Publication Cover
PRIMUS
Problems, Resources, and Issues in Mathematics Undergraduate Studies
Volume 34, 2024 - Issue 1: Resources for Undergraduate Cryptology
119
Views
1
CrossRef citations to date
0
Altmetric

REFERENCES

  • 2021 Elder Fraud Report, Federal Bureau of Investigation. https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3ElderFraudReport.pdf. Accessed 17 September 2022.
  • Adiredja, A. P. and M. Zandieh. 2020. Everyday examples in linear algebra: individual and collective creativity. Journal of Humanistic Mathematics. 10(2): 40–75.
  • Borovik, A. 2008. Didactic transformation in mathematics teaching. In The Teaching Research Interface: Implications for Practice in HE and FE, pp. 30–35. Bristol: ESCalate.
  • Burmester, M., R. Rivest, and A. Shamir. 1997. Geometric cryptography identification by angle trisection. 7 pages. Preprint. https://people.csail.mit.edu/rivest/pubs/BRS97.pdf. Accessed 6 March 2023.
  • Burton, R., B. Indrajit, and S. P. Bhide. 2009. The Kama Sutra of Vatsyayana (Translated From The Sanscrit In Seven Parts With Preface, Introduction and Concluding Remarks). The Project Gutenberg. Accessed 6 September 2022.
  • Eddy, M. (2022, May 23). The best secure messaging apps for 2022. https://www.pcmag.com/picks/best-secure-messaging-apps. Accessed 28 August 2022.
  • File, T. 2013. Computer and Internet Use in the United States: Population Characteristics. US Department of Commerce, Economics and Statistics Administration, US Census Bureau.
  • Froomkin, A. M. 1995. The metaphor is the key: Cryptography, the clipper chip, and the constitution. University of Pennsylvania Law Review. 143: 709–897.
  • Gill, L. 2018. Law, metaphor, and the encrypted machine. Osgoode Hall Law Journal. 55(2): 440–477. https://digitalcommons.osgoode.yorku.ca/ohlj/vol55/iss2/3.
  • Hostetter, A. B. and M. W. Alibali. 2008. Visible embodiment: Gestures as simulated action. Psychonomic Bulletin & Review. 15(3): 495–514.
  • Howcroft, E. (2022, June 13). Cryptocurrency market value slumps under $1 trillion. https://www.reuters.com/business/finance/cryptocurrency-market-value-slumps-under-1-trillion-2022-06-13/. Accessed 28 August 2022.
  • Kahn, D. 1973. The Codebreakers: The Story of Secret Writing. Macmillan Company. Seminar. Cryptologia. 38(3): 223–231. https://doi.org/10.1080/01611194.2014.915256; Cryptologia. 34(2): 155–162. https://doi.org/10.1080/01611190903225421.
  • Lakoff, G. and M. Johnson. 1980. Metaphors We Live By. Chicago and London: University of Chicago Press.
  • Lakoff, G. and R. Núñez. 2000. Where Mathematics Comes From, Vol. 6. New York: Basic Books.
  • Marsh, D. C. B. 1970. Cryptology as a senior seminar topic. The American Mathematical Monthly. 77(7): 761–764.
  • Marsh, D. C. B. 1977. Cryptography at the Colorado school of mines. Cryptologia. 1(4): 362–363. https://doi.org/10.1080/0161-117791833110.
  • Motti, V. G. and K. Caine. (2016, September). Towards a visual vocabulary for privacy concepts. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 60, No. 1, pp. 1078–1082. Sage CA: Los Angeles, CA: SAGE Publications.
  • Newton, M. 2000. The Encyclopedia of Serial Killers. Checkmark Books.
  • Nollinger, M. (1995, September 1). America, Online!. Wired. Accessed 28 August 2022.
  • Peirce, C. S. 1992. The Essential Peirce: Selected Philosophical Writings, Vol. 2. Indiana University Press.
  • Poe, E. A. 1841. A few words on secret writing. Graham's Magazine.
  • Rivest, R. L., A. Shamir, and M. A. Leonard. (1983, September 20). U.S. Patent No. 4,405,829. Alexandria, VA: U.S. Patent and Trademark Office. Cryptologia. 29(4): 337–342. https://doi.org/10.1080/0161-110591893915.
  • Shapiro, L. 2019. Embodied Cognition. Routledge.
  • Spindler, R. 2022. Foundational mathematical beliefs and ethics in mathematical practice and education. Journal of Humanistic Mathematics. 12(2): 49–71.
  • Stevens, W. (1969, October 22). Cipher expert dares zodiac to ‘Tell’ name. San Francisco Examiner. p. 9.
  • Winkel, B. J. 1977. Why cryptologia? Cryptologia. 1(1): 1–3.
  • Wrighting, D. M., J. Dombach, M. Walker, J. Cook, M. Duncan, G. V. Ruiz, A. Colón-Carmona, and B. Birren. 2021. Teaching undergraduates to communicate science, cultivate mentoring relationships, and navigate science culture. CBE-Life Sciences Education. 20(3): ar31.
  • Ziliak, E. 2017. The mathematics of secrets: Cryptography from Caesar ciphers to digital encryption. Math Horizons. 25(1): 27–27.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.