{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:09:09Z","timestamp":1755839349373,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:00:00Z","timestamp":1657152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,7]]},"DOI":"10.1145\/3502718.3524767","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T10:28:30Z","timestamp":1657189710000},"page":"456-462","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Cryptography in Grade 10"],"prefix":"10.1145","author":[{"given":"Michael","family":"Lodi","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Bologna &amp; INRIA Sophia-Antipolis, Bologna, Italy"}]},{"given":"Marco","family":"Sbaraglia","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Bologna, Bologna, Italy"}]},{"given":"Simone","family":"Martini","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Bologna &amp; INRIA Sophia-Antipolis, Bologna, Italy"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"volume-title":"Proceedings of the 25th ACM Conference on Innovation & Technology in Computer Science Education","author":"Anane Rachid","key":"e_1_3_2_1_1_1","unstructured":"Rachid Anane and Mohammad T. Alshammari . 2020. A Dynamic Visualisation of the DES Algorithm and a Multi-Faceted Evaluation of Its Educational Value . In Proceedings of the 25th ACM Conference on Innovation & Technology in Computer Science Education ( Trondheim, Norway) (ITiCSE '20). ACM, New York, NY, USA, 370--376. https:\/\/doi.org\/10.1145\/3341525.3387386 10.1145\/3341525.3387386 Rachid Anane and Mohammad T. Alshammari. 2020. A Dynamic Visualisation of the DES Algorithm and a Multi-Faceted Evaluation of Its Educational Value. In Proceedings of the 25th ACM Conference on Innovation & Technology in Computer Science Education (Trondheim, Norway) (ITiCSE '20). ACM, New York, NY, USA, 370--376. https:\/\/doi.org\/10.1145\/3341525.3387386"},{"key":"e_1_3_2_1_2_1","first-page":"20","article-title":"Computer Science Unplugged: school students doing real computing without computers","volume":"13","author":"Bell Tim","year":"2009","unstructured":"Tim Bell , Jason Alexander , Isaac Freeman , and Mick Grimley . 2009 . Computer Science Unplugged: school students doing real computing without computers . New Zealand Journal of Applied Computing and Information Technology , Vol. 13 , 1 (2009), 20 -- 29 . Tim Bell, Jason Alexander, Isaac Freeman, and Mick Grimley. 2009. Computer Science Unplugged: school students doing real computing without computers. New Zealand Journal of Applied Computing and Information Technology , Vol. 13, 1 (2009), 20--29.","journal-title":"New Zealand Journal of Applied Computing and Information Technology"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-1315(02)00102-1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602490"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2325296.2325367"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445360"},{"key":"e_1_3_2_1_7_1","volume-title":"Joint Research Centre","author":"European Commission","year":"2017","unstructured":"European Commission . Joint Research Centre . 2017 . DigComp 2.1: the digital competence framework for citizens with eight proficiency levels and examples of use. Publications Office . https:\/\/doi.org\/10.2760\/38842 10.2760\/38842 European Commission. Joint Research Centre. 2017. DigComp 2.1: the digital competence framework for citizens with eight proficiency levels and examples of use. Publications Office. https:\/\/doi.org\/10.2760\/38842"},{"key":"e_1_3_2_1_8_1","unstructured":"CS Unplugged. [n.d.]. Principles. https:\/\/csunplugged.org\/en\/principles\/  CS Unplugged. [n.d.]. Principles. https:\/\/csunplugged.org\/en\/principles\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Department of Education. 2013. National curriculum in England: computing programmes of study . https:\/\/www.gov.uk\/government\/publications\/national-curriculum-in-england-computing-programmes-of-study  Department of Education. 2013. National curriculum in England: computing programmes of study . https:\/\/www.gov.uk\/government\/publications\/national-curriculum-in-england-computing-programmes-of-study"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287403"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.21585\/ijcses.v2i1.21"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481449.2481477"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677221"},{"key":"e_1_3_2_1_15_1","unstructured":"Mark Guzdial. 2021. Helping social studies teachers to teach data literacy with Teaspoon languages . https:\/\/computinged.wordpress.com\/2021\/12\/22\/helping-social-studies-teachers-to-teach-data-literacy-with-teaspoon-languages\/ Retrieved January 14 2022 from  Mark Guzdial. 2021. Helping social studies teachers to teach data literacy with Teaspoon languages . https:\/\/computinged.wordpress.com\/2021\/12\/22\/helping-social-studies-teachers-to-teach-data-literacy-with-teaspoon-languages\/ Retrieved January 14 2022 from"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3364510.3364532"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107632"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISECon.2014.6891029"},{"key":"e_1_3_2_1_20_1","article-title":"Experiential Learning Builds Cybersecurity Self-Efficacy in K-12 Students","volume":"2018","author":"Konak Abdullah","year":"2018","unstructured":"Abdullah Konak . 2018 . Experiential Learning Builds Cybersecurity Self-Efficacy in K-12 Students . Journal of Cybersecurity Education, Research and Practice , Vol. 2018 , 1 (2018). https:\/\/digitalcommons.kennesaw.edu\/jcerp\/vol2018\/iss1\/6 Abdullah Konak. 2018. Experiential Learning Builds Cybersecurity Self-Efficacy in K-12 Students . Journal of Cybersecurity Education, Research and Practice , Vol. 2018, 1 (2018). https:\/\/digitalcommons.kennesaw.edu\/jcerp\/vol2018\/iss1\/6","journal-title":"Journal of Cybersecurity Education, Research and Practice"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287450"},{"key":"e_1_3_2_1_22_1","unstructured":"Liceo Matematico [n.d.]. https:\/\/www.liceomatematico.it\/  Liceo Matematico [n.d.]. https:\/\/www.liceomatematico.it\/"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3421590.3421630"},{"key":"e_1_3_2_1_24_1","unstructured":"Michael Lodi Marco Sbaraglia and Simone Martini. 2021. Big Ideas of Cryptography in K-12. https:\/\/bigideascryptok12.bitbucket.io\/  Michael Lodi Marco Sbaraglia and Simone Martini. 2021. Big Ideas of Cryptography in K-12. https:\/\/bigideascryptok12.bitbucket.io\/"},{"key":"e_1_3_2_1_25_1","volume-title":"Loui and Maura Borrego","author":"Michael","year":"2019","unstructured":"Michael C. Loui and Maura Borrego . 2019 . Engineering Education Research. In The Cambridge Handbook of Computing Education Research. Cambridge University Press , 292--322. https:\/\/doi.org\/10.1017\/9781108654555.012 10.1017\/9781108654555.012 Michael C. Loui and Maura Borrego. 2019. Engineering Education Research. In The Cambridge Handbook of Computing Education Research. Cambridge University Press, 292--322. https:\/\/doi.org\/10.1017\/9781108654555.012"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899415.2899425"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352247"},{"key":"e_1_3_2_1_28_1","unstructured":"Jens M\u00f6nig and Brian Harvey. [n.d.]. Snap! - Build Your Own Blocks. https:\/\/snap.berkeley.edu\/  Jens M\u00f6nig and Brian Harvey. [n.d.]. Snap! - Build Your Own Blocks. https:\/\/snap.berkeley.edu\/"},{"key":"e_1_3_2_1_29_1","volume-title":"Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity .ACM","author":"Joint Task Force on Cybersecurity Education. 2018.","year":"1845","unstructured":"Joint Task Force on Cybersecurity Education. 2018. Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity .ACM , New York, NY, USA . https:\/\/dl.acm.org\/doi\/book\/10.1145\/3 1845 94 Joint Task Force on Cybersecurity Education. 2018. Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity .ACM, New York, NY, USA. https:\/\/dl.acm.org\/doi\/book\/10.1145\/3184594"},{"key":"e_1_3_2_1_30_1","volume-title":"Mindstorms: Children, Computers, and Powerful Ideas","author":"Papert Seymour","year":"1980","unstructured":"Seymour Papert . 1980 . Mindstorms: Children, Computers, and Powerful Ideas . Basic Books, Inc. , New York, NY, USA . Seymour Papert. 1980. Mindstorms: Children, Computers, and Powerful Ideas .Basic Books, Inc., New York, NY, USA."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3456565.3460017"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2021.28"},{"key":"e_1_3_2_1_33_1","first-page":"39","article-title":"Designing Web Labs for Teaching Security Concepts","volume":"25","author":"Schweitzer Dino","year":"2009","unstructured":"Dino Schweitzer and Jeff Boleng . 2009 . Designing Web Labs for Teaching Security Concepts . J. Comput. Sci. Coll. , Vol. 25 , 2 (2009), 39 -- 45 . Dino Schweitzer and Jeff Boleng. 