฐ€ ์ฃผ์ถ•์„ ์ด๋ฃจ๋Š” ๋‹ด๋ก  ํ•˜์—์„œ ํŒŒ๋ฉœ๋ผ๋Š” ์ฃผ์ฒด๋กœ ๊ตฌ์„ฑ๋˜์ง€๋งŒ, ๋ชธ์ด ํ…์ŠคํŠธ๊ฐ€ ๋˜๋ฉด์„œ ๋…์„œ์˜ ์ฃผ์ฒด๋กœ์„œ ์ฝ๋Š” ์—ฌ์„ฑ๋ณด๋‹ค๋Š” ์ฝ๊ธฐ์˜ ๋Œ€์ƒ์œผ๋กœ์„œ ์ฝํžˆ๋Š” ์—ฌ์„ฑ์œผ๋กœ ํ‘œ์ƒ๋œ๋‹ค. ์•”์ŠคํŠธ๋กฑ์€ 18์„ธ๊ธฐ ์ „๋ฐ˜์˜ ์ค€(ๆบ–) ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ ์†Œ์„ค๋“ค์„ ใ€ŽํŒŒ๋ฉœ๋ผใ€๊ฐ€ ๋Œ€์ฒดํ•จ์œผ๋กœ์จ ์†Œ์„ค์˜ ์œ„์ƒ์ด ํ™•๋ณด๋˜๋Š” ๊ฒƒ์ฒ˜๋Ÿผ ๋งํ•˜์ง€๋งŒ, ๊ทธ๋Ÿผ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ใ€ŽํŒŒ๋ฉœ๋ผใ€์—์„œ ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ์ ์ธ ๋ฉด๋ชจ๋ฅผ ์ฝ๋Š” ๋…๋ฒ•์ด ์™„์ „ํžˆ ์ฐจ๋‹จ๋˜๋Š” ๊ฒƒ์€ ์•„๋‹ˆ๋‹ค. 2์žฅ์—์„œ ์‚ดํŽด๋ณธ ๋ฐ”์™€ ๊ฐ™์ด ๊ฐ์„ฑ์˜ ํ…์ŠคํŠธ๋กœ์„œ ํŒŒ๋ฉœ๋ผ์˜ ๋ชธ์ด ๋•์„ฑ์„ ์ธ์ •๋ฐ›๊ธฐ ์œ„ํ•ด Mr. B์™€ ๋…์ž์˜ ์‹œ์„ ์— ๋…ธ์ถœ๋  ๋•Œ์— ๊ทธ ์‹œ์„ ์€ ๋ถˆ๊ฐ€ํ”ผํ•˜๊ฒŒ ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ์ ์ธ ์„ฑ๊ฒฉ์„ ๋ ๊ฒŒ ๋œ๋‹ค. ์†Œ์„ค๊ณผ ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ์˜ ๊ด€๊ณ„๋Š” 18์„ธ๊ธฐ ํ›„๋ฐ˜ ๋” ๋ณต์žกํ•œ ์–‘์ƒ์œผ๋กœ ๋‚˜ํƒ€๋‚˜๋Š”๋ฐ, ์ด ๋…ผ๋ฌธ์—์„œ๋Š” ๊ฐ์„ฑ์ฃผ์˜์™€ ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ์˜ ๊ด€๊ณ„๋ฅผ ์ข€ ๋” ๋ถ„๋ช…ํžˆ ๋“œ๋Ÿฌ๋‚ด๋Š” ๋‘ ํŽธ์˜ ํ”„๋ž‘์Šค ์†Œ์„ค์„ ์ฝ์œผ๋ฉด์„œ ๊ทผ๋Œ€์  ์ฃผ์ฒด์„ฑ์˜ ๊ตฌ์„ฑ ๊ณผ์ •์—์„œ ํญ๋ ฅ์ด ์ƒ์‚ฐ๋˜๋Š” ์–‘์ƒ์„ ์‚ดํŽด๋ณด๊ณ ์ž ํ•œ๋‹ค. ์ด์— 3์žฅ์—์„œ๋Š” ๋ผํด๋กœ(Choderlos de Laclos)์˜ ใ€Ž์œ„ํ—˜ํ•œ ๊ด€๊ณ„ใ€(Les Liaisons dangereuses, 1782)์™€ ์‹ธ๋“œ(D. A. Franรงois de Sade)์˜ ใ€Ž์ฅ์Šคํ‹ด, ๋•์„ฑ์˜ ๋ถˆ์šดใ€(Justine, ou Les malheurs de la vertu, 1791)์„ ์พŒ๋ฝ์˜ ๊ถŒ๋ ฅํ™” ์–‘์ƒ์— ์ดˆ์ ์„ ๋งž์ถฐ ์ฝ์–ด๋ณธ๋‹ค. ๊ฐ€์ •์„ฑ๊ณผ ๊ณ„์•ฝ์˜ ๋ฌธ์ œ๋ฅผ ๋‹ค๋ฃจ๋Š” ๊ฐ€์ •์†Œ์„ค์„ ์†Œ์„ค์‚ฌ์˜ ์ค‘์‹ฌ์— ๋†“๋Š” ์•”์ŠคํŠธ๋กฑ์˜ ๋…๋ฒ•์—์„œ ํญ๋ ฅ์€ ์ฃผ๋ณ€ํ™”๋˜์ง€๋งŒ, ํ”„๋ž‘์Šคํ˜๋ช…์ด๋ผ๋Š” ์—ญ์‚ฌ์  ๋ฐฐ๊ฒฝ์„ ํ™˜๊ธฐํ•  ๋•Œ์— ํญ๋ ฅ์ด ๋‹น๋Œ€ ์‚ฌ๋žŒ๋“ค์„ ์‚ฌ๋กœ์žก์€ ๊ฐ•๋ฐ•์ž„์— ๋ถ„๋ช…ํ–ˆ์Œ์€ 1790๋…„๋Œ€์— ๊ณ ๋”•์†Œ์„ค์ด ๋Œ€์œ ํ–‰ํ•˜๋Š” ๋ฌธํ™”์  ํ˜„์ƒ์„ ํ†ตํ•ด ํ™•์ธํ•ด ๋ณผ ์ˆ˜ ์žˆ๋‹ค. 4์žฅ์—์„œ๋Š” ๊ณ ๋”•๊ณผ ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ๊ฐ€ ํ•ฉ์ณ์ง„ ๋ฃจ์ด์Šค(Matthew Gregory Lewis)์˜ ใ€Ž์ˆ˜๋„์‚ฌใ€(The Monk, 1796)์—์„œ ํ˜๋ช…๊ณผ ๊ณตํฌ์ •์น˜์˜ ํŒŒ์žฅ์ด ๋ชธ์— ๊ฐ€ํ•ด์ง„ ํญ๋ ฅ์˜ ์„œ์‚ฌ์™€ ํŒํƒ€์ง€๋ฅผ ํ†ตํ•ด ์žฌํ˜„๋˜๋Š” ์–‘์ƒ์„ ์‚ดํŽด๋ณธ๋‹ค. ใ€Ž์ˆ˜๋„์‚ฌใ€๊ฐ€ ๊ณ ๋”•๊ณผ ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ๊ฐ€ ๊ฒน์ณ์ง€๋Š” ์ง€์ ์„ ๋“œ๋Ÿฌ๋‚ธ๋‹ค๋ฉด, ๋ž˜๋“œํด๋ฆฌํ”„(Ann Radcliffe)์˜ ใ€Ž์šฐ๋Œํฌ ์„ฑ์˜ ๋ฏธ์Šคํ„ฐ๋ฆฌใ€(The Mysteries of Udolpho, 1794)๋Š” ๊ณ ๋”•์ด ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ์™€ ๋งŒ๋‚  ์ˆ˜ ์žˆ๋Š” ๊ฐ€๋Šฅ์„ฑ์„ ์ฐจ๋‹จํ•˜๊ณ ์ž ํ•œ๋‹ค. ๋ž˜๋“œํด๋ฆฌํ”„๋Š” ์‹ธ๋“œ๋‚˜ ๋ฃจ์ด์Šค์˜ ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ์˜ ์ „์ œ๊ฐ€ ๋˜๋Š” ๋ชธ์˜ ์„ธ์†ํ™”, ํƒˆ์‹ ์„ฑํ™” ํ˜„์ƒ์„ ์žฌํ˜„ํ•˜๋ฉด์„œ๋„ ๋˜ํ•œ ์–ธ์ œ๋‚˜ ๊ทธ๊ฒƒ์„ ๊ณต์  ์งˆ์„œ ์•ˆ์—์„œ ํ•ด์„ ๊ฐ€๋Šฅํ•˜๊ณ  ํ†ต์ œ ๊ฐ€๋Šฅํ•œ ์ˆ˜์ค€์œผ๋กœ ๋ด‰์‡„ํ•˜๊ณ ์ž ํ•œ๋‹ค. 5์žฅ์—์„œ๋Š” ๊ฐ€์ •์„ฑ์„ ๋ณต๊ตฌํ•˜๋Š” ๋™์‹œ์— ์„ฌ๋œฉํ•œ ๊ฒƒ์œผ๋กœ ๊ทธ๋ ค๋‚ด๋Š” ๋ž˜๋“œํด๋ฆฌํ”„ ์†Œ์„ค์„ ๊ฐ€์ •์†Œ์„ค๊ณผ ๊ณ ๋”•์†Œ์„ค์˜ ์ ‘์ ์œผ๋กœ์„œ ์ฝ๋Š”๋‹ค. ์˜ค์Šคํ‹ด์˜ ใ€Ž๋…ธ์ƒ๊ฑฐ ์ˆ˜๋„์›ใ€(Northanger Abbey, 1818)์€ ๊ณ ๋”•๋ฌธํ•™์„ ํŒจ๋Ÿฌ๋””ํ•˜๋Š” ๊ณผ์ •์„ ๊ฑฐ์ณ ๊ฐ€์ •์†Œ์„ค๋กœ ๋ฐœ์ „ํ•œ๋‹ค. 6์žฅ์—์„œ๋Š” ์˜ค์Šคํ‹ด์ด ๊ฐ€์ •์„ฑ์˜ ๋ณต์›์œผ๋กœ ๊ฒฐ๋ง์„ ๋งบ๋Š” ๊ณ ๋”•์˜ ๊ด€์Šต์ ์ธ ํ”Œ๋กฏ์„ ๊ณ„์Šนํ•˜๋˜ ์ด๋ฅผ ๊ณ„์•ฝ์˜ ์ƒํ˜ธ์„ฑ์— ๋Œ€ํ•œ ๋ฏฟ์Œ์„ ๊ฒฌ์ง€ํ•˜๋Š” ๊ฒฐํ˜ผ ํ”Œ๋กฏ์œผ๋กœ ์ „ํ™˜ํ•จ์œผ๋กœ์จ ์ด ์†Œ์„ค์ด ๊ณ ๋”•์„œ์‚ฌ์—์„œ ๊ฐ€์ •์†Œ์„ค๋กœ ๋‚˜์•„๊ฐ€๋Š” ๊ณผ์ •์„ ์‚ดํŽด๋ณด๊ณ ์ž ํ•œ๋‹ค. ๊ฒฐ๋ก ์—์„œ๋Š” ใ€Ž์ด์„ฑ๊ณผ ๊ฐ์„ฑใ€(Sense and Sensibility, 1811)์„ ์ฝ์–ด๋ณด๋ฉด์„œ ์ด ์†Œ์„ค์—์„œ ์„ฑ์  ๊ณ„์•ฝ์ด ๊ฒฐํ˜ผ ํ”Œ๋กฏ์œผ๋กœ, ๋ชธ์˜ ํ…์ŠคํŠธํ™” ํ˜„์ƒ์ด ๋…์ž๋กœ์„œ ์—ฌ์„ฑ ์ฃผ์ฒด์— ๋Œ€ํ•œ ๊ด€์‹ฌ์œผ๋กœ ์ „ํ™˜๋˜๋Š” ์ง€์ ์„ ๋ฐํžŒ๋‹ค.Three decades after the publication of Ian Watts The Rise of the Novel (1957), Nancy Armstrong rewrote Watts history of the novel in Desire and Domestic Fiction (1987), whose focus on female sexuality and the domestic novel has exerted far more definite influence over the criticism of the novel. Armstrong remaps the rise of the novel by relocating the point of its departure from Daniel Defoes Robinson Crusoe (1719), the adventure novel Watt acclaimed as the precursor of the genre, to Samuel Richardsons Pamela, or Virtue Rewarded (1740). While I agree with Armstrongs thesis that modern subjectivity is constructed through the attempts to