Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Cryptography and decryption have a long history, but recent historical studies show that Islamic civilization has been the root of the development of organized decryption methods. At the beginning of the Abbasid era, many scientific... more
    • by 
    •   3  
      History of MathematicsHistory of Cryptographyhistory of code breaking
This is a comined book review of Katherine Ellison, Susan Kim (eds.), A Material History of Medieval and Early Modern Ciphers. Cryptography and the History of Literacy, Routledge: Oxford 2018. && Katherine Ellison, A Cultural History... more
    • by 
    •   4  
      Early Modern HistoryCryptologyHistory of Cryptographyhistorical ciphers
    • by 
    •   3  
      AlchemySecrecyHistory of Cryptography
    • by 
    •   6  
      History of Cryptographyтайнописьцарь Алексей МихайловичИстория криптографии
Cryptography and magic are often associated. Ciphers—as means of secrecy —seem to find their natural place in magic texts. In traditional historiogra-phy, magic and alchemy were often represented as secretive, whereas modern science was... more
    • by 
    •   5  
      History of ScienceMagicSecrecyCryptography
Maximilian Gamer, Die Polygraphia des Johannes Trithemius. Zwei Fassungen eines frühneuzeitlichen Handbuchs zur Geheimschrift, in: Würzburger Humanismus, ed. Thomas Baier and Jochen Schultheiß, Tübingen 2015 (= NeoLatina 23), p. 121–­141.
    • by 
    •   2  
      History of CryptographyJohannes Trithemius
This book will investigate cryptography’s history, modern developments, use, and politics. The history of the ancient art of cryptography begins in 1900 BC, Egypt, and it continues to develop in modern civilization. This book will also... more
    • by  and +4
    •   10  
      ResearchCryptanalysisComputersOnline Media
    • by 
    •   13  
      Diplomatic HistoryOttoman HistoryEarly Modern HistoryIntelligence Studies
The point of departure of this study is a seemingly trivial question: how did “code” come to designate a key concept of linguistics and semiotics? It is generally held that the term migrated from information theory to linguistics in the... more
    • by 
    •   13  
      SemioticsInformation TheoryHistory of conceptsClaude Lévi-Strauss
Today we regard cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages and documents, as separate domains of activity. But the contiguity, even intimacy... more
    • by 
    •   40  
      PhilologyHumanities Computing (Digital Humanities)History Of ComputingComparative Literature
A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone,... more
    • by 
    •   7  
      Early Modern HistoryHistory of ScienceHistory of HungaryCryptography
This paper is the first scholarly attempt to examine the history of Chinese cryptography and the role it played in building the intelligence network of the Chinese Nationalist Party (KMT) from 1927 to 1949. Rather than investigating the... more
    • by 
    •   7  
      Chinese StudiesChinese Language and CultureModern Chinese HistoryCryptography
    • by 
    •   4  
      SecrecyIntelligence and EspionageHistory of CryptographyIntelligence and security studies
Apokrif evangélium vagy egyszerű imakönyv? Hamisítvány vagy hiteles történeti emlék? Elfeledett írás vagy szuperbiztos kód, esetleg mesterséges nyelv? Magyar, román, szanszkrit, latin, netalán török? A Rohonci kódex hírnevét különös... more
    • by 
    •   6  
      Artificial LanguagesHistory of CryptographyCodex of RohoncVoynich manuscript
    • by 
    •   5  
      Artificial LanguagesHistory of CryptographyCodex of RohoncVoynich manuscript
    • by 
    •   31  
      DiversityCold War and CultureHistory of ScienceCold War
    • by 
    •   4  
      History of HungaryCryptologyHistory of CryptographyCodebreaking
    • by 
    •   3  
      History of MathematicsHistory of CryptographyHistory of Philosophy
First discovered in a Hungarian library in 1838, the Rohonc Codex keeps privileged company with some of the most famous unsolved writing systems in the world, notably the Voynich manuscript, the Phaistos Disk, and Linear A. Written... more
    • by 
    •   8  
      Early Modern HistoryHistory of the BookHistory of ScienceCryptography
Maximilian Gamer, Die Chiffrenkunst des Baldanders – eine literarische Trithemius-Apologie Grimmelshausens? in: Simpliciana: Schriften der Grimmelshausen­Gesellschaft 36 (2015), p. 77–94.
