Author Archives: admin
Public-key cryptography
Originating authors are Graeme L. Cohen (University of Technology, Sydney), Steven Galbraith (University of Auckland) and Edoardo Persichetti (University of Auckland). How can we safely send our credit card details over the internet, or using a mobile phone, when others … Continue reading
A tale of two triangles: Heron triangles and elliptic curves
Originating author is William Mc Callum. If two triangles have the same area and the same perimeter, are they necessarily congruent? It turns out that the answer is no. For example, the triangle with sides and has the same area … Continue reading
SXEOLF NHB FUBSWRJUDSKB (PUBLIC KEY CRYPTOGRAPHY)
The need to create secure codes is said to go back to Julius Caesar, who moved letters in his messages up by three through the alphabet. That is encoding. How would you decode such a message? Modern day cryptography, which … Continue reading
Weitere Klein-Artikel in in anderen Sprachen verfügbar:
Englisch, Französisch, …