Article published In:
Historiographia Linguistica
Vol. 40:3 (2013) ► pp.303330
References
Alberti, Leon Battista
2010 [1467] “De Componendis Cifris”. Translated by Kim Williams. The Mathematical Work of Leon Battista Alberti ed. by Kim Williams, Lionel March & Stephen R. Wassel, 171–200. Basel: Birkäuser-Springer.Google Scholar
Al-Kadi, Ibrahim A.
1992 “Origins of Cryptology: The Arab contributions”. Cryptologia 161.97–126. DOI logoGoogle Scholar
Andresen, Julie T[etel]
1996Linguistics in America, 1769–1924: A critical history. London: Routledge.Google Scholar
Babbage, Charles
1832 “On the Advantage of a Collection of Numbers, to be Entitled the Constants of Nature and Art”. Edinburgh Journal of Science, New Series 61.334–340.Google Scholar
1864Passages from the Life of a Philosopher. London: Green.Google Scholar
Bailey, Richard W[eld]
1969 “Statistics and Style: A historical survey”. Statistics and Style ed. by Lubomir Doložel & Richard W. Bailey, 217–236. New York: American Elsevier.Google Scholar
Bauer, Friedrich L.
2007 [1 1997] Decrypted Secrets: Methods and maxims of cryptology. 4th ed. Berlin: Springer.Google Scholar
Birgegård, Ulla
1985Johan Gabriel Sparwenfeld and the Lexicon Slavonicum: His contribution to 17th century Slavonic lexicography. Uppsala: Almqvist & Wiksell for the Bibliotheca R[egalis] Universitatis Upsaliensis.Google Scholar
Breithaupt, Christian
1737Ars Decifratoria sive Sciencia occultas scripturas solvendi et legendi. Helmstedt: Weygand.Google Scholar
Brillouin, Léon
2004 [1 1956] Science and Information Theory. Mineola, N.Y.: Dover.Google Scholar
Burke, Peter
2012A Social History of Knowledge. Volume II: From the Encyclopédie to Wikipedia. Cambridge: Polity Press.Google Scholar
Carnicer García, Carlos J. & Javier Marcos Rivas
2005Espías de Felipe II: Los servicios secretos del imperio español. Madrid: la Esfera de los Libros.Google Scholar
Conradi, David Arnold
1739Cryptographia denudata, sive Ars decifrandi. Leiden: Philippus Bonk.Google Scholar
[Conradi, David Arnold
] 1742 “The Art of Deciphering”. The Gentleman’s Magazine 121.133–135, 185–186, 241–242, 473–475.Google Scholar
Cover, Thomas M. & Joy A. Thomas
2006Elements of Information Theory. New York: Wiley.Google Scholar
Davies, Damian W.
2002Presences that Disturb: Models of Romantic Influence in the Literature and Culture of the 1790s. Cardiff: University of Wales Press.Google Scholar
Davys, John
1737An Essay on the Art of Decyphering. London: Gilliver & Clarke.Google Scholar
De Morgan, Augustus
1882 [1851] “Letter to Rev. W. Heald Aug. 18, 1851”. Memoir of Augustus De Morgan ed. by Sophia Elizabeth De Morgan, 214–216. London: Green.Google Scholar
Falconer, John
1685Cryptomenysis Patefacta or the Art of Secret Information Disclosed without a Key. London: Brown.Google Scholar
Friedman, William F.
1936 “Edgar Allan Poe, Cryptographer”. American Literature 81.266–280. DOI logoGoogle Scholar
Good, Irving J.
1979 “Studies in the History of Probability and Statistics. XXXVII: A. M. Turing’s statistical work in World War II”. Biometrika 661.393–396. DOI logoGoogle Scholar
Grafton, Anthony
2000Leon Battista Alberti, Master Builder of the Italian Renaissance. Cambridge, Mass.: Harvard University Press.Google Scholar
Grieve, Jack W.
2005Quantitative Authorship Attribution: A history and an evaluation of techniques. M.A. thesis, Simon Fraser University, Burnaby, B.C.Google Scholar
Hacking, Ian
1990The Taming of Chance. Cambridge: Cambridge University Press. DOI logoGoogle Scholar
Hastings, James
1902Dictionary of the Bible Dealing with its Language, Literature, and Contents. Vol. IV (pleroma – zuzim). New York: Charles Scribner’s Sons.Google Scholar
Hitt, Parker
1916Manual for the Solution of Military Ciphers. Fort Leavenworth, Kansas: Press of the Army Service Schools.Google Scholar
Hufbauer, Karl
1982The Formation of the German Chemical Community (1720–1795). Berkeley: University of California Press.Google Scholar
Kahn, David
1996 [1 1967] The Codebreakers: The story of secret writing. Rev. ed. New York: Scribner.Google Scholar
Kelley, Page H., Daniel S. Mynatt & Timothy G. Crawford
1998The Masorah of Biblia Hebraica Stuttgartensia. Grand Rapids, Mich.: Eerdmans.Google Scholar
Klüber, Johannes Ludwig
1809Kryptographik: Lehrbuch der Geheimschreibekunst (