control female desire and readings, I take issue with her hypothesis that Pamela, by transferring erotic desire from Pamelas body to her words, constitutes the novel as a respectable genre free from such censure received by former semi-pornographic novels. Armstrongs reading of Pamela symptomizes a lack of proper attention to novels that represent desire through the female body, and this dissertation attempts to recover the missing part of Armstrongs genealogy by finding a place for the gothic and pornographic novel in the literary tradition meandering from Pamela to Jane Austens early novels. The gothic novel, which decisively served as the locomotive for the mass production of fiction in the latter half of the eighteenth century, is the key focus of this dissertation, which traces the development of the genre in the context of the Culture of Sensibility and its philosophical background in Scottish Enlightenment. Hutcheson, Hume and Smith investigated the possibility of a congruence between virtue and pleasure in sympathyyet the ideal supposed fell apart eventually, and I argue that modern pornography, a form of pleasure pursuit, rose in the moment of virtues separation from pleasure. Beginning with a reassessment of Armstrong, this dissertation moves onto the second chapter, in which I discover both gothic and pornographic elements in Richardsons Pamela. The third chapter traces the production of violence in the construction of modern subjectivity, reading two French novels that delve into the covert relationship between power and pleasure: Choderlos de Lacloss Les Liaisons dangereuses (1782) and D. A. Franรงois de Sades Justine, ou Les malheurs de la vertu (1791). The novels relationship to pornography is one of the most complicated issues that arise in studying literature from the latter part of the eighteenth century, and this chapter finds a way to explain the complexity against the backdrop of the Culture of Sensibility. The fourth chapter analyzes how Matthew Gregory Lewiss The Monk (1796) represents the trauma of the French Revolution and the Terror through a narrative