{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:04Z","timestamp":1750307704298,"version":"3.41.0"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2009,6,25]],"date-time":"2009-06-25T00:00:00Z","timestamp":1245888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCSE Bull."],"published-print":{"date-parts":[[2009,6,25]]},"abstract":"<jats:p>We describe our experience in creating and teaching a graduate course in cryptography at the Johns Hopkins University. We emphasize on the importance of such a course for a graduate student in an information security program. We discuss the course implementation and discuss the challenges in teaching this course to students from varied backgrounds. Based on our observations, we suggest specific improvements that could be applied to this course in the future.<\/jats:p>","DOI":"10.1145\/1595453.1595485","type":"journal-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T14:08:31Z","timestamp":1251122911000},"page":"103-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Challenges in teaching a graduate course in applied cryptography"],"prefix":"10.1145","volume":"41","author":[{"given":"Sujata","family":"Garera","sequence":"first","affiliation":[{"name":"Johns Hopkins University, Baltimore, Maryland"}]},{"given":"Jorge","family":"Vasconcelos","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, Maryland"}]}],"member":"320","published-online":{"date-parts":[[2009,6,25]]},"reference":[{"volume-title":"CRC Press","year":"2002","author":"Stinson D.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","unstructured":"Menezes A. etal Handbook of Applied Cryptography CRC Press October 1996.   Menezes A. et al. Handbook of Applied Cryptography CRC Press October 1996."},{"key":"e_1_2_1_3_1","unstructured":"Schneier B. Applied Cryptography Second Edition John Wiley &amp; Sons 1996.  Schneier B. Applied Cryptography Second Edition John Wiley &amp; Sons 1996."},{"key":"e_1_2_1_4_1","unstructured":"Stallings W. Cryptography and Network Security Fourth Edition Prentice Hall 2006.  Stallings W. Cryptography and Network Security Fourth Edition Prentice Hall 2006."},{"key":"e_1_2_1_5_1","unstructured":"Fluhrer S. etal \"Attacks on RC4 and WEP.\" Cryptobytes 2002.  Fluhrer S. et al. \"Attacks on RC4 and WEP.\" Cryptobytes 2002."},{"key":"e_1_2_1_6_1","unstructured":"Rogaway P. \"The Security of DES-X.\" Cryptobytes 1996.  Rogaway P. \"The Security of DES-X.\" Cryptobytes 1996."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/358699.358718"},{"volume-title":"5th International Workshop on Fast Software Encryption","year":"1998","author":"Kelsey J.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","unstructured":"HotBits: Genuine random numbers generated by radioactive decay. http:\/\/www.fourmilab.ch\/hotbits.  HotBits: Genuine random numbers generated by radioactive decay. http:\/\/www.fourmilab.ch\/hotbits."},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Eastlake D. etal \"Randomness Recommendations for Security.\" IETF Draft 1994.   Eastlake D. et al. \"Randomness Recommendations for Security.\" IETF Draft 1994.","DOI":"10.17487\/rfc1750"},{"key":"e_1_2_1_11_1","unstructured":"Callas J. \"Using and Creating Cryptographic Quality Random Numbers.\" http:\/\/www.merrymeet.com\/jon\/usingrandom.html 1996.  Callas J. \"Using and Creating Cryptographic Quality Random Numbers.\" http:\/\/www.merrymeet.com\/jon\/usingrandom.html 1996."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.481513"},{"key":"e_1_2_1_13_1","unstructured":"Rivest R. \"Chaffing and Winnowing: Confidentiality without Encryption\" http:\/\/people.csail.mit.edu\/rivest\/chaffing-980701.txt 1998.  Rivest R. \"Chaffing and Winnowing: Confidentiality without Encryption\" http:\/\/people.csail.mit.edu\/rivest\/chaffing-980701.txt 1998."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_1_15_1","unstructured":"RSA Labs. \"A Cost-Based Security Analysis of Symmetric and Asymmetric Key Lengths.\" http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2088.  RSA Labs. \"A Cost-Based Security Analysis of Symmetric and Asymmetric Key Lengths.\" http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2088."},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Pointcheval D. \"New Public Key Cryptosystems based on the Dependent-RSA Problems.\" Advances in Cryptology-Proceedings of EUROCRYPT 1999.   Pointcheval D. \"New Public Key Cryptosystems based on the Dependent-RSA Problems.\" Advances in Cryptology-Proceedings of EUROCRYPT 1999.","DOI":"10.1007\/3-540-48910-X_17"},{"key":"e_1_2_1_17_1","unstructured":"Chaum D. \"Blind signatures for untraceable payments.\" CRYPTO 1998.  Chaum D. \"Blind signatures for untraceable payments.\" CRYPTO 1998."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Stinson D. \"Visual Cryptography and Threshold Schemes\" IEEE Potentials 1999.  Stinson D. \"Visual Cryptography and Threshold Schemes\" IEEE Potentials 1999.","DOI":"10.1109\/45.747238"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272848.1272878"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Rubin A. \"An experience teaching a graduate course in cryptography.\" Cryptologia .Volume 21 Number 2 1997.  Rubin A. \"An experience teaching a graduate course in cryptography.\" Cryptologia .Volume 21 Number 2 1997.","DOI":"10.1080\/0161-119791885832"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352247"}],"container-title":["ACM SIGCSE Bulletin"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1595453.1595485","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1595453.1595485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:04Z","timestamp":1750253404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1595453.1595485"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,25]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,6,25]]}},"alternative-id":["10.1145\/1595453.1595485"],"URL":"https:\/\/doi.org\/10.1145\/1595453.1595485","relation":{},"ISSN":["0097-8418"],"issn-type":[{"type":"print","value":"0097-8418"}],"subject":[],"published":{"date-parts":[[2009,6,25]]},"assertion":[{"value":"2009-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}