Possible dialogues between power, mathematics and cryptography

Prometeica - Revista De Filosofía Y Ciencias 27:306-315 (2023)
  Copy   BIBTEX

Abstract

In this text we discuss how power, mathematics and cryptography establish dialogues that are considered critical for the present, but which have influence from the past and concerns for the future. We contextualize our reflections from a historical perspective, especially in the Brazilian context, and advance the debates about how cryptography, based on mathematical theories, influenced and dynamized wars. Going a little beyond this historical context, we present some reflections concerning the role of cryptography as a means of data security, one of the main discussions in contemporary society. In this reflection, we point out the position of power that the holders of this knowledge occupy, and that, in the scope of basic school, lacks important discussions for both teachers and students.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,928

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Quantum Cryptography.Serge Fehr - 2010 - Foundations of Physics 40 (5):494-531.
Discrete and continuous: a fundamental dichotomy in mathematics.James Franklin - 2017 - Journal of Humanistic Mathematics 7 (2):355-378.
Power Types in Explicit Mathematics?Gerhard Jager - 1997 - Journal of Symbolic Logic 62 (4):1142-1146.
Power types in explicit mathematics?Gerhard Jäger - 1997 - Journal of Symbolic Logic 62 (4):1142-1146.
Dialogues on causality and the limits of empiricism.William H. Brenner - 2003 - Philosophical Investigations 26 (1):1–23.
Being and Logos: Reading the Platonic Dialogues.John Sallis - 1975 - Pittsburgh,: Duquesne University Press; distributed by Humanities Press, Atlantic Highlands [N.J..
Explicit mathematics: power types and overloading.Thomas Studer - 2005 - Annals of Pure and Applied Logic 134 (2-3):284-302.
Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).

Analytics

Added to PP
2023-07-27

Downloads
1 (#1,901,639)

6 months
1 (#1,471,551)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references