NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Çulha, Davut – Journal of Educational Technology and Online Learning, 2021
Blockchain, which is a disruptive technology, affects many technologies, and it will affect many other technologies. Main property of blockchain technologies is assuring trust without central authorization. This is achieved through immutable data and decentralization. Moreover, blockchain is founded on the principles of cryptography, which…
Descriptors: Competition, Teaching Methods, Programming, Technology