Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Coding | 2 |
| Information Security | 2 |
| Monetary Systems | 2 |
| Privacy | 2 |
| Technology | 2 |
| Algorithms | 1 |
| Higher Education | 1 |
| History | 1 |
| Student Projects | 1 |
| Undergraduate Students | 1 |
| Voting | 1 |
| More ▼ | |
Source
| PRIMUS | 2 |
Author
| C. Beaver | 1 |
| Markus Reitenbach | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
| Teachers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
C. Beaver – PRIMUS, 2024
In this paper, several research topics are presented that provide productive avenues of exploration for students in an undergraduate cryptography course. The topics are intended for a variety of skill levels and interests. In some cases, a student might be inspired to try to solve the proposed problem or write computer code. Other topics might…
Descriptors: Technology, Coding, Undergraduate Students, Student Projects

Peer reviewed
Direct link