2009. Designing Web Labs for Teaching Security Concepts. J. Comput. Sci. Coll. , Vol. 25, 2 (2009), 39--45.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1516595.1516626"},{"volume-title":"The code book : the science of secrecy from ancient Egypt to quantum cryptography .Fourth Estate","author":"Singh Simon","key":"e_1_3_2_1_35_1","unstructured":"Simon Singh . 1999. The code book : the science of secrecy from ancient Egypt to quantum cryptography .Fourth Estate , London . Simon Singh. 1999. The code book : the science of secrecy from ancient Egypt to quantum cryptography .Fourth Estate, London."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734302"},{"volume-title":"Educational theory , , Hassaskhah Jaleh (Ed.).","author":"Taber Keith S.","key":"e_1_3_2_1_37_1","unstructured":"Keith S. Taber . 2012. Constructivism as educational theory: Contingency in learning, and optimally guided instruction . In Educational theory , , Hassaskhah Jaleh (Ed.). Nova, New York, NY, USA , 39--61. Keith S. Taber. 2012. Constructivism as educational theory: Contingency in learning, and optimally guided instruction. In Educational theory , , Hassaskhah Jaleh (Ed.). Nova, New York, NY, USA, 39--61."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Sigmund Tobias and Thomas M. Duffy (Eds.). 2009. Constructivist instruction: Success or failure? Routledge.  Sigmund Tobias and Thomas M. Duffy (Eds.). 2009. Constructivist instruction: Success or failure? Routledge.","DOI":"10.4324\/9780203878842"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953174"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194707.3194709"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366816"},{"volume-title":"Wikipedia contributors","year":"2021","key":"e_1_3_2_1_42_1","unstructured":", Wikipedia contributors . 2021 . Diffie--Hellman key exchange -- Wikipedia, The Free Encyclopedia . https:\/\/en.wikipedia.org\/w\/index.php?title=Diffie%E2%80%93Hellman_key_exchange&oldid=1038627636 Retrieved August 13, 2021 from , Wikipedia contributors. 2021. Diffie--Hellman key exchange -- Wikipedia, The Free Encyclopedia . https:\/\/en.wikipedia.org\/w\/index.php?title=Diffie%E2%80%93Hellman_key_exchange&oldid=1038627636 Retrieved August 13, 2021 from"},{"volume-title":"Computational Thinking in Education","author":"Yadav Aman","key":"e_1_3_2_1_43_1","unstructured":"Aman Yadav and Ulf Dalvad Berthelsen . 2021. Computational Thinking in Education . Routledge . https:\/\/doi.org\/10.4324\/9781003102991 10.4324\/9781003102991 Aman Yadav and Ulf Dalvad Berthelsen. 2021. Computational Thinking in Education .Routledge. https:\/\/doi.org\/10.4324\/9781003102991"},{"volume-title":"Proc. of the 50th ACM Technical Symposium on Computer Science Education","author":"Zinkus Maximilian","key":"e_1_3_2_1_44_1","unstructured":"Maximilian Zinkus , Oliver Curry , Marina Moore , Zachary Peterson , and Zo\u00eb J. Wood . 2019. Fakesbook: A Social Networking Platform for Teaching Security and Privacy Concepts to Secondary School Students . In Proc. of the 50th ACM Technical Symposium on Computer Science Education ( Minneapolis, MN, USA) (SIGCSE '19). ACM, New York, NY, USA, 892--898. https:\/\/doi.org\/10.1145\/3287324.3287486 10.1145\/3287324.3287486 Maximilian Zinkus, Oliver Curry, Marina Moore, Zachary Peterson, and Zo\u00eb J. Wood. 2019. Fakesbook: A Social Networking Platform for Teaching Security and Privacy Concepts to Secondary School Students. In Proc. of the 50th ACM Technical Symposium on Computer Science Education (Minneapolis, MN, USA) (SIGCSE '19). ACM, New York, NY, USA, 892--898. https:\/\/doi.org\/10.1145\/3287324.3287486"}],"event":{"name":"ITiCSE 2022: Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Dublin Ireland","acronym":"ITiCSE 2022"},"container-title":["Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502718.3524767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3502718.3524767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:46Z","timestamp":1750183786000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502718.3524767"}},"subtitle":["Core Ideas with Snap! and Unplugged"],"short-title":[],"issued":{"date-parts":[[2022,7,7]]},"references-count":42,"alternative-id":["10.1145\/3502718.3524767","10.1145\/3502718"],"URL":"https:\/\/doi.org\/10.1145\/3502718.3524767","relation":{},"subject":[],"published":{"date-parts":[[2022,7,7]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}