NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 313 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Masoumeh Bagheri-Nesami; Mahsa Kamali; Amirabbas Mollaei – Smart Learning Environments, 2025
Nurses acknowledge that their understanding of the shortcomings in the utilization of medical devices stems from insufficient knowledge about their correct usage. The use of Quick Response (QR) technology has paved a new gateway for accessing information and resources. The available evidence confirmed the usefulness of QR codes for use in clinical…
Descriptors: Medical Services, Handheld Devices, Knowledge Level, Clinical Experience
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Deepak Dawar – Information Systems Education Journal, 2024
Learning computer programming is typically difficult for newcomers. Demotivation and learned helplessness have received much attention. Besides the subject's intricacy, low in-class participation has been associated with poor student achievement. This paper presents a follow-up, stage 2 study on the novel instructional technique, Student-Driven…
Descriptors: College Students, Computer Science Education, Required Courses, Elective Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Ciganik, Shari; McDaniel, Michael – PRIMUS, 2021
Prospective teachers and cryptography students use programming, statistics and guile to enrich both their courses.
Descriptors: Preservice Teachers, Elementary School Teachers, Technology, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Joshua Holden – PRIMUS, 2024
This paper describes Alkaline, a size-reduced version of Kyber, which has recently been announced as a prototype NIST standard for post-quantum public-key cryptography. While not as simple as RSA, I believe that Alkaline can be used in an undergraduate classroom to effectively teach the techniques and principles behind Kyber and post-quantum…
Descriptors: Technology, Coding, Undergraduate Study, Algebra
Peer reviewed Peer reviewed
Direct linkDirect link
C. Beaver – PRIMUS, 2024
In this paper, several research topics are presented that provide productive avenues of exploration for students in an undergraduate cryptography course. The topics are intended for a variety of skill levels and interests. In some cases, a student might be inspired to try to solve the proposed problem or write computer code. Other topics might…
Descriptors: Technology, Coding, Undergraduate Students, Student Projects
Peer reviewed Peer reviewed
Direct linkDirect link
Ho, Chun-Heng; Zhang, Hang-qin; Li, Juan; Zhang, Min-quan – International Journal of Distance Education Technologies, 2023
Digital education has recently become a mainstream education model. Despite digital education's increasing popularity, there remain issues when it comes to teacher-student interactions in digital space, which have made it impossible for this model to achieve the same teaching quality as traditional in-person education. Compared with other academic…
Descriptors: Technology Uses in Education, Electronic Learning, Teacher Student Relationship, Interaction
Peer reviewed Peer reviewed
Direct linkDirect link
Leigh Jin; Tai-Yin Chi; Brenda Mak – Journal of Information Systems Education, 2024
This paper presents the Screencast-Based Assessment Technique (SBAT) for a mobile app development curriculum in the information systems discipline. SBAT was implemented as a midterm take-home exam in which students design and develop an app project based on their own interests, passions, or ambitions. In addition to coding, students must create…
Descriptors: Technology Uses in Education, Computer Oriented Programs, Handheld Devices, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Weiss, Charles J. – Journal of Chemical Education, 2021
Scientific computing and computer literacy are increasingly important skills for chemistry students to learn, but despite this need, there is an absence of chemistry-specific texts available for teaching the subject. This article introduces a freely available textbook released under a Creative Commons license for use in an undergraduate scientific…
Descriptors: Science Instruction, Chemistry, College Science, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Basuhail, Abdullah Ahmad – Canadian Journal of Learning and Technology, 2020
This paper presents an approach to implement learning objects for teaching and learning problem-solving techniques based on computer programming. The demonstrated approach exploits computer-based interactive animations and computer graphics. The main feature of this approach is its simplicity for exploring the concepts and structures of the…
Descriptors: Resource Units, Teaching Methods, Programming, Problem Solving
Catherine Barbara Acitelli – ProQuest LLC, 2022
The field of Cryptography is rapidly evolving, and the development of quantum computers is on the rise. Lattice-based cryptosystems are promising candidates for quantum resistance, and it is the responsibility of institutions to prepare students for related careers. Undergraduate students in mathematics and mathematics-adjacent fields can -- and…
Descriptors: Undergraduate Study, Curriculum Design, Technology, Coding
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  21