Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Adventures in Cryptology: Exploration-Worthy Project TopicsBeaver, C.PRIMUS : problems, resources, and issues in mathematics undergraduate studies, 2024-01, Vol.34 (1), p.13-31 [Periódico revisado por pares]Philadelphia: Taylor & FrancisSem texto completo |
2 |
Material Type: Artigo
|
![]() |
On Conceptual Metaphor in Cryptology EducationLanius, MelindaPRIMUS : problems, resources, and issues in mathematics undergraduate studies, 2024-01, Vol.34 (1), p.78-89 [Periódico revisado por pares]Philadelphia: Taylor & FrancisSem texto completo |
3 |
Material Type: Artigo
|
![]() |
Using Secret Sharing to Store CryptocurrencyReitenbach, MarkusPRIMUS : problems, resources, and issues in mathematics undergraduate studies, 2024-01, Vol.34 (1), p.32-40 [Periódico revisado por pares]Philadelphia: Taylor & FrancisSem texto completo |
4 |
Material Type: Artigo
|
![]() |
Introduction to the Special Issue: Resources for Undergraduate CryptologyBoersma, Stuart ; Christensen, Chris ; Millichap, ChristianPRIMUS : problems, resources, and issues in mathematics undergraduate studies, 2024-01, Vol.34 (1), p.1-5 [Periódico revisado por pares]Philadelphia: Taylor & FrancisSem texto completo |
5 |
Material Type: Artigo
|
![]() |
Fully homomorphic SIMD operationsSmart, N. P. ; Vercauteren, F.Designs, codes, and cryptography, 2014-04, Vol.71 (1), p.57-81 [Periódico revisado por pares]Boston: Springer USTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Improvement of a Level Quantum Secret Sharing SchemeMashhadi, SamanehJournal of applied security research, 2022-01, Vol.17 (1), p.123-134 [Periódico revisado por pares]RoutledgeSem texto completo |
7 |
Material Type: Artigo
|
![]() |
Cryptology as a Way to Teach Advanced Discrete MathematicsBunde, David P. ; Dooley, John F.PRIMUS : problems, resources, and issues in mathematics undergraduate studies, 2024-01, Vol.34 (1), p.41-53 [Periódico revisado por pares]Philadelphia: Taylor & FrancisSem texto completo |
8 |
Material Type: Artigo
|
![]() |
Using a comic book to engage students in a cryptology and cybersecurity curriculumWusylko, Christine ; Xu, Zhen ; Dawson, Kara M. ; Antonenko, Pavlo D. ; Koh, Do Hyong ; Lee, Minyoung ; Benedict, Amber E. ; Bhunia, SwarupJournal of Research on Technology in Education, 2024-07, Vol.56 (4), p.373-391 [Periódico revisado por pares]Eugene: RoutledgeTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Detecting Encryption Vulnerabilities with Lossless CompressionHansen, RichardAmerican journal of science & engineering (Online), 2022-12, Vol.3 (3), p.8-15 [Periódico revisado por pares]Society for Makers, Artists, Researchers andSem texto completo |
10 |
Material Type: Artigo
|
![]() |
A novel image encryption based on hash function with only two-round diffusion processNorouzi, Benyamin ; Seyedzadeh, Seyed Mohammad ; Mirzakuchaki, Sattar ; Mosavi, Mohammad RezaMultimedia systems, 2014-02, Vol.20 (1), p.45-64 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |