{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:12:17Z","timestamp":1725541937063},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642113758"},{"type":"electronic","value":"9783642113765"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11376-5_11","type":"book-chapter","created":{"date-parts":[[2009,12,2]],"date-time":"2009-12-02T04:55:13Z","timestamp":1259729713000},"page":"112-123","source":"Crossref","is-referenced-by-count":9,"title":["Teaching Public-Key\u00a0Cryptography in School"],"prefix":"10.1007","author":[{"given":"Lucia","family":"Keller","sequence":"first","affiliation":[]},{"given":"Dennis","family":"Komm","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Serafini","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Sprock","sequence":"additional","affiliation":[]},{"given":"Bj\u00f6rn","family":"Steffen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","volume-title":"Decrypted Secrets: Methods and Maxims of Cryptology","author":"F.L. Bauer","year":"2006","unstructured":"Bauer, F.L.: Decrypted Secrets: Methods and Maxims of Cryptology, 4th edn. Springer, Secaucus (2006)","edition":"4"},{"key":"11_CR2","unstructured":"Bell, T., Fellows, M., Witten, I.H.: Computer Science Unplugged - Off-line activities and games for all ages (1999), \n                  \n                    www.csunplugged.org\n                  \n                  \n                 (last accessed: October 22, 2009)"},{"issue":"3","key":"11_CR3","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0360-1315(02)00102-1","volume":"40","author":"T. Bell","year":"2003","unstructured":"Bell, T., Thimbleby, H., Fellows, M., Witten, I., Koblitz, N., Powell, M.: Explaining cryptographic systems. Computers & Education\u00a040(3), 199\u2013215 (2003)","journal-title":"Computers & Education"},{"key":"11_CR4","unstructured":"Bundesrat and EDK. Verordnung des Bundesrates\/Reglement der EDK \u00fcber die Anerkennung von gymnasialen Maturit\u00e4tsausweisen (MAR) (1995), \n                  \n                    http:\/\/www.sbf.admin.ch\/evamar\/reglemente\/VO_MAR_1995_d.pdf\n                  \n                  \n                 (last accessed: October 22, 2009)"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/28395.28396","volume-title":"Proc.\u00a0of the Nineteenth Annual ACM Symposium on Theory of Computing (STOC 1987)","author":"D. Coppersmith","year":"1987","unstructured":"Coppersmith, D., Winograd, S.: Matrix multiplication via arithmetic progressions. In: Proc.\u00a0of the Nineteenth Annual ACM Symposium on Theory of Computing (STOC 1987), pp. 1\u20136. ACM, New York (1987)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Cull, P.: Perfect codes on graphs. In: Proc.\u00a0of the 1997 International Symposium on Information Theory, p. 452 (1997)","DOI":"10.1109\/ISIT.1997.613389"},{"key":"11_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-87126-9","volume-title":"Introduction to Cryptography: Principles and Applications","author":"H. Delfs","year":"2002","unstructured":"Delfs, H., Knebl, H.: Introduction to Cryptography: Principles and Applications. Springer, Heidelberg (2002)"},{"issue":"6","key":"11_CR8","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory IT"},{"key":"11_CR9","unstructured":"Elmiger, D.: Die zweisprachige Maturit\u00e4t in der Schweiz (2008), \n                  \n                    www.sbf.admin.ch\/htm\/dokumentation\/publikationen\/bildung\/bilingue_matur_de.pdf\n                  \n                  \n                 (last accessed: October 22, 2009)"},{"key":"11_CR10","unstructured":"Freiermuth, K., Hromkovi\u010d, J., Keller, L., Steffen, B.: Kryptologie, Lehrbuch Informatik. Vieweg+Teubner (to appear, 2009)"},{"key":"11_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85986-4","volume-title":"Algorithmic Adventures","author":"J. Hromkovi\u010d","year":"2009","unstructured":"Hromkovi\u010d, J.: Algorithmic Adventures. Springer, Berlin (2009)"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-540-69924-8_22","volume-title":"Informatics Education - Supporting Computational Thinking","author":"T. Nishida","year":"2008","unstructured":"Nishida, T., Idosaka, Y., Hofuku, Y., Kanemune, S., Kuno, Y.: New methodology of information education with \u201ccomputer science unplugged\u201d. In: Mittermeir, R.T., Sys\u0142o, M.M. (eds.) ISSEP 2008. LNCS, vol.\u00a05090, pp. 241\u2013252. Springer, Heidelberg (2008)"},{"issue":"2","key":"11_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"11_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03269-5","volume-title":"Public-Key Cryptography","author":"A. Salomaa","year":"1996","unstructured":"Salomaa, A.: Public-Key Cryptography. Springer, Berlin (1996)"}],"container-title":["Lecture Notes in Computer Science","Teaching Fundamentals Concepts of Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11376-5_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:51:37Z","timestamp":1619783497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11376-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642113758","9783642113765"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11376-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}