Publication Cover
PRIMUS
Problems, Resources, and Issues in Mathematics Undergraduate Studies
Volume 34, 2024 - Issue 1: Resources for Undergraduate Cryptology
91
Views
0
CrossRef citations to date
0
Altmetric
Curated Collection

Cryptography as a Bridge to Abstract Mathematics

References

  • ASCII Table. https://www.asciitable.com. Accessed 21 May 2023.
  • Canteaut, A. 2017. Lecture Notes on Error-Correcting Codes and their Applications to Symmetric Cryptography. https://www.paris.inria.fr/secret/Anne.Canteaut/MPRI/chapters-10-13.pdf.Accessed 27 June 2023.
  • Gallian, J. A. 2006. Contemporary Abstract Algebra, Sixth Edition. Boston, MA: Houghton Mifflin.
  • Kaur, M. 2008. Cryptography as a pedagogical tool. PRIMUS. 18(2): 198–206. doi: 10.1080/10511970701298833
  • Koblitz, N. 1994. A Course in Number Theory and Cryptography, Graduate Texts in Mathematics 114. New York, NY: Springer-Verlag.
  • Koblitz, N. 1997. Cryptography as a teaching tool. Cryptologia. 21(4): 317–326. doi: 10.1080/0161-119791885959
  • Koblitz, N. 1998. Algebraic Aspects of Cryptography, Algorithms and Computation in Mathematics, Vol. 3. Berlin: Springer-Verlag.
  • Lewand, R. E. 2000. Cryptological Mathematics, Classroom Resource Materials, Vol. 16. Washington, DC: Mathematical Association of America.
  • Lidl, R. and H. Niederreiter. 1994. Polynomials over finite fields. In Introduction to Finite Fields and their Applications. Cambridge: Cambridge University Press.
  • Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms and Source Code in C, Second Edition. John Wiley & Sons, Inc.
  • van Tilborg, H. C. A. 1988. An Introduction to Cryptology, First Edition. Kluwer Academic Publishers.
  • Wolfram Alpha LLC. 2022. Wolfram|Alpha. WolframAlpha [QuotientRemainder(x7−1, x3+x+1), https://www.wolframalpha.com/input?i=QuotientRemainder%28x%5E7-1%2Cx%5E3%2Bx%2B1%29]. Accessed 24 January 2023.
  • Young, A. 2006. Mathematical Ciphers from Caesar to RSA, Mathematical World Series, Vol. 25. Providence, RI: American Mathematical Society.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.