Lewis Carroll’s ciphers: The literary connections
نویسنده
چکیده
Charles L. Dodgson, who lectured on mathematics at Christ Church in Oxford University, constructed ciphers that were state of the art in his time. In poems and letters he demonstrated a great talent for creating acrostics and anagrams. In this paper I describe the ciphers closely and argue that their creation was intertwined with his word game inventions. 2005 Elsevier Inc. All rights reserved.
منابع مشابه
A Psychological Approach to the Wicked Women in Lewis Carroll’s Alice in Wonderland and Neil Gaiman’s Coraline
متن کامل
Critical Discourse Analysis of Two Persian Translations of Lewis Carroll’s Alice’s Adventures in Wonderland Framed in Farahzad’s CDA Model
Framed in Farahzad’s (2009) critical discourse analysis (CDA) model, the present research aimed at analyzing these influences in two Persian translations of Alice’s Adventures in Wonderland at micro and macro levels. To do so, the textual features at micro-level, while the constituent aspects about the translated texts at macro-level were examined. As to the micro-level analysis, it was found t...
متن کاملNested Venn Diagrams
Nesting is used to extend Venn Diagrams from their usual practical limit of three or four sets to a form that readily handles five to eight sets. Although devised independently, such nested diagrams can be viewed as the application to Venn Diagrams of an idea proposed in 1896 by Lewis Carroll, in the context of his alternative set diagrams. Such nesting is rarely if ever used today, but has gen...
متن کاملAn African Perspective
This chapter explores the nature of corporate social responsibility (CSR) in an African context, using Carroll’s CSR Pyramid as a framework for descriptive analysis. Carroll’s CSR Pyramid is probably the most well-known model of CSR, with its four levels indicating the relative importance of economic, legal, ethical and philanthropic responsibilities respectively. However, the exploration of CS...
متن کاملStream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کامل