|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
DEGRUYTEROA_on1076750916 |
003 |
OCoLC |
005 |
20240209213017.0 |
006 |
m o d |
007 |
cu uuu---auuuu |
008 |
180921s2018 xx o 000 u und d |
040 |
|
|
|a LVT
|b eng
|e pn
|c LVT
|d OCLCQ
|d OAPEN
|d OCLCQ
|d JSTOR
|d DEGRU
|d OCLCF
|d C6I
|d DIPCC
|d UKKNU
|d OIP
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1159394727
|
020 |
|
|
|a 9789462985544
|q (electronic bk.)
|
020 |
|
|
|a 9462985545
|q (electronic bk.)
|
020 |
|
|
|a 9789048536696
|q (electronic bk.)
|
020 |
|
|
|a 9048536693
|q (electronic bk.)
|
024 |
7 |
|
|a 10.5117/9789462985544
|2 doi
|
029 |
1 |
|
|a AU@
|b 000065211780
|
029 |
1 |
|
|a AU@
|b 000068775025
|
029 |
1 |
|
|a AU@
|b 000072297728
|
035 |
|
|
|a (OCoLC)1076750916
|z (OCoLC)1159394727
|
037 |
|
|
|a 22573/ctvfpvfw1
|b JSTOR
|
050 |
|
4 |
|a Z103.4.H86
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
082 |
0 |
4 |
|a 306.09
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Láng, Benedek,
|d 1974-
|1 https://id.oclc.org/worldcat/entity/E39PCjvkxHbprG3jYtPKmmmmkC
|
245 |
1 |
0 |
|a Real Life Cryptology.
|
260 |
|
|
|b Amsterdam University Press
|c 2018.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of?private? applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
|
546 |
|
|
|a Undetermined.
|
505 |
0 |
0 |
|t Frontmatter --
|t Table of contents --
|t Abbreviations --
|t Note on terminology --
|t Note on names --
|t 1. Introduction --
|t 2. Uncovered fields in the research literature --
|t 3. Secret writings and attitudes - research questions --
|t 4. Theory and practice of cryptography in early modern Europe --
|t 5. Ciphers in Hungary: the source material --
|t 6. Ciphers in action --
|t 7. Ways of knowledge transfer --
|t 8. Scenes of secrecy --
|t 9. Summary --
|t 10. Appendix --
|t Acknowledgements --
|t Earlier publications --
|t Bibliography --
|t Index
|
590 |
|
|
|a De Gruyter Online
|b De Gruyter Open Access eBooks
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Open Access
|
650 |
|
0 |
|a Cryptography
|z Hungary
|x History.
|
650 |
|
6 |
|a Cryptographie
|z Hongrie
|x Histoire.
|
650 |
|
7 |
|a Coding theory & cryptology.
|2 bicssc
|
650 |
|
7 |
|a HISTORY / Europe / Austria & Hungary.
|2 bisacsh
|
650 |
|
7 |
|a Cryptography
|2 fast
|
651 |
|
7 |
|a Hungary
|2 fast
|1 https://id.oclc.org/worldcat/entity/E39PBJqBtb4QKCYGrVyyWtMQMP
|
653 |
|
|
|a Cryptography.
|
653 |
|
|
|a Early modern history.
|
653 |
|
|
|a History of science.
|
653 |
|
|
|a Social history.
|
655 |
|
7 |
|a History
|2 fast
|
758 |
|
|
|i has work:
|a Real Life Cryptology (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCG9tDPv9CcQGt3prQJJfmb
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
856 |
4 |
0 |
|u https://www.degruyter.com/openurl?genre=book&isbn=9789048536696
|z Texto completo
|
938 |
|
|
|a Knowledge Unlatched
|b KNOW
|n 78a0a707-aea1-4325-a362-849a20d55cd2
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9789048536696
|
938 |
|
|
|a OAPEN Foundation
|b OPEN
|n 1001507
|
938 |
|
|
|a DCS UAT TEST 8
|b TEST
|n 1001507
|
994 |
|
|
|a 92
|b IZTAP
|