{"id":"https://openalex.org/W2153934276","doi":"https://doi.org/10.1145/2538862.2538891","title":"RSAvisual","display_name":"RSAvisual","publication_year":2014,"publication_date":"2014-02-18","ids":{"openalex":"https://openalex.org/W2153934276","doi":"https://doi.org/10.1145/2538862.2538891","mag":"2153934276"},"language":"en","primary_location":{"id":"doi:10.1145/2538862.2538891","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2538862.2538891","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 45th ACM technical symposium on Computer science education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101829011","display_name":"Jun Tao","orcid":"https://orcid.org/0000-0003-4247-3490"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jun Tao","raw_affiliation_strings":["Michigan Technological University, Houghton, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100643102","display_name":"Jun Ma","orcid":"https://orcid.org/0000-0003-4679-9500"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jun Ma","raw_affiliation_strings":["Michigan Technological University, Houghton, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005886761","display_name":"Melissa Keranen","orcid":"https://orcid.org/0000-0001-7172-0791"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Melissa Keranen","raw_affiliation_strings":["Michigan Technological University, Houghton, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011288040","display_name":"Jean Mayo","orcid":null},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jean Mayo","raw_affiliation_strings":["Michigan Technological University, Houghton, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113860311","display_name":"Ching-Kuang Shene","orcid":null},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ching-Kuang Shene","raw_affiliation_strings":["Michigan Technological University, Houghton, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101913449","display_name":"Chaoli Wang","orcid":"https://orcid.org/0000-0002-0859-3619"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chaoli Wang","raw_affiliation_strings":["Michigan Technological University, Houghton, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101829011"],"corresponding_institution_ids":["https://openalex.org/I11957088"],"apc_list":null,"apc_paid":null,"fwci":4.937,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95353357,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"635","last_page":"640"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9635000228881836,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9635000228881836,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9544000029563904,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9444000124931335,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8012018203735352},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7466868162155151},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6659583449363708},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.599926769733429},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.5368236899375916},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5062016844749451},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4989194869995117},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4101223647594452},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3672142028808594},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.3344815969467163},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.298337459564209},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19115802645683289},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1768418550491333},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11208787560462952}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8012018203735352},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7466868162155151},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6659583449363708},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.599926769733429},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.5368236899375916},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5062016844749451},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4989194869995117},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4101223647594452},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3672142028808594},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3344815969467163},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.298337459564209},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19115802645683289},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1768418550491333},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11208787560462952},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2538862.2538891","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2538862.2538891","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 45th ACM technical symposium on Computer science education","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.mtu.edu:michigantech-p-31845","is_oa":false,"landing_page_url":"https://digitalcommons.mtu.edu/michigantech-p/12543","pdf_url":null,"source":{"id":"https://openalex.org/S4377196391","display_name":"Digital Commons - Michigan Tech (Michigan Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11957088","host_organization_name":"Michigan Technological University","host_organization_lineage":["https://openalex.org/I11957088"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Michigan Tech Publications, Part 1","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education","score":0.8700000047683716}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W64760530","https://openalex.org/W117007327","https://openalex.org/W1485340852","https://openalex.org/W1536477026","https://openalex.org/W1537626131","https://openalex.org/W1585665690","https://openalex.org/W1585799586","https://openalex.org/W1660562555","https://openalex.org/W1882297107","https://openalex.org/W1967112150","https://openalex.org/W2024805933","https://openalex.org/W2159341052","https://openalex.org/W2770583616","https://openalex.org/W2993593709","https://openalex.org/W3144584587","https://openalex.org/W4292924377","https://openalex.org/W4302555764","https://openalex.org/W6628878527","https://openalex.org/W6631972305","https://openalex.org/W6632379189","https://openalex.org/W6639317341","https://openalex.org/W6842549600"],"related_works":["https://openalex.org/W4386468470","https://openalex.org/W4206658950","https://openalex.org/W2026278835","https://openalex.org/W2092816212","https://openalex.org/W4377081117","https://openalex.org/W2251323683","https://openalex.org/W4390045652","https://openalex.org/W2078947311","https://openalex.org/W138071016","https://openalex.org/W2917292502"],"abstract_inverted_index":{"This":[0,17,94],"paper":[1],"describes":[2],"a":[3,122],"visualization":[4],"tool":[5,18],"RSAvisual":[6,47],"that":[7],"helps":[8,95],"students":[9,96],"learn":[10,34,97],"and":[11,32,38,54,77,90,101,133],"instructors":[12],"teach":[13],"the":[14,20,24,27,57,60,69,85,98,107,126],"RSA":[15,28,108],"cipher.":[16,109],"permits":[19],"user":[21,61,82],"to":[22],"visualize":[23],"steps":[25,65],"of":[26,46,87],"cipher,":[29],"do":[30],"encryption":[31],"decryption,":[33,68],"simple":[35,74],"factorization":[36,75],"algorithms,":[37],"perform":[39],"some":[40],"elementary":[41,79],"attacks.":[42,80],"The":[43,81,110],"demo":[44],"mode":[45],"can":[48],"be":[49],"used":[50,105],"for":[51,92,112,125],"classroom":[52],"presentation":[53],"self-study.":[55],"With":[56],"practice":[58],"mode,":[59],"may":[62,83],"go":[63],"through":[64],"in":[66,106,120],"encryption,":[67],"Extended":[70],"Euclidean":[71],"algorithm,":[72],"two":[73],"algorithms":[76],"three":[78],"compute":[84],"output":[86],"each":[88],"operation":[89],"check":[91],"correctness.":[93],"primitive":[99],"operations":[100],"how":[102],"they":[103],"are":[104],"opportunity":[111],"self-study":[113],"provides":[114],"an":[115],"instructor":[116],"with":[117],"greater":[118],"flexibility":[119],"selecting":[121],"lecture":[123],"pace":[124],"detailed":[127],"materials.":[128],"Classroom":[129],"evaluation":[130],"was":[131],"positive":[132],"very":[134],"encouraging.":[135]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-06-24T00:00:00"}
