Mrs. Mauldin's Webpage

Home
Assignments
Math 5010
Cryptography Project


Cryptography Sources


Digicert, Check our Numbers. (n.d.). Retrieved from https://www.digicert.com/TimeTravel/math.htm
Flannery, S., & Flannery, D. (2003). In Code: A Mathematical Journey. Chapel Hill, NC: Algonquin Books of Chapel Hill.
Garner, B. Merkle Tree Hashing: How Blockchain Verification Works. (2018, September 03). Retrieved from https://coincentral.com/merkle-tree-hashing-blockchain/
Hoffman, P. (1988). Archimedes Revenge: The Joys and Perils of Mathematics. New York: Norton.
Simpson, I. (2017, September 19). To Understand Blockchains, You Should Understand Cryptographic Hashes First. Retrieved from https://medium.com/vandal-press/to-understand-blockchains-you-should-understand-cryptographic-hashes-first-for-normies-93bc7645e816
Singh, S. (2016). The Code Book: The Secrets Behind Codebreaking. New York: Ember.

Resources for Cryptography Project

Enigma Simulation. (n.d.). Retrieved from http://enigmaco.de/enigma/enigma.html
Frame of Essence. (2017, April 05). Retrieved September 25, 2018, from https://www.youtube.com/watch?v=6H_9l9N3IXU
Khan Academy. (n.d.). Journey into cryptography | Computer science | Computing. Retrieved from https://www.khanacademy.org/computing/computer-science/cryptography
Mystery Twister C3. (n.d.). Retrieved from https://www.mysterytwisterc3.org/en/
Numberphile, N. (2012, December 09). Retrieved September 25, 2018, from https://www.youtube.com/watch?v=M7kEpw1tn50
Philbin, C. A. (2017, October 25). Retrieved September 24, 2018, from https://www.youtube.com/watch?v=jhXCTbFnK8o
Singh, S. (n.d.). The Black Chamber. Retrieved from http://www.simonsingh.net/The_Black_Chamber/index.html
Steyn, B. (n.d.). How RSA Works With Examples. Retrieved from http://doctrina.org/How-RSA-Works-With-Examples.html