{"title":"2. Uncovered fields in the research literature","authors":"","doi":"10.1515/9789048536696-005","DOIUrl":"https://doi.org/10.1515/9789048536696-005","url":null,"abstract":"","PeriodicalId":208457,"journal":{"name":"Real Life Cryptology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129793648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Note on names","authors":"Fabian Persson","doi":"10.1515/9789048536696-003","DOIUrl":"https://doi.org/10.1515/9789048536696-003","url":null,"abstract":"","PeriodicalId":208457,"journal":{"name":"Real Life Cryptology","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132450555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"7. Ways of knowledge transfer","authors":"","doi":"10.1515/9789048536696-010","DOIUrl":"https://doi.org/10.1515/9789048536696-010","url":null,"abstract":"","PeriodicalId":208457,"journal":{"name":"Real Life Cryptology","volume":"27 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114211679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abbreviations","authors":"","doi":"10.1515/9789048536696-001","DOIUrl":"https://doi.org/10.1515/9789048536696-001","url":null,"abstract":"","PeriodicalId":208457,"journal":{"name":"Real Life Cryptology","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117111071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3. Secret writings and attitudes – research questions","authors":"","doi":"10.1515/9789048536696-006","DOIUrl":"https://doi.org/10.1515/9789048536696-006","url":null,"abstract":"","PeriodicalId":208457,"journal":{"name":"Real Life Cryptology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121402128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"8. Scenes of secrecy","authors":"","doi":"10.1515/9789048536696-011","DOIUrl":"https://doi.org/10.1515/9789048536696-011","url":null,"abstract":"","PeriodicalId":208457,"journal":{"name":"Real Life Cryptology","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124660568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frontmatter","authors":"","doi":"10.1515/9789048536696-fm","DOIUrl":"https://doi.org/10.1515/9789048536696-fm","url":null,"abstract":"","PeriodicalId":208457,"journal":{"name":"Real Life Cryptology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125761458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"6. Ciphers in action","authors":"","doi":"10.1515/9789048536696-009","DOIUrl":"https://doi.org/10.1515/9789048536696-009","url":null,"abstract":"","PeriodicalId":208457,"journal":{"name":"Real Life Cryptology","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126560651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Index","authors":"","doi":"10.1515/9789048536696-017","DOIUrl":"https://doi.org/10.1515/9789048536696-017","url":null,"abstract":"","PeriodicalId":208457,"journal":{"name":"Real Life Cryptology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"4. Theory and practice of cryptography in early modern Europe","authors":"","doi":"10.1515/9789048536696-007","DOIUrl":"https://doi.org/10.1515/9789048536696-007","url":null,"abstract":"We would not have to waste a lot of words on the pre-1400 history of cryptography if it were not for the Arabs. Most of the cryptographic methods in Latin and later in national languages remained on the level of simple substitutions until the late medieval centuries. In the beginning only vowels were substituted for signs that were made up of dots and then graphic symbols. Later every single letter of the plain text was replaced by a corresponding numeral, letter or symbol. That means that, as the ciphertext was being constructed, the user took the letters from the plain text one by one and wrote their corresponding symbol down in the secret (or rather encrypted) text. This method assigned one single string of symbols, numerals or letters to the original alphabet, in other words, it used one single code alphabet to encipher the plain text, and therefore this encryption is called the monoalphabetic cipher.","PeriodicalId":208457,"journal":{"name":"Real Life Cryptology","volume":"403 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116507579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}