The Exciting World of Mathematics
Mathematical Madman Craig Bauer
Elementary Analysis II
I was on a leave of absence for the 2011-2012 academic year to serve as the Scholar-in-Residence at NSAs Center for Cryptologic History. It was a fantastic experience and I highly recommend NSA to any students searching for a meaningful career.
Ive taken the opportunity to broaden myself mathematically by teaching a wide range of classes over the years.
MA 107 History of Codes and Ciphers
MA 111 Critical Thinking and Problem Solving
MA 120 Applied Calculus
MA 171 Calculus I
MA 172 Calculus II
MA 230 Exploring Mathematics with the Computer
MA 235 Discrete Mathematics
MA 260 Linear Algebra
MAT 280 Math Structures
MAT 350 Probability and Statistics
MAT 361 Abstract Algebra
MA 371 Advanced Calculus I
MA 372 Advanced Calculus II
MA 391 Cryptology
MA 480 Topology
MA 490 Mathematics Internship
MA 496 Reading and Research in Mathematics
1. Secret History: The Story of Cryptology, CRC / Chapman Hall, 2013.
To see the exercises for Chapters 1 through 6, click here.
To see the exercises for Chapters 7 through 19, click here.
2. A second book is in progress. The initial work was supported by the National Security Agencys Center for Cryptologic History, under their Scholar-in-Residence program. Thank you!
Math is social! Many of the papers listed below have coauthors. My coauthors on 2, 4, and 6 were all undergraduates when the work was being done.
1. Triangular Monoids and an Analog to the Derived Sequence of a Solvable Group, International Journal of Algebra and Computation, Vol. 10, No. 3 (2000) 309-321.
2. A Statistical Attack on the Running Key Cipher, Cryptologia, Vol. 26, No. 4 (2002) 274-282.
(coauthored with Christian N. S. Tate).
3. Cryptology in York Pennsylvania, Cryptologia, Vol. 29, No. 2 (2005). (coauthored with Suzanne Gladfelter)
4. Results of an Automated Attack on the Running Key Cipher, Cryptologia, Vol.29, No. 3 (2005). (coauthored with Elliott J. Gottloeb)
5. The Cryptologic Contributions of Dr. Donald Menzel, Cryptologia, Vol. 30, No. 4 (2006).
(coauthored with John Ulrich)
6. Cracking Matrix Encryption Row by Row, Cryptologia, Vol. 31, No. 1 (2007). (coauthored with Katherine Millward)
7. From the Archives: Reading Stimsons Mail, Cryptologia, Vol. 31, No. 2 (2007) (coauthored with Joel Burkholder)
8. Exploring Mathematics with the Computer, PRIMUS, Vol. 20, No. 1 (2010). This paper was recognized by the publisher as being PRIMUSs most downloaded paper of 2010. It was put on thumb drives, along with a few other papers, and distributed freely by the publisher at the 2011 Joint Mathematics Meetings.
9. Cornelia Meigs: A Persistent Patriot, History Today, (December 8, 2011) This is an NSA in-house electronic publication.
10. entry on Cryptanalysis for the Encyclopedia Of U.S. Intelligence, edited by Dr. Greg Moore (to appear)
11. The Myth of the Rebel Newspaper Ads (to appear)
12. Return of the Zodiac? (to appear)
13. Zodiac in New York? (to appear)
14. The Mysterious Death of Paul Rubin (to appear)
15. How Modular Arithmetic Helped win World War II (to appear)
16. Alan Turing and Voice Encryption: A Play in Three Acts (to appear)
I enjoy visiting other campuses to meet with colleagues and lecture. Some recent talks are listed below.
1. United States Military Academy (West Point, New York) Extreme Ciphers April 3, 2006.
2. Winters Mill High School (Westminster, Maryland) Cryptologic Careers November 15, 2006.
3. The Cardinal Gibbons School (Baltimore, Maryland) An Overview of Cryptology November 20, 2006.
4. University of Richmond (Richmond, Virginia) Cracking Matrix Encryption Row by Row September 24, 2007.
5. Gettysburg College (Gettysburg, Pennsylvania) A New Connection Between the Triangles of Stirling and Pascal October 18, 2007.
6. Northern Kentucky University (Highland Heights, Kentucky) Cryptanalysis of the Running Key Cipher & Cryptology on Campus During WW II (two talks) November 5, 2007.
