Teaching Public-Key Cryptography in School
暂无分享,去创建一个
Dennis Komm | Lucia Keller | Björn Steffen | Giovanni Serafini | Andreas Sprock | D. Komm | A. Sprock | Björn Steffen | Giovanni Serafini | Lucia Keller
[1] Harold W. Thimbleby,et al. Explaining cryptographic systems , 2003, Comput. Educ..
[2] Ian H. Witten,et al. Computer Science Unplugged: off-line activities and games for all ages , 1998 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] P. Cull,et al. Perfect codes on graphs , 1997, Proceedings of IEEE International Symposium on Information Theory.
[5] Juraj Hromkovic. Algorithmic Adventures - From Knowledge to Magic , 2009 .
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Arto Salomaa,et al. Public-Key Cryptography , 1996, Texts in Theoretical Computer Science. An EATCS Series.
[8] Yasushi Kuno,et al. New Methodology of Information Education with "Computer Science Unplugged" , 2008, ISSEP.
[9] Friedrich L. Bauer,et al. Decrypted secrets - methods and maxims of cryptology , 1997 .
[10] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[11] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[12] Peter B. Henderson,et al. Computer Science unplugged , 2008 .
[13] Don Coppersmith,et al. Matrix multiplication via arithmetic progressions , 1987, STOC.
[14] Roland T. Mittermeir,et al. Informatics Education - Supporting Computational Thinking, Third International Conference on Informatics in Secondary Schools - Evolution and Perspectives, ISSEP 2008, Torun, Poland, July 1-4, 2008, Proceedings , 2008, ISSEP.