Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 5 |
Descriptor
Coding | 5 |
Technology | 5 |
Information Security | 3 |
Mathematics Education | 2 |
Privacy | 2 |
Active Learning | 1 |
College Mathematics | 1 |
College Students | 1 |
Computer Science Education | 1 |
Computer Security | 1 |
Cultural Influences | 1 |
More ▼ |
Source
PRIMUS | 4 |
Intercultural Development… | 1 |
Author
David P. Bunde | 1 |
Goodman, Christie L., Ed. | 1 |
John F. Dooley | 1 |
Markus Reitenbach | 1 |
Melinda Lanius | 1 |
Stephanie A. Blanda | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Collected Works - Serial | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Location
Pennsylvania | 1 |
Texas | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Goodman, Christie L., Ed. – Intercultural Development Research Association, 2018
The "IDRA Newsletter" serves as a vehicle for communication with educators, school board members, decision-makers, parents, and the general public concerning the educational needs of all children in Texas and across the United States. The theme of this issue is "Gender Justice." Articles include: (1) Sexual Harassment -- Safe…
Descriptors: Sexual Harassment, Educational Environment, Gender Bias, Social Justice