7. Joint Mathematics Meetings (San Diego, California) Cryptology on Campus During World War II - January 8, 2008.
8. Mount St. Marys University, (Emmitsburg, Maryland) A New Connection Between the Triangles of Stirling and Pascal November 3, 2008.
9. Philadelphia Area Seminar on the History of Mathematics (PASHoM), Villanova University (Philadelphia, Pennsylvania) Cryptology on campus during World War II - September 17, 2009.
10. Cryptologic History Symposium (Laurel, Maryland) - The Early History of Teaching Cryptology - October 15, 2009.
11. DeVry University (North Brunswick, New Jersey) Turning Japanese (ciphers into intelligence) October 8, 2010.
12. William Penn High School (York, PA) How the Enigma Machine Worked and How it Was Cracked November 5, 2010.
13. Jewish Community Center (York, PA) Kosher Crypto August 28, 2011.
14. Franklin and Marshall College (Lancaster, Pennsylvania) A Detailed Look at How the Nazi Enigma Ciphers Were Broken Along with the Historical Background and Impact September 22, 2011.
15. Cryptologic History Symposium (Laurel, Maryland) Open Problems in Cryptologic History October 6, 2011.
16. Research and Engineering Building, NSA (Fort Meade, Maryland) Stirling Numbers of the 2nd Kind and the Fundamental Interconnectedness of All Things November 2, 2011.
17. William Penn High School (York, Pennsylvania) Matrix Encryption History and Attacks November 10, 2011.
18. William Penn High School (York, Pennsylvania) Matrix Encryption History and Attacks Part II December 12, 2011.
19. Joint Mathematics Meetings (Boston, Massachusetts) Alan Turings Work on Voice Encryption January 5, 2012.
20. NSAs Women in Math Society (WiMS) (Fort Meade, Maryland) Top 10 Coolest Mathematical Results You Haven't Heard Of February 23, 2012.
21. Charlotte International Cryptologic Symposium Crypto Math March 22, 2012.
22. North Carolina State University (Raleigh, North Carolina) Alan Turings Work on Ciphony April 18, 2012.
23. North Carolina State University (Raleigh, North Carolina) A Detailed Look at How the Nazi Enigma Ciphers Were Broken Along with the Historical Background and Impact April 20, 2012.
24. National Security Agency, Friedman auditorium (Fort Meade, Maryland) An Anecdotal History of Cryptologic Journals April 30, 2012.
25. National Cryptologic Museum (Fort Meade, Maryland) An Anecdotal History of Cryptologic Journals May 1, 2012.
26. William Penn High School Alan Turing and Voice Encryption (York, PA) May 18 2012.
27. Sons of Norway (Lancaster, PA) May 18 2012.
28. William Penn High School RSA York, PA 22 May 22, 2012
29. National Cryptologic Museum (Fort Meade, Maryland) How the Poles Broke Enigma July 23, 2012.
30. Turing 100 Conference, Boston University (Boston, Massachusetts) Alan Turing and Voice Encryption November 11, 2012.
31. SIGSALY Americas Unbreakable Voice Encryption National Electronics Museum (Linthicum, Maryland) November 14, 2012.
32. Enigma: The Cipher Machine that Changed WW II University of South Carolina Upstate (Spartanburg, South Carolina) March 28, 2013.
33. Enigma: The Cipher Machine that Changed World War II Camden County College (Camden, New Jersey) April 8, 2013.
34. Fun with Entropy National Cryptologic Museum (Fort Meade, Maryland) April 22, 2013.
35. Unsolved: The Worlds Greatest Codes and / or Ciphers US Naval Academy (Annapolis, Maryland) April 24, 2013
36. Zodiac in New York National Cryptologic Museum (Fort Meade, Maryland) June 26, 2013.
37. Turning Japanese (Ciphers into Plaintext) National Cryptologic Museum (Fort Meade, Maryland) August 8, 2013.
38. A History of Public Key Cryptography National Cryptologic Museum (Fort Meade, Maryland) September 6, 2013.
39. How the Poles Beat the Nazis (in the Cipher War) - Drexel University October 9, 2013.
40. Alan Turings Work on Voice Encryption - Cryptologic History Symposium (Laurel, Maryland) - October 17, 2013
Rise Over The Run
· mp3 file
I Don't Wanna Love You
· mp3 file