Skip to main content

Mathematik in der Geschichte

  • Chapter
  • First Online:
Die fabelhafte Welt der Mathematik
  • 594 Accesses

Zusammenfassung

Nach all den Spielen, Spielfilmen und Serien möchte ich nun das Augenmerk auf weitere interessante Geschichten lenken. Denn tatsächlich lesen sich manche Geschehnisse, die aus der Welt der Mathematik stammen, wie spannende Thriller.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 14.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 19.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Literaturverzeichnis

  1. Tóth LF (2011) Lagerungen in der Ebene auf der Kugel und im Raum. Springer, Berlin

    Google Scholar 

  2. Hales TC (2005) A proof of the Kepler conjecture. Ann Math 162(3):1065–1185

    Article  MathSciNet  Google Scholar 

  3. Merino O (2006) A Short History of Complex Numbers. https://www.math.uri.edu/~merino/spring06/mth562/ShortHistoryComplexNumbers2006.pdf. Zugegriffen am 27.02.2024

  4. Li Z-D (2021) Testing real quantum theory in an optical quantum network. ArXiv: 2111.15128

    Google Scholar 

  5. Livio M (2006) The equation that couldn't be solved. Simon and Schuster, New York

    Google Scholar 

  6. Grima P Cuantos peces hay en un lago? http://www.cvrecursosdidacticos.com/web/repository/1294683717_Peces_y_Taxis.pdf. Zugegriffen am 27.02.2024

  7. Cooley JW, Tukey JW (1965) An algorithm for the machine calculation of complex Fourier series. Math Comput 19:297–301

    Article  MathSciNet  Google Scholar 

  8. Muller D (2022) The Remarkable Story Behind The Most Important Algorithm Of All Time. Veritasium Youtube. https://www.youtube.com/watch?v=nmgFG7PUHfo. Zugegriffen am 27.02.2024

  9. Ford D (2004) Richard Garwin – Session IV. APS. https://www.aip.org/history-programs/niels-bohr-library/oral-histories/40912-8-4. Zugegriffen am 27.02.2024

  10. Walter WR et al (2007) Empirical observations of earthquake-explosion discrimination using p/s ratios and implications for the sources of explosion s-waves. In: 29th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies, Los Alamos National Laboratory, Los Alamos, NM (United States)

    Google Scholar 

  11. Cooley JW (1990) How the FFT gained acceptance. A history of scientific computing. Assoc Comput Mach 0201508141:133–140

    Google Scholar 

  12. Cooley JW (1987) The re-discovery of the fast Fourier transform algorithm. Mikrochimica Acta 93:33–45

    Article  Google Scholar 

  13. Gellman B, Poitras L (2013) U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. Washington Post. https://www.washingtonpost.com/ investigations / us - intelligence - mining-data-from-nine-us-internet-companies-in-broad-secret- program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html. Zugegriffen am 27.02.2024

  14. Levy S (1994) Prophet of Privacy. Wired. https://www.wired.com/1994/11/diffie/. Zugegriffen am 27.02.2024

  15. Levy S (2001) Crypto. Viking Press, New York

    Google Scholar 

  16. Feistel H (1973) Cryptography and Computer Privacy. Sci Am 228(5):15–23

    Article  Google Scholar 

  17. Schneier B (1996) Applied cryptography. Wiley, New Jersey

    Google Scholar 

  18. Corrigan-Gibbs H (2014) Keeping secrets. Stanford magazine. https://stanfordmag.org/contents/keeping-secrets. Zugegriffen am 27.02.2024

  19. Diffie W, Hellman ME (1976) Multiuser cryptographic techniques. In: Proceedings of the National Computer Conference and Exposition (AFIPS '76), 7–10 June, 1976. Association for Computing Machinery, New York, USA, S 109–112

    Google Scholar 

  20. Merkle RC (1978) Secure communications over insecure channels. Commun ACM 21(4): 294–299

    Article  Google Scholar 

  21. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  Google Scholar 

  22. Kolata GB (1977) Computer Encryption and the National Security Agency Connection. Science 197(4302):438–440

    Article  MathSciNet  Google Scholar 

  23. Hilts PJ (1980) Code Researchers Fear NSA's Control. Washington Post. https://www. washingtonpost.com/archive/politics/1980/08/28/code-researchers-fear-nsas-control/202fac0b- a116-4648-ba90-26927ed6802e/. Zugegriffen am 27.02.2024

  24. Burnham D (1983) The silent power of the NSA. 27 Mar, 1983, Section 6, S 60

    Google Scholar 

  25. Pöppe C (2019) Von der Kryptografie zum Weltfrieden. Spektrum Wiss 3:72–76

    Google Scholar 

  26. Levy S (1994) Cypher wars. Wired. https://www.wired.com/1994/11/cypher-wars/. Zugegriffen am 27.02.2024

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2024 Der/die Autor(en), exklusiv lizenziert an Springer-Verlag GmbH, DE, ein Teil von Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bischoff, M. (2024). Mathematik in der Geschichte. In: Die fabelhafte Welt der Mathematik. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-68432-0_7

Download citation

Publish with us

Policies and ethics