of real and fantasized violence. I argue that violence, although marginalized in Armstrongs history of the domestic novel, is the main obsession of the 1790s which materialized into an explosion of the gothic novel. In the fifth chapter, I define Ann Radcliffs The Mysteries of Udolpho (1794) as a gothic novel that paves the way to domestic fiction. Radcliffe, the great enchantress of the gothic novel, struggles to tame the violence that unfolded to its extreme in Lewiss gothic pornography while simultaneously representing and containing the desacralized body portrayed in Sadean pornography. The final chapter investigates how Jane Austens Northanger Abbey (1818) rewrites Radcliffes gothic into a domestic novel. Austen takes over the gothic convention of domesticity and redirects it into her marriage plot, which, I argue, is a form of mutual contract that would have been denied and forsaken in the aftermath of the Revolution. In the conclusion, I address Sense and Sensibility (1811), Austens metafiction on sentimental novels, as the arguable turning point in the transformation of the sexual contract into the marriage plot, and the textualization of the female body into the subjectification of the female reader.๊ตญ๋ฌธ์ดˆ๋ก .............................................. i I. ์„œ๋ก  ............................................... 1 i. ์˜๊ตญ์†Œ์„ค์‚ฌ์—์„œ ๊ณ ๋”•์†Œ์„ค ์ž๋ฆฌ ์ฐพ๊ธฐ ..................... 2 ii. ๋ชธ๊ณผ ๊ฐ€์‹œ์„ฑ, ๊ทธ๋ฆฌ๊ณ  ํ˜๋ช… ................................................... 19 II. ๊ฐ์„ฑ์ฃผ์˜์™€ ใ€ŽํŒŒ๋ฉœ๋ผใ€ ................................................. 32 III. ๊ฐ์„ฑ์ฃผ์˜์—์„œ ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ๋กœโ€•ใ€Ž์œ„ํ—˜ํ•œ ๊ด€๊ณ„ใ€์™€ ใ€Ž์ฅ์Šคํ‹ดใ€.. 54 IV. ๊ณ ๋”•๊ณผ ํฌ๋ฅด๋…ธ๊ทธ๋ผํ”ผ์˜ ์ ‘์ โ€•ใ€Ž์ˆ˜๋„์‚ฌใ€ ................ 90 V. ๊ฐ์„ฑ์˜ ๊ด€์Šตํ™”์™€ ๊ณ ๋”•์˜ ๊ด€์Šตโ€•ใ€Ž์šฐ๋Œํฌ ์„ฑ์˜ ๋ฏธ์Šคํ„ฐ๋ฆฌใ€ .... 108 VI. ๊ณ ๋”•์†Œ์„ค์—์„œ ๊ฐ€์ •์†Œ์„ค๋กœโ€”ใ€Ž๋…ธ์ƒ๊ฑฐ ์ˆ˜๋„์›ใ€............. 130 VII. ๊ฒฐ๋ก ์— ๋Œ€์‹ ํ•˜์—ฌโ€•ใ€Ž์ด์„ฑ๊ณผ ๊ฐ์„ฑใ€ ................................................ 171 ๊ทธ๋ฆผ 1. ใ€Ž1789๋…„ 10์›” 5์ผ์—์„œ 6์ผ๋กœ ๋„˜์–ด๊ฐ€๋Š” ๊ณตํฌ์˜ ๋ฐคใ€(La terrible nuit du 5 au 6 octobre 1789) .............................................. 187 Bibliography ....................................... 188 Abstract ........................................... 203Docto

