Finite field manipulations in Macsyma
ACM SIGSAM Bulletin
Computer algebra systems: a practical guide
Computer algebra systems: a practical guide
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Practical Cryptography
Cryptography and computer security for undergraduates
Proceedings of the 35th SIGCSE technical symposium on Computer science education
A cryptography course for non-mathematicians
Proceedings of the 1st annual conference on Information security curriculum development
Teaching cryptography to undergraduate students in small liberal art schools
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Applications of Abstract Algebra with Maple and MATLAB (Discrete Mathematics and Its Applications)
Applications of Abstract Algebra with Maple and MATLAB (Discrete Mathematics and Its Applications)
Introduction to Cryptography with Coding Theory (2nd Edition)
Introduction to Cryptography with Coding Theory (2nd Edition)
Efficient Finite Fields in the Maxima Computer Algebra System
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Challenges in teaching a graduate course in applied cryptography
ACM SIGCSE Bulletin
An instructional design of open source networking laboratory and curriculum
Proceedings of the 10th ACM conference on SIG-information technology education
Developing and evaluating a network curriculum to meet ABET accreditation and IT industry needs
Journal of Computing Sciences in Colleges
DESvisual: a visualization tool for the DES cipher
Journal of Computing Sciences in Colleges
An approach for evaluating FOSS projects for student participation
Proceedings of the 43rd ACM technical symposium on Computer Science Education
Hi-index | 0.00 |
Cryptography has become an important topic in undergraduate curricula in mathematics and computer science, not just for its intrinsic interest---``about the most fun you can have with mathematics''\cite{ferg04, but for its current standing as the basis for almost all computer security. From wireless networking to secure email to password protection, cryptographic methods are used to secure information, to protect users, and to protect data. At Victoria University, cryptography has been taught as part of a mathematics and computer science degree for several years. The students all have had at least a year of tertiary mathematics, and some exposure to a computer algebra system (Maple). However, the cost of Maple, and the current licensing agreement, means that students are unable to experiment with the software away from the computer laboratories at the University. For this reason we have decided to investigate the use of open-source computer algebra systems Maxima and Axiom. Although not as full-featured and powerful as the commercial systems Maple and Mathematica, we show they are in fact admirably suited for a subject such as cryptography. In some ways Maxima and Axiom even surpass Maple and Mathematica. Student response to the introduction of these systems has been very positive.