**Algorithm
Site**

**Computer
Algorithm : ÀüºÏ´ë ¹Ú¼øÃ¶
±³¼ö´Ô µ¿¿µ»ó (¡Ú¡Ú¡Ú)**

**Euclidean Algorithm****Definition of the Euclidean algorithm.****Visible Euclidean Algorithm****An interactive page which finds the greatest common divisor of two numbers using the Euclidean algorithm...... Enter two positive integers, and click the button to have theEuclidean Algorithm displayed in the lower frame, thereby computingthe greatest common divisor of the two numbers.****Euclid****Biography of Euclid.****Recursive Procedures****Definition of recursive procedures and functions......... Recursion occurs when procedures call themselves (either directly or indirectly). Any procedural call chain with a circular component exhibits recursion. Even though recursion is a neat and succinct technique to express a wide variety of problems. If used incorrectly it may incur certain efficiency overheads.****Tiling With Trominos : A right tromino is an L-shaped object formed by three squares in a grid. If we remove one square from a square grid of side 2**^{n}**we can tile the rest of it using right trominos. This was proved by S. W. Golomb in 1954. Can you figure out the proof? The applet below uses a recursive algorithm based on that proof.**

**Fibonacci Numbers and the Golden Section : The Fibonacci numbers are 0, 1, 1, 2, 3, 5, 8, 13, ... The****golden section numbers****are ±0·61803 39887... and ±1·61803 39887... The golden string is 1 0 1 1 0 1 0 1 1 0 1 1 0 1 0 1 1 0 1 ...**

a sequence of 0s and 1s which is closely related to the Fibonacci numbers and the golden section**Fibonacci****Order of Growth of Functions****Description of function growth (PDF document). Richard Johnsonbaugh ÀÇ ¹®¼**-
**What is public-key cryptography? : In traditional cryptography, the sender and receiver of a message know and use the same secret key; the sender uses the secret key to encrypt the message, and the receiver uses the same secret key to decrypt the message. This method is known as secret key or symmetric cryptography ......**-
**Introduction to Public-Key Cryptography :****Encryption is the process of transforming information so it is unintelligible to anyone but the intended recipient. Decryption is the process of transforming encrypted information so that it is intelligible again. A cryptographic algorithm, also called a cipher, is a mathematical function used for encryption or decryption. In most cases, two related functions are employed, one for encryption and the other for decryption****.**

**Complete
Collection of Algorithm Animation (CCAA)**** : ¾Ë°í¸®Áò ¾Ö´Ï¸ÞÀÌ¼Ç ¸ðÀ½**

**Java
and Web based Algorithm Animation (JAWAA) : ¿¹Á¦**