Real Life Cryptology / Benedek Láng ; translated from Hungarian by Teodóra Király and Benedek Láng.

A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the networ...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Baltimore, Maryland : : Project Muse,, 2020
©2020
Year of Publication:2018
2020
Language:English
Physical Description:1 online resource (1 EPUB unpaged) :; illustrations, facsimiles
Notes:Translation of: Titkosírás a kora újkori Magyarországon.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993547070104498
ctrlnum (CKB)4100000006675577
(OAPEN)1001507
(OCoLC)1178720882
(MdBmJHUP)muse76627
(oapen)https://directory.doabooks.org/handle/20.500.12854/35937
(EXLCZ)994100000006675577
collection bib_alma
record_format marc
spelling Láng, Benedek, 1974- author, translator.
Titkosírás a kora újkori Magyarországon. English
Real Life Cryptology Benedek Láng ; translated from Hungarian by Teodóra Király and Benedek Láng.
Amsterdam University Press 2018
Baltimore, Maryland : Project Muse, 2020
©2020
1 online resource (1 EPUB unpaged) : illustrations, facsimiles
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Undetermined.
A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of private applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
Description based on print version record.
Translation of: Titkosírás a kora újkori Magyarországon.
Includes bibliographical references and index.
Uncovered fields in the research literature -- Secret writings and attitudes - research questions -- theory and practice of cryptography in early modern Europe -- Ciphers in Hungary: the source material -- Ciphers in action -- Ways of knowledge transfer -- Scenes of secrecy.
Cryptography Hungary History.
Cryptography
Early modern history
History of science
Social history
94-6298-554-5
Király, Teodóra, translator.
language English
format Software
eBook
author Láng, Benedek, 1974-
spellingShingle Láng, Benedek, 1974-
Real Life Cryptology
Uncovered fields in the research literature -- Secret writings and attitudes - research questions -- theory and practice of cryptography in early modern Europe -- Ciphers in Hungary: the source material -- Ciphers in action -- Ways of knowledge transfer -- Scenes of secrecy.
author_facet Láng, Benedek, 1974-
Király, Teodóra,
author_variant b l bl
author_role VerfasserIn
author2 Király, Teodóra,
author2_variant b l bl
t k tk
author2_role TeilnehmendeR
author_sort Láng, Benedek, 1974-
title Real Life Cryptology
title_full Real Life Cryptology Benedek Láng ; translated from Hungarian by Teodóra Király and Benedek Láng.
title_fullStr Real Life Cryptology Benedek Láng ; translated from Hungarian by Teodóra Király and Benedek Láng.
title_full_unstemmed Real Life Cryptology Benedek Láng ; translated from Hungarian by Teodóra Király and Benedek Láng.
title_auth Real Life Cryptology
title_alt Titkosírás a kora újkori Magyarországon.
title_new Real Life Cryptology
title_sort real life cryptology
publisher Amsterdam University Press
Project Muse,
publishDate 2018
2020
physical 1 online resource (1 EPUB unpaged) : illustrations, facsimiles
contents Uncovered fields in the research literature -- Secret writings and attitudes - research questions -- theory and practice of cryptography in early modern Europe -- Ciphers in Hungary: the source material -- Ciphers in action -- Ways of knowledge transfer -- Scenes of secrecy.
isbn 94-6298-554-5
callnumber-first Z - Library Science
callnumber-subject Z - Books and Writing
callnumber-label Z103
callnumber-sort Z 3103.4 H86 L3613 42018
geographic_facet Hungary
illustrated Not Illustrated
dewey-hundreds 600 - Technology
dewey-tens 650 - Management & public relations
dewey-ones 652 - Processes of written communication
dewey-full 652/.809439
dewey-sort 3652 6809439
dewey-raw 652/.809439
dewey-search 652/.809439
oclc_num 1178720882
work_keys_str_mv AT langbenedek titkosirasakoraujkorimagyarorszagon
AT kiralyteodora titkosirasakoraujkorimagyarorszagon
AT langbenedek reallifecryptology
AT kiralyteodora reallifecryptology
status_str c
ids_txt_mv (CKB)4100000006675577
(OAPEN)1001507
(OCoLC)1178720882
(MdBmJHUP)muse76627
(oapen)https://directory.doabooks.org/handle/20.500.12854/35937
(EXLCZ)994100000006675577
carrierType_str_mv cr
is_hierarchy_title Real Life Cryptology
author2_original_writing_str_mv noLinkedField
_version_ 1796652220874227716
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03004cam a22005174a 4500</leader><controlfield tag="001">993547070104498</controlfield><controlfield tag="005">20230830125934.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cu#uuu---auuuu</controlfield><controlfield tag="008">200724s2018 ne o |00 0 eng d</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.5117/9789462985544</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000006675577</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OAPEN)1001507</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1178720882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MdBmJHUP)muse76627</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/35937</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000006675577</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MdBmJHUP</subfield><subfield code="c">MdBmJHUP</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">e-hu---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">Z103.4.H86</subfield><subfield code="b">L3613 2018</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">GPJ</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">652/.809439</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Láng, Benedek,</subfield><subfield code="d">1974-</subfield><subfield code="e">author,</subfield><subfield code="e">translator.</subfield></datafield><datafield tag="240" ind1="1" ind2="0"><subfield code="a">Titkosírás a kora újkori Magyarországon.</subfield><subfield code="l">English</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Real Life Cryptology</subfield><subfield code="c">Benedek Láng ; translated from Hungarian by Teodóra Király and Benedek Láng.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Amsterdam University Press</subfield><subfield code="c">2018</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Baltimore, Maryland :</subfield><subfield code="b">Project Muse,</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 EPUB unpaged) :</subfield><subfield code="b">illustrations, facsimiles</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">Undetermined.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of private applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Translation of: Titkosírás a kora újkori Magyarországon.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Uncovered fields in the research literature -- Secret writings and attitudes - research questions -- theory and practice of cryptography in early modern Europe -- Ciphers in Hungary: the source material -- Ciphers in action -- Ways of knowledge transfer -- Scenes of secrecy.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="z">Hungary</subfield><subfield code="x">History.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Early modern history</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">History of science</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social history</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">94-6298-554-5</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Király, Teodóra,</subfield><subfield code="e">translator.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-08-31 03:04:20 Europe/Vienna</subfield><subfield code="d">00</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2018-10-13 18:43:58 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338453610004498&amp;Force_direct=true</subfield><subfield code="Z">5338453610004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338453610004498</subfield></datafield></record></collection>