Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Coding | 6 |
| Matrices | 6 |
| Algebra | 3 |
| Mathematical Concepts | 2 |
| Mathematics | 2 |
| Mathematics Instruction | 2 |
| Technology | 2 |
| Addition | 1 |
| Causal Models | 1 |
| Cognitive Processes | 1 |
| College Mathematics | 1 |
| More ▼ | |
Source
| Australian Mathematics Teacher | 1 |
| International Journal of… | 1 |
| Journal of Learning Analytics | 1 |
| Mathematics and Computer… | 1 |
| PRIMUS | 1 |
| Psychological Methods | 1 |
Author
| Chua, Boon Liang | 1 |
| Coggins, Porter E., III | 1 |
| Collier, Wesley | 1 |
| Farag, Mark | 1 |
| Glatzer, Tim | 1 |
| Mair, Patrick | 1 |
| McAndrew, Alasdair | 1 |
| Ruis, A. R. | 1 |
| Shaffer, David Williamson | 1 |
| von Eye, Alexander | 1 |
Publication Type
| Journal Articles | 6 |
| Reports - Descriptive | 6 |
| Guides - Non-Classroom | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| Singapore | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Coggins, Porter E., III; Glatzer, Tim – PRIMUS, 2020
We present an algorithm for a matrix-based Enigma-type encoder based on a variation of the Hill Cipher as an application of 2 × 2 matrices. In particular, students will use vector addition and 2 × 2 matrix multiplication by column vectors to simulate a matrix version of the German Enigma Encoding Machine as a basic example of cryptography. The…
Descriptors: Mathematics Instruction, Matrices, Technology, Addition
Shaffer, David Williamson; Collier, Wesley; Ruis, A. R. – Journal of Learning Analytics, 2016
This paper provides a tutorial on epistemic network analysis (ENA), a novel method for identifying and quantifying connections among elements in coded data and representing them in dynamic network models. Such models illustrate the structure of connections and measure the strength of association among elements in a network, and they quantify…
Descriptors: Epistemology, Network Analysis, Data Analysis, Coding
McAndrew, Alasdair – International Journal of Mathematical Education in Science and Technology, 2008
The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…
Descriptors: Orthographic Symbols, Computation, Coding, Technology
Mair, Patrick; von Eye, Alexander – Psychological Methods, 2007
In this article, the authors have 2 aims. First, hierarchical, nonhierarchical, and nonstandard log-linear models are defined. Second, application scenarios are presented for nonhierarchical and nonstandard models, with illustrations of where these scenarios can occur. Parameters can be interpreted in regard to their formal meaning and in regard…
Descriptors: Hypothesis Testing, Causal Models, Matrices, Coding
Farag, Mark – Mathematics and Computer Education, 2007
Hill ciphers are linear codes that use as input a "plaintext" vector [p-right arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [c-right arrow above] = E [middle dot] [p-right arrow above]. Informally, a near-field is a triple [left angle bracket]N; +, *[right angle bracket] that…
Descriptors: Mathematics Instruction, Coding, Algebra, Geometric Concepts
Chua, Boon Liang – Australian Mathematics Teacher, 2006
This article describes Cryptography, defined as the science of encrypting and deciphering messages written in secret codes, it has played a vital role in securing information since ancient times. There are several cryptographic techniques and many make extensive use of mathematics to secure information. The author discusses an activity built…
Descriptors: Matrices, Mathematics Activities, Secondary School Teachers, Secondary School Students

Peer reviewed
Direct link
