NotesFAQContact Us
Collection
Advanced
Search Tips
Source
PRIMUS281
Laws, Policies, & Programs
Assessments and Surveys
SAT (College Admission Test)3
What Works Clearinghouse Rating
Showing 1 to 15 of 281 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
Direct linkDirect link
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Aaron Wootton – PRIMUS, 2024
We introduce learning modules in cryptography that can be crafted to motivate many abstract mathematical ideas, and we illustrate with a sample module. These modules can be used in a variety of ways, such as the core for a cryptography course or as motivating topics in other courses such as abstract and linear algebra or number theory.
Descriptors: Technology, Mathematical Concepts, Learning Modules, Mathematics Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Jeffrey Ehme – PRIMUS, 2024
The Miller-Rabin test is a useful probabilistic method for finding large primes. In this paper, we explain the method in detail and give three variations on this test. These variations were originally developed as student projects to supplement a course in error correcting codes and cryptography.
Descriptors: Probability, Numbers, Coding, Algorithms
Peer reviewed Peer reviewed
Direct linkDirect link
C. Beaver – PRIMUS, 2024
In this paper, several research topics are presented that provide productive avenues of exploration for students in an undergraduate cryptography course. The topics are intended for a variety of skill levels and interests. In some cases, a student might be inspired to try to solve the proposed problem or write computer code. Other topics might…
Descriptors: Technology, Coding, Undergraduate Students, Student Projects
Peer reviewed Peer reviewed
Direct linkDirect link
Joshua Holden – PRIMUS, 2024
This paper describes Alkaline, a size-reduced version of Kyber, which has recently been announced as a prototype NIST standard for post-quantum public-key cryptography. While not as simple as RSA, I believe that Alkaline can be used in an undergraduate classroom to effectively teach the techniques and principles behind Kyber and post-quantum…
Descriptors: Technology, Coding, Undergraduate Study, Algebra
Peer reviewed Peer reviewed
Direct linkDirect link
Jenny Cox; Scott Kaschner; Mary Krohn – PRIMUS, 2024
The number of undergraduates placing into developmental or "remedial" coursework continues to increase. This rise is concerning because developmental or "remedial" coursework creates barriers for many students. This mixed method study examines a holistic approach to placement. After one-on-one interviews with mathematics…
Descriptors: Undergraduate Students, College Faculty, Intervention, Remedial Mathematics
Peer reviewed Peer reviewed
Direct linkDirect link
Matthew T. Johnson; Brandon Kim; Daniel O'Keefe; Wilson J. González-Espada – PRIMUS, 2024
We investigated the effects of a major revision of the differential and integral calculus curriculum, the primary goal of which was to improve STEM retention. The revamped curriculum has greater emphasis on the power of computing to help visualize patterns and gain insights to better prepare students for STEM majors, and less emphasis on…
Descriptors: STEM Education, Mathematics Education, Curriculum Design, Majors (Students)
Peer reviewed Peer reviewed
Direct linkDirect link
Justin Barhite; Benjamin Braun; Courtney George; Angela Hanson; Hunter Lehmann; Camille Schuetz; Chloe Urbanski Wawrzyniak – PRIMUS, 2024
Over the past three years, a community of faculty and graduate teaching assistants has developed within the University of Kentucky Mathematics department centered around the use and development of student-centered assessment methods. In this article, we discuss the environmental factors that contributed to the growth of this community, our…
Descriptors: Evaluation, Measurement Techniques, Faculty, Teaching Assistants
Peer reviewed Peer reviewed
Direct linkDirect link
David Faitelson; Shai Gul; Michal Arieli – PRIMUS, 2024
Exercise is essential for mastering mathematics, but it faces two major hurdles. First, students are often not motivated to do their homework. Second, checking traditional homework is a manual and labor-intensive process that becomes harder to support as the number of students increases. We argue that computer games could alleviate both problems.…
Descriptors: Mathematics Instruction, College Mathematics, Homework, Computer Games
Peer reviewed Peer reviewed
Direct linkDirect link
George Ashline; Bret Findley; Mitchell Andrea; Dylan Wawruck – PRIMUS, 2024
We describe the components and implementation of an activity for multivariable calculus featuring applications to the field of chemistry. This activity focuses on the isobaric thermal expansion coefficient found using partial differentiation of the volume of an ideal gas with respect to temperature as pressure is held constant. Broader goals of…
Descriptors: Learning Activities, Mathematics Instruction, Calculus, Chemistry
Peer reviewed Peer reviewed
Direct linkDirect link
Steven Greenstein; Bogdan G. Nita – PRIMUS, 2024
With this paper, we share an activity for the undergraduate mathematics classroom called "The Harp Project" that leverages the aesthetic nature of both the mathematical and the musical arts. This project was conceived as a STEAM/PBL project with the added feature that it was carried out in pieces by an entire class. Anecdotal evidence…
Descriptors: College Mathematics, Mathematics Instruction, Aesthetics, STEM Education
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  19