    Contrastive topic, topic and focus in Korean : from the viewpoint of information structure

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์–ธ์–ดํ•™๊ณผ ์–ธ์–ดํ•™ ์ „๊ณต,2001.Docto

    ๋ฐ”์ด๋Ÿฐ์  ์˜์›…์˜ ์ง„ํ™” : ใ€Ž์ด๊ต๋„ใ€์—์„œใ€Ž์›Œ๋”๋ง ํ•˜์ด์ธ ใ€๊นŒ์ง€

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์˜์–ด์˜๋ฌธํ•™๊ณผ ๋ฌธํ•™์ „๊ณต,2001.Maste

    Interaction between nucleophosmin and HBV core protein increases HBV capsid assembly

    No full text
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ƒ๋ช…๊ณผํ•™๋ถ€, 2014. 2. ์ •๊ตฌํฅ.Host factors are involved in Hepatitis B virus (HBV) genome replication and capsid formation during the viral life cycle. A host factor, Nucleophosmin (B23), was found to be bound to HBV core protein dimers, but its functional role of interaction has remained to be elucidated. In this study, we used in sillico modeling to predict the sites of physical interaction between B23 and core protein dimers and used mutagenesis to confirm the prediction. The binding of core protein and B23 promoted HBV capsid assembly and protected the degree of capsid dissociation when subjected to detergent treatments in vitro. In addition, chemical inhibition of B23 reduced intracellular capsid formation resulting of reduced HBV production in HepG2.2.15 cells. These results provided important evidence that the oligomeric form of B23 acts on core capsid assembly.ABSTRACT 3 CONTENT 4 I. Introduction 5 II. Materials and Methods 8 III. Results 12 IV. Discussion 29 V. Supplementary Table 32 VI. References 34 VII. ๊ตญ๋ฌธ์ดˆ๋ก 38Maste

    Efficient Inversion Algorithms and Its Applications to ECDLP

    No full text
