1-7 of 7 Search Results for

cryptography

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
Poetics Today (2000) 21 (1): 221–262.
Published: 01 March 2000
......” is partly shaped by the syllables of the author's name. I call this process lyric cryptography . I justify cryptography by recourse not to authorial intention (Milton and Shakespeare may not even have been aware of the cryptographs I identify in their texts) but to what I call the textual act : the poet's...
Journal Article
Poetics Today (2000) 21 (1): 263–264.
Published: 01 March 2000
... Poetry (1994). He is presently at work on a libretto, Our American Cousin; a book-length poem, Wrong; and a work of criticism, Lyric Cryptography, from which his article in this issue is drawn. Tseng 2000.5.18 11:10 ...
Journal Article
Poetics Today (2000) 21 (1): 95–128.
Published: 01 March 2000
Journal Article
Poetics Today (2005) 26 (2): 175–207.
Published: 01 June 2005
... and the Art of Emily Dickinson (New York: Columbia University Press). Shoptaw, John 2000 “Lyric Cryptography,” Poetics Today 21 : 221 -62. Sicher, Efraim, ed. 1998 Breaking Crystal:Writing and Memory after Auschwitz (Urbana: University of Illinois Press). Small, Judy Jo 1990 Positive...
Journal Article
Poetics Today (2009) 30 (2): 155–205.
Published: 01 June 2009
Journal Article
Poetics Today (2010) 31 (1): 127–150.
Published: 01 March 2010
Journal Article
Poetics Today (2017) 38 (3): 519–548.
Published: 01 September 2017
...]) (Geoghegan 2011).2 Shannon’s ideas provided a scientific foundation for the new discipline of communication and were applied in cryptography and in measuring telephone traffic. His theory is that messages are distin- guished by selecting them from a set of possible messages, and “information” can thus...