    • by 
    •   3  
      History of CryptographySimplicissimusJohannes Trithemius
A brief look into the history around the treatment of encryption as a munition, regulated by governments like guns and missiles etc. Diffie and Hellman are discussed, as some thoughts on when information becomes a weapon, when math is a... more
    • by 
    •   7  
      History Of ComputingCryptographyPlatform Studiesscience and technology studies (STS)
    • by 
    •   6  
      Early Modern HistorySecrecyHistory of HungaryCryptology
    • by 
    •   4  
      CryptographyPalaeographyMedieval PalaeographyHistory of Cryptography
    • by 
    •   2  
      History of CryptographyVoynich manuscript
    • by 
    •   6  
      PKI (Cryptography)PrivacySurveillance StudiesInformation Security and Privacy
Hermann Pokorny was born in Kremisier (Moravia) on 7 April 1882. Pokorny in Great War managed to decipher almost all the Russian code keys and was employed by the Ministry of Foreign Affairs until his final retirement in 1949. When he... more
    • by 
    • History of Cryptography
    • by 
    •   3  
      Manuscript StudiesCryptologyHistory of Cryptography
    • by 
    •   3  
      Early Modern HistoryHistory of HungaryHistory of Cryptography
Today, most of us write in manners that we cannot peruse or ever would like to fathom; of course, composting is transposed into indescribable, encoded passages of "secure" data. However, on this research paper, I would like to touch upon... more
    • by 
    •   8  
      Translation StudiesMachine TranslationCryptographyTranslations
Today we regard cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages and documents, as separate domains of activity. But the contiguity, even intimacy... more
    • by 
    •   50  
      American LiteraturePhilologyAmerican StudiesHumanities Computing (Digital Humanities)
The current implementation of TLS involves your browser displaying a padlock, and a green bar, after successfully verifying the digital signature on the TLS certificate. Proposed is a solution where your browser's response to successful... more
    • by 
    •   49  
      Mathematics of CryptographyGame TheoryPKI (Cryptography)Game Theory (Psychology)
"Figl wuchs in Wien und Sarajevo auf. Mit vierzehn Jahren begann seine Ausbildung als Kadett. 1891 kam er als Leutnant nach Dalmatien. Nach einem Dienstunfall wurde er 1910 als Hauptmann in den Ruhestand versetzt. 1911 wurde er jedoch... more
    • by 
    • History of Cryptography
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,... more
    • by 
    •   20  
      Mathematics of CryptographyPKI (Cryptography)Applied CryptographyCryptography
    • by 
    •   4  
      Diplomatic HistoryDiplomatic StudiesCryptographyHistory of Cryptography
    • by 
    •   3  
      History of CryptographyBálint Balassi Neolatin poetry 16th centuryII. Rákóczi Ferenc
Resumen. Descripciones bibliográficas y análisis técnicos e históricos de los contenidos sobre criptografía y criptoanálisis en tres obras del dominio público, que fueron impresas entre los siglos XVII y XIX y cuyo tema general de fondo... more
    • by 
    •   4  
      History of DiplomacyHistory of CryptographyMathematical Recreationhistory of mexican cryptology
    • by 
    •   3  
      Early Modern HistoryHistory of HungaryHistory of Cryptography
    • by 
    •   2  
      Military HistoryHistory of Cryptography
    • by 
    •   20  
      Mathematics of CryptographyComputer ScienceQuantum CryptographyChaotic cryptography
    • by 
    • History of Cryptography
The Voynich manuscript is the book dated as fifteen century, written using specific and smart coding methods. This article describes the methods how it was analyzed and how coding keys were found. The last manuscript page decoding.... more
    • by 
    •   9  
      LogicHistory of LogicCryptographyCosmology
Ever since the British efforts to break Axis codes and ciphers during the Second World War were declassified in the 1970s, the subject of Government Code and Cipher School, the organisation responsible, Bletchley Park, its wartime... more
    • by 
    •   6  
      World War II historyWomen's Participation in World War I and IIHistory of CryptographyWomen in the Military Service
    • by 
    •   4  
      CryptologyTransfer of Training, Learning Transfer, Knowledge TransferHistory of CryptographyAthanasius Kircher
Resumen: Descripciones, criptoanálisis y comentarios técnicos e históricos a propósito de una serie de criptosistemas utilizados por diversos indi-viduos y grupos políticos en México entre 1907 y 1921. Abstract: Descriptions, analyses and... more
    • by 
    •   3  
      History of CryptographyHistoria diplomática de Méxicomexican diplomatic history
    • by 
    •   3  
      History of CryptographyCodex of RohoncRohonczi Kódex
    • by 
    •   4  
      Applied CryptographyInformation Technology LawCryptographyHistory of Cryptography
    • by 
    •   3  
      SecrecySocial HistoryHistory of Cryptography
    • by 
    •   7  
      CryptographyPractical knowledgeHistory of CryptographySteganography and Cryptography