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ˆ˜๋ฆฌ๊ณผํ•™๋ถ€, 2013. 8. ์ฒœ์ •ํฌ.์ด ๋…ผ๋ฌธ์—์„œ ํƒ€์› ๊ณก์„ ์—์„œ ํƒœ๊ทธ ํŠธ๋ ˆ์ด์‹ฑ ๊ธฐ๋ฒ•์„ ์ ์šฉ์‹œ์ผฐ๋‹ค. ์ฒ˜์Œ์— ์ฒœ์ •ํฌ ๋“ฑ์ด ์ œ์•ˆํ•œ ํƒœํฌ ํŠธ๋ ˆ์ด์‹ฑ์€ ํด๋ผ๋“œ๋กœ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ๋”์šฑ ๋น ๋ฅด๊ฒŒ ๋Œ๋„๋ก ํ•ด์ค€๋‹ค. ์ด ๋ฐฉ๋ฒ•์„ ์ด์šฉํ•˜๋ฉด ์œ ํ•œ์ฒด์—์„œ ์ด์‚ฐ ๋Œ€์ˆ˜ ๋ฌธ์ œ๋ฅผ 10๋ฐฐ ๋” ๋น ๋ฅด๊ฒŒ ํ’€ ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜, ํƒ€์› ๊ณก์„ ์—์„œ๋Š” ๋ง์…ˆ ์—ฐ์‚ฐ ๋•Œ๋ฌธ์— ์ด์ •๋„์˜ ํšจ ๊ณผ๋ฅผ ๋ณด์ง€ ๋ชปํ•œ๋‹ค. ๋ง์…ˆ์„ ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ์—ญ์› ์—ฐ์‚ฐ๊ณผ ์ œ๊ณฑ ๋‘ ๋ฒˆ์„ ํฌํ•จํ•œ ๊ณฑ์…ˆ ์—ฐ์‚ฐ์„ ์„ธ ๋ฒˆ์„ ํ•ด์•ผํ•œ๋‹ค. ์—ญ์› ์—ฐ์‚ฐ์€ ์‹œ๊ฐ„์ด ๊ฐ€์žฅ ๋งŽ์ด ๊ฑธ๋ฆฌ๋Š” ์—ฐ์‚ฐ ์ด๊ธฐ ๋•Œ๋ฌธ์— ์ข€ ๋” ๋น ๋ฅด๊ฒŒ ํ•  ์ˆ˜ ์žˆ๋„๋ก ๊ฐœ์„ ์„ ํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ๊ทธ๋ž˜์„œ ์šฐ ๋ฆฌ๋Š” ํ™•์žฅ์ฒด์—์„œ ์œ ์šฉํ•˜๊ฒŒ ์‚ฌ์šฉ๋˜๋Š” ์—ญ์› ์•Œ๊ณ ๋ฆฌ์ฆ˜์— ๋Œ€ํ•ด์„œ ์‚ดํŽด๋ณด์•˜๋‹ค. ๊ฐ€์žฅ ๋„๋ฆฌ ์“ฐ์ด๋Š” ๋‘ ๊ฐœ์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ์žˆ๋Š”๋ฐ, ํ•˜๋‚˜๋Š” ํ™•์žฅ๋œ ์œ ํด๋ฆฌ๋””์•ˆ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด๊ณ , ๋‹ค๋ฅธ ํ•˜๋‚˜๋Š” ์ดํ† -์ฏ”์ง€ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด๋‹ค. ์ด ์™ธ์—๋„, ์—ญํ–‰๋ ฌ์„ ์ด์šฉํ•˜์—ฌ ์—ญ์›์„ ๊ตฌํ•  ์ˆ˜ ์žˆ๋‹ค. ์šฐ๋ฆฌ๋Š” ์ด ์•Œ๊ณ ๋ฆฌ์ฆ˜๋“ค์˜ ๊ณ„์‚ฐ ๋ณต์žก๋„๋ฅผ ๋น„๊ตํ•ด๋ณด์•˜๊ณ , ์šฐ๋ฆฌ์— ํ™˜๊ฒฝ์— ๋งž์ท„์„ ๋•Œ ๊ฐ€์žฅ ๋น ๋ฅธ ์—ญ์› ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ๋น„๊ต ๋Œ€์ƒ์œผ๋กœ ์‚ผ์•˜๋‹ค. ๊ทธ๋ฆฌ๊ณ  ๋ณต์žก๋„๋ฅผ ๊ณ„์‚ฐํ•ด๋ณธ ๊ฒฐ๊ณผ, ํ™•์žฅ์ฒด์˜ ์ฐจ์ˆ˜๊ฐ€ ๋‚ฎ์€ ๊ฒฝ์šฐ์— ์—ญํ–‰๋ ฌ์„ ์ด์šฉํ•˜์—ฌ ์—ญ์›์„ ๊ตฌํ•˜๋Š” ๋ฐฉ๋ฒ•์ด ๋” ๋น ๋ฅด๋‹ค๋Š” ๊ฒƒ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๋˜ํ•œ, ์—ญํ–‰๋ ฌ์„ ์ด์šฉํ•  ๊ฒฝ์šฐ ์—ญ์›์˜ ์ „์ฒด๋ฅผ ๋‹ค ๊ตฌํ•˜์ง€ ์•Š๊ณ  ์—ญ์›์˜ ๊ณ„์ˆ˜ ํ•˜๋‚˜๋ฅผ ๋น ๋ฅด๊ฒŒ ๊ตฌํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์ด ๋ฐฉ๋ฒ•์„ ์ด์šฉํ•˜์—ฌ ์šฐ๋ฆฌ๋Š” ํ™•์žฅ์ฒด์˜ ์ฐจ์ˆ˜๊ฐ€ ๋‚ฎ์€ ๊ฒฝ์šฐ์— ํƒ€์› ๊ณก์„  ์ด์‚ฐ ๋Œ€์ˆ˜ ๋ฌธ์ œ๋ฅผ ์ด ์ „์— ์•Œ๋ ค์ง„ ๋ฐฉ๋ฒ•๋ณด๋‹ค ๋” ๋น ๋ฅด๊ฒŒ ํ’€ ์ˆ˜ ์žˆ์—ˆ๋‹ค.In this paper, we apply tag tracing technique to elliptic curves. Tag tracing is the technique which can apply to the Pollard rho algorithm, first suggested by Cheon et al. They can solve DLP 10 times faster than before in the multiplicative groups of finite field. However, for elliptic curves, tag