1-7 of 7 Search Results for


Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
Poetics Today (2000) 21 (1): 221–262.
Published: 01 March 2000
......” is partly shaped by the syllables of the author's name. I call this process lyric cryptography . I justify cryptography by recourse not to authorial intention (Milton and Shakespeare may not even have been aware of the cryptographs I identify in their texts) but to what I call the textual act : the poet's...
Journal Article
Poetics Today (2000) 21 (1): 263–264.
Published: 01 March 2000
... Poetry (1994). He is presently at work on a libretto, Our American Cousin; a book-length poem, Wrong; and a work of criticism, Lyric Cryptography, from which his article in this issue is drawn. Tseng 2000.5.18 11:10 ...
Journal Article
Poetics Today (2000) 21 (1): 95–128.
Published: 01 March 2000
... Whether focusing specifically on the legacy of poetry written in the Nazi camps, on the emergence of new avant-garde ambitions in American poetry since World War II, on aspects of ‘‘lyric cryptography’’ in works as different...
Journal Article
Poetics Today (2005) 26 (2): 175–207.
Published: 01 June 2005
... and the Art of Emily Dickinson (New York: Columbia University Press). Shoptaw, John 2000 “Lyric Cryptography,” Poetics Today 21 : 221 -62. Sicher, Efraim, ed. 1998 Breaking Crystal:Writing and Memory after Auschwitz (Urbana: University of Illinois Press). Small, Judy Jo 1990 Positive...
Journal Article
Poetics Today (2009) 30 (2): 155–205.
Published: 01 June 2009
... talk (“passel of fibs All of these impressions merge into an unbearable mental torture (“the woodpecker hammering” on his shoulders), with the only way out— and back to sanity—being the suicidal leap. 23.  John Shoptaw (2000: 225) calls this poetic device a phonemic cryptography and ana- lyzes...
Journal Article
Poetics Today (2010) 31 (1): 127–150.
Published: 01 March 2010
... James’s “The Figure in the Carpet” as the symbol of the her- meneutic puzzles engendered by constrained writing, the author regards the use of constraints as a form of cryptography. The article analyzes a number of strategies, some textual, others extratextual, that are available to all writers...
Journal Article
Poetics Today (2017) 38 (3): 519–548.
Published: 01 September 2017
...]) (Geoghegan 2011).2 Shannon’s ideas provided a scientific foundation for the new discipline of communication and were applied in cryptography and in measuring telephone traffic. His theory is that messages are distin- guished by selecting them from a set of possible messages, and “information” can thus...