Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 8 |
Descriptor
Source
Mathematics and Computer… | 3 |
Mathematics Teacher | 2 |
PRIMUS | 2 |
International Journal of… | 1 |
Journal of Chemical Education | 1 |
Minnesota Department of… | 1 |
School Science and Mathematics | 1 |
Technology and Engineering… | 1 |
Author
Sigmon, Neil P. | 2 |
Clausen, Mary C. | 1 |
Coggins, Porter E., III | 1 |
Farag, Mark | 1 |
Glatzer, Tim | 1 |
Jeffrey Ehme | 1 |
Kevin Cantrell | 1 |
Klima, Richard E. | 1 |
Loveland, Thomas | 1 |
McAndrew, Alasdair | 1 |
Paoletti, Teo J. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 12 |
Journal Articles | 11 |
Guides - Classroom - Teacher | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Secondary Education | 2 |
Early Childhood Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Teachers | 3 |
Practitioners | 1 |
Location
Minnesota | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jeffrey Ehme – PRIMUS, 2024
The Miller-Rabin test is a useful probabilistic method for finding large primes. In this paper, we explain the method in detail and give three variations on this test. These variations were originally developed as student projects to supplement a course in error correcting codes and cryptography.
Descriptors: Probability, Numbers, Coding, Algorithms
W. Paige Hall; Kevin Cantrell – Journal of Chemical Education, 2024
Human-driven carbon emissions have resulted in increased levels of dissolved carbon dioxide in the Earth's oceans. This dissolved carbon dioxide reacts with water to form carbonic acid, which impacts ocean acidity as well as the solubility of carbonate-containing compounds, with far-reaching impacts on marine ecosystems and the human communities…
Descriptors: Programming Languages, Computer Science Education, Chemistry, Marine Biology
Coggins, Porter E., III; Glatzer, Tim – PRIMUS, 2020
We present an algorithm for a matrix-based Enigma-type encoder based on a variation of the Hill Cipher as an application of 2 × 2 matrices. In particular, students will use vector addition and 2 × 2 matrix multiplication by column vectors to simulate a matrix version of the German Enigma Encoding Machine as a basic example of cryptography. The…
Descriptors: Mathematics Instruction, Matrices, Technology, Addition
Minnesota Department of Education, 2017
This document contains all of the Minnesota kindergarten academic standards in the content areas of Arts, English Language Arts, Mathematics, Science and Social Studies. For each content area there is a short overview followed by a coding diagram of how the standards are organized and displayed. This document is adapted from the official versions…
Descriptors: Academic Standards, State Standards, Kindergarten, Art Education
Paoletti, Teo J. – Mathematics Teacher, 2013
To engage students, many teachers wish to connect the mathematics they are teaching to other branches of mathematics or to real-world applications. The lesson presented in this article, which uses the algebraic skill of finding the equation of a line between two points and the geometric axiom that any two points define a line, does both. A…
Descriptors: Mathematics Instruction, Relevance (Education), Algebra, Mathematics Skills
Loveland, Thomas – Technology and Engineering Teacher, 2012
In modern CAD and CAM manufacturing companies, engineers design parts for machines and consumable goods. Many of these parts are cut on CNC machines. Whether using a CNC lathe, milling machine, or router, the ideas and designs of engineers must be translated into a machine-readable form called G & M Code that can be used to cut parts to precise…
Descriptors: Computer Assisted Design, National Standards, Manufacturing, Skilled Workers
McAndrew, Alasdair – International Journal of Mathematical Education in Science and Technology, 2008
The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…
Descriptors: Orthographic Symbols, Computation, Coding, Technology
Farag, Mark – Mathematics and Computer Education, 2007
Hill ciphers are linear codes that use as input a "plaintext" vector [p-right arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [c-right arrow above] = E [middle dot] [p-right arrow above]. Informally, a near-field is a triple [left angle bracket]N; +, *[right angle bracket] that…
Descriptors: Mathematics Instruction, Coding, Algebra, Geometric Concepts

Sutherland, David C. – School Science and Mathematics, 1990
Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)
Descriptors: Algebra, Coding, College Mathematics, Higher Education
Clausen, Mary C. – Mathematics Teacher, 2005
The problem of solving mathematical equations can be quite tough for some students hence they face a great difficulty when applying ideas to the actual process. Students in algebra classes are taught coding in which they write down what they will need to do to solve the equation and this coding makes the students more adept at solving equations…
Descriptors: Children, Cognitive Development, Equations (Mathematics), Algebra
Klima, Richard E.; Sigmon, Neil P. – Mathematics and Computer Education, 2005
The use of the computer, and specifically the mathematics software package Maple, has played a central role in the authors' abstract algebra course because it provides their students with a way to see realistic examples of the topics they discuss without having to struggle with extensive computations. However, Maple does not provide the computer…
Descriptors: Programming Languages, Computer Science, Algebra, Computer Assisted Design

Sigmon, Neil P. – Mathematics and Computer Education, 1997
Demonstrates the use of technology to enhance the appreciation of applications involving abstract algebra. The symbolic manipulator Maple can perform computations required for a linear cryptosystem. One major benefit of this process is that students can encipher and decipher messages using a linear cryptosystem without becoming confused and…
Descriptors: Algebra, Coding, College Mathematics, Computer Assisted Instruction