Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged mathematics

Rss Feed Group items tagged

Marco Tiburcio

Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views

  •  
    Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
Riley Dankovich

Deleting Ada Lovelace from the history of computing | Ada Initiative - 2 views

  •  
    This resource is interesting in light of our discussing Babbage and Lovelace, as well as Ada Lovelace Day. This article is particularly interesting to me as it deals with women's contributions to significant advancements in history, many of which are often ignored or excused.
  •  
    Riley, I mentioned in class that October 14th is Ada Lovelace Day, an international day for recognizing the contributions of women in science. Details: http://findingada.com/. I've wanted to organize an Ada Lovelace Day event here at Vanderbilt for a few years now, but never found the time. Let me know if you'd like to cook something up (an event? a blog series? a Wikipedia editing party?) for the 14th.
  •  
    I found it really interesting that people took the fact that Lovelace made a few mistakes as an excuse to try to remove her contribution to computer programming. Male scientists and programmers also make mistakes, but we rarely see those used in an attempt to discredit them. Also, she literally designed a computer program before the computer even existed. I think we can excuse a few past mathematical errors.
Derek Bruff

Wolfram|Alpha: Computational Knowledge Engine - 0 views

  •  
    This will only be seen by our class.
ftiet21

Modern Cryptography: Theory and Practice - 0 views

  •  
    E-text for a book detailing the fundamentals behind modern cryptography and how they are applied in practice. Lots of detailed information about various underlying theorems and mathematical properties and how they work, as well as various encryption techniques and cryptographic processes.
estrutt

What Is SSL (Secure Sockets Layer)? | DigiCert.com - 2 views

  •  
    This website discusses procedure and purpose of encrypting sensitive data over the internet. SSL is a protocol which "determines variables of the encryption" being used to protect information from first names to credit card numbers. This website also tells you how to determine whether or not a website is secure or if your information is vulnerable. In addition, there is another page that delves into the mathematics and actual cryptography procedures behind online encryption like RSA and ECC.
1 - 6 of 6
Showing 20 items per page