{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:42:36Z","timestamp":1743000156933,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031732560"},{"type":"electronic","value":"9783031732577"}],"license":[{"start":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T00:00:00Z","timestamp":1728086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T00:00:00Z","timestamp":1728086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73257-7_15","type":"book-chapter","created":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T14:02:20Z","timestamp":1728050540000},"page":"185-193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From Caesar Shifts to\u00a0Kid-Enigma. The CS Unplugged-Like Path in\u00a0the\u00a0MuMa Science Centre"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5386-5487","authenticated-orcid":false,"given":"Micha\u0142","family":"Ren","sequence":"first","affiliation":[]},{"given":"Pawe\u0142","family":"Perekietka","sequence":"additional","affiliation":[]},{"given":"\u0141ukasz","family":"Nitschke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,5]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1080\/02684528608431842","volume":"1","author":"G Welchman","year":"1986","unstructured":"Welchman, G.: From Polish Bomba to British Bombe: the birth of ultra. Intell. National Secur. 1(1), 71\u2013110 (1986). https:\/\/doi.org\/10.1080\/02684528608431842","journal-title":"Intell. National Secur."},{"key":"15_CR2","volume-title":"Enigma","author":"M Grajek","year":"2007","unstructured":"Grajek, M.: Enigma. Bli\u017cej prawdy. Rebis, Pozna\u0144 (2007)"},{"key":"15_CR3","first-page":"9","volume":"99","author":"M Fellows","year":"1994","unstructured":"Fellows, M., Koblitz, N.: Combinatorially Based Cryptography for Children (and Adults). Congressus Numeantium 99, 9\u201341 (1994)","journal-title":"Congressus Numeantium"},{"issue":"4","key":"15_CR4","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1080\/0161-119791885959","volume":"21","author":"N Koblitz","year":"1997","unstructured":"Koblitz, N.: Cryptography as a teaching tool. Cryptologia 21(4), 317\u2013326 (1997). https:\/\/doi.org\/10.1080\/0161-119791885959","journal-title":"Cryptologia"},{"doi-asserted-by":"publisher","unstructured":"Fellows, M., Koblitz, N.: Kid Krypto. In: Brickell, E.F. (eds.) Advances in Cryptology \u2013 CRYPTO\u2019 92. LNCS, vol. 740. Springer, Berlin, Heidelberg. (1993). https:\/\/doi.org\/10.1007\/3-540-48071-4_27","key":"15_CR5","DOI":"10.1007\/3-540-48071-4_27"},{"unstructured":"Reeds, J.: A critical review of the book: \u201cThe Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography\u201d, Notices of the American Mathematical Society, 47(3), 369\u2013372 (2000)","key":"15_CR6"},{"key":"15_CR7","volume-title":"Wspomnienia z mej pracy w Biurze Szyfr\u00f3w Oddzia\u0142u II Sztabu Gl\u00f3wnego w latach 1930\u20131945 \/ Memories of my work at the Cipher Bureau of the General Staff Second Department 1930\u20131945","author":"M Rejewski","year":"2021","unstructured":"Rejewski, M.: Wspomnienia z mej pracy w Biurze Szyfr\u00f3w Oddzia\u0142u II Sztabu Gl\u00f3wnego w latach 1930\u20131945 \/ Memories of my work at the Cipher Bureau of the General Staff Second Department 1930\u20131945, 2nd edn. Wydawnictwo Naukowe UAM, Pozna\u0144 (2021)","edition":"2"},{"unstructured":"Du Sautoy, M.: The Number Mysteries: A Mathematical Odyssey through Everyday Life. 4th Estate, London (2011), pp. 189\u2013193 ISBN: 978-0007309863","key":"15_CR8"},{"doi-asserted-by":"publisher","unstructured":"Bell, T., Curzon P., Cutts, Q., Dagiene V., Haberman, B.: Overcoming obstacles to CS education by using non-programming outreach programmes. In: Proceedings of the 5th International Conference on Informatics in Schools: Situation, Evolution and Perspectives, ISSEP 2011, pp. 71\u201381. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24722-4_7","key":"15_CR9","DOI":"10.1007\/978-3-642-24722-4_7"},{"issue":"1","key":"15_CR10","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1145\/1539024.1508951","volume":"41","author":"T Nishida","year":"2009","unstructured":"Nishida, T., Kanemune, S., Idosaka, Y., Namiki, M., Bell, T., Kuno, Y.: A CS unplugged design pattern. ACM SIGCSE Bull. 41(1), 231\u2013235 (2009)","journal-title":"ACM SIGCSE Bull."}],"container-title":["Lecture Notes in Computer Science","Creative Mathematical Sciences Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73257-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T14:03:29Z","timestamp":1728050609000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73257-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,5]]},"ISBN":["9783031732560","9783031732577"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73257-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,5]]},"assertion":[{"value":"5 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CMSC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Creative Mathematical Sciences Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Trier","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cmsc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.uni-trier.de\/en\/universitaet\/fachbereiche-faecher\/fachbereich-iv\/faecher\/informatikwissenschaften\/professuren\/theoretische-informatik\/research\/conferences-and-workshops\/cmsc","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}