Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Melissa S. Keranen is active.

Publication


Featured researches published by Melissa S. Keranen.


Graphs and Combinatorics | 2013

The Hamilton-Waterloo Problem with 4-Cycles and a Single Factor of n-Cycles

Melissa S. Keranen; Sibel Özkan

A 2-factor in a graph G is a 2-regular spanning subgraph of G, and a 2-factorization of G is a decomposition of all the edges of G into edge-disjoint 2-factors. A


technical symposium on computer science education | 2012

ECvisual: a visualization tool for elliptic curve based ciphers

Jun Tao; Jun Ma; Melissa S. Keranen; Jean Mayo; Ching-Kuang Shene


technical symposium on computer science education | 2014

RSAvisual: a visualization tool for the RSA cipher

Jun Tao; Jun Ma; Melissa S. Keranen; Jean Mayo; Ching-Kuang Shene; Chaoli Wang

{\{C_{m}^{r}, C_{n}^{s}\}}


Discrete Mathematics | 2015

Enclosings of λ -fold 5-cycle systems for u = 2

John Asplund; C. A. Rodger; Melissa S. Keranen


integrating technology into computer science education | 2016

AESvisual: A Visualization Tool for the AES Cipher

Jun Ma; Jun Tao; Jean Mayo; Ching-Kuang Shene; Melissa S. Keranen; Chaoli Wang

-factorization of Kυ asks for a 2-factorization of Kυ, where r of the 2-factors consists of m-cycles, and s of the 2-factors consists of n-cycles. This is a case of the Hamilton-Waterloo problem with uniform cycle sizes m and n. If υ is even, then it is a decomposition of Kυ − F where a 1-factor F is removed from Kυ. We present necessary and sufficient conditions for the existence of a


technical symposium on computer science education | 2015

Teaching Cryptography and Access Control Hands-On (Abstract Only)

Steve Carr; Melissa S. Keranen; Jean Mayo


integrating technology into computer science education | 2015

VIGvisual: A Visualization Tool for the Vigenère Cipher

Can Li; Jun Ma; Jun Tao; Jean Mayo; Ching-Kuang Shene; Melissa S. Keranen; Chaoli Wang

{\{C_{4}^{r}, C_{n}^{1}\}}


Discrete Mathematics | 2014

f-vectors of pure complexes and pure multicomplexes of rank three

Charles J. Colbourn; Melissa S. Keranen; Donald L. Kreher


Designs, Codes and Cryptography | 2018

Some new Kirkman signal sets

Jezerca Hodaj; Melissa S. Keranen; Donald L. Kreher; Leah Tollefson

-factorization of Kυ − F.


Electronic Journal of Graph Theory and Applications (EJGTA) | 2017

Orientable Z_n-distance magic labeling of the Cartesian product of many cycles

Bryan Freyberg; Melissa S. Keranen

This paper describes a visualization tool ECvisual that helps students understand and instructors teach elliptic curve based ciphers. This tool permits the user to visualize elliptic curves over the real field and over a finite field of prime order, perform arithmetic operations, do encryption and decryption, and convert plaintext to a point on an elliptic curve. The demo mode of ECvisual can be used for classroom presentation and self-study. With the practice mode, the user may go through steps in finite field computations, encryption, decryption and plaintext conversion. The user may compute the output for each operation check each answer for correctness. This helps students understand the primitive operations and how they are used in an elliptic curve cipher. The opportunity for self-study provides an instructor greater flexibility in selecting a lecture pace for this detail-filled material. Classroom evaluation was positive and very encouraging.

Collaboration


Dive into the Melissa S. Keranen's collaboration.

Top Co-Authors

Avatar

Donald L. Kreher

Michigan Technological University

View shared research outputs
Top Co-Authors

Avatar

Jean Mayo

Michigan Technological University

View shared research outputs
Top Co-Authors

Avatar

Ching-Kuang Shene

Michigan Technological University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jun Ma

Michigan Technological University

View shared research outputs
Top Co-Authors

Avatar

Jun Tao

Michigan Technological University

View shared research outputs
Top Co-Authors

Avatar

Chaoli Wang

University of Notre Dame

View shared research outputs
Top Co-Authors

Avatar

Adrián Pastine

Michigan Technological University

View shared research outputs
Top Co-Authors

Avatar

Sibel Özkan

Gebze Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge