NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Joshua Holden – PRIMUS, 2024
This paper describes Alkaline, a size-reduced version of Kyber, which has recently been announced as a prototype NIST standard for post-quantum public-key cryptography. While not as simple as RSA, I believe that Alkaline can be used in an undergraduate classroom to effectively teach the techniques and principles behind Kyber and post-quantum…
Descriptors: Technology, Coding, Undergraduate Study, Algebra
Peer reviewed Peer reviewed
Direct linkDirect link
Doehler, Kirsten; Taylor, Laura – International Journal of Mathematical Education in Science and Technology, 2015
This article is based on the experiences of two statistics professors who have taught students to write and effectively utilize code-based software in a college-level introductory statistics course. Advantages of using software and code-based software in this context are discussed. Suggestions are made on how to ease students into using code with…
Descriptors: Computer Software, Programming, Coding, Syntax
Peer reviewed Peer reviewed
Direct linkDirect link
Schweingruber, David; Wohlstein, Ronald T. – Teaching Sociology, 2005
The authors examined the crowd sections of 20 introduction to sociology textbooks, coding them for the presence of seven crowds myths--claims about crowds that have no empirical support and have been rejected by scholars in the field. The number of myths per book ranges from five to one. The authors conclude by making suggestions for rewriting…
Descriptors: Sociology, Introductory Courses, Content Analysis, Coding