Search Results for cryptography
1-2 of 2 Search Results for
boundary 2 (1 November 2017) 44 (4): 95–112.
Published: 01 November 2017
...David Golumbia The question of the militarization of language emerges from the politics surrounding cryptography, or the use of encryption in contemporary networked digital technology, and the intersection of encryption with the politics of language. Ultimately, cryptographic politics aims to...
boundary 2 (1 May 2000) 27 (2): 83–111.
Published: 01 May 2000
... motivates, for example, Poe’s ‘‘imp of the perverse which, in the public terms of his time, signiﬁes a motiveless and thus, for him, radically private impulse.14 It also accounts for his interest in cryptography and his rhetori- cal...