tracing does not effect so much because of an addition in elliptic curves. To add two pointsin elliptic curves, we actually need one inversion and three multiplications including two squaring. An inversion operation is the most time-consuming arithmetic, so an inversion algorithm needs to be improved. We investigate some useful inversion algorithms which can be used for a finite extension field. Until now, there are two widely used algorithms to get an inverse element over the finite extension field. One is extended Euclidean algorithm, and the other is Itoh-Tsujii inversion algorithm. Beside these algorithms, we can compute an inverse element by computing an inverse matrix. Generally, this method is slower than the other algorithms, but when the degree of the extension field is small, this is slightly faster. We compare the complexity of these algorithms and use the most efficient method suitably for our setting when applying tag tracing to elliptic curves, Also, to accelerate the Pollard rho algorithm, we calculate the pre-computation table. Using these skills, we expect to reduce the time complexity to solve ECDLP than before.Abstract i 1 Introduction 1 2 Preliminaries 3 2.1 Arithmetic of Elliptic Curves . . . . . . . . . . . . . . . . . . . 3 2.2 Pollard Rho Algorithm . . . . . . . . . . . . . . . . . . . . . . 4 2.3 Tag Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3 Inversion Algorithms 8 3.1 Extended Euclidean Algorithm . . . . . . . . . . . . . . . . . 9 3.1.1 Algorithm IE . . . . . . . . . . . . . . . . . . . . . . . 9 3.1.2 Algorithm IP . . . . . . . . . . . . . . . . . . . . . . . 9 3.1.3 Algorithm IM . . . . . . . . . . . . . . . . . . . . . . . 10 3.2 Itoh-Tsujii Inversion Algorithm . . . . . . . . . . . . . . . . . 12 3.3 Inverse Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.4 Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 4 Elliptic Curve Discrete Logarithm Problem 18 4.1 Preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 4.2 Tag Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 5 Implementation 22 6 Conclusion 23Maste
    corecore