Matrix multiplication via arithmetic progressions
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Introduction to cryptography: principles and applications
Introduction to cryptography: principles and applications
Public-Key Cryptography
Explaining cryptographic systems
Computers & Education
Decrypted Secrets: Methods and Maxims of Cryptology
Decrypted Secrets: Methods and Maxims of Cryptology
New Methodology of Information Education with "Computer Science Unplugged"
ISSEP '08 Proceedings of the 3rd international conference on Informatics in Secondary Schools - Evolution and Perspectives: Informatics Education - Supporting Computational Thinking
Algorithmic Adventures: From Knowledge to Magic
Algorithmic Adventures: From Knowledge to Magic
ISSEP'11 Proceedings of the 5th international conference on Informatics in Schools: situation, Evolution and Perspectives
Hi-index | 0.00 |
These days, public-key cryptography is indispensable to ensure both confidentiality and authenticity in numerous applications which comprise securely communicating via mobile phone or email or digitally signing documents. For all public-key systems, such as RSA, mathematically challenging and technically involved methods are employed which are often above the level of secondary school students as they employ deep results from algebra. Following an approach suggested in 2003 by Tim Bell et al. in Computers and Education, volume 40, number 3 , we deal with the question of how to teach young students the main concepts, issues, and solutions of public-key systems without being forced to also teach rather complicated theorems of number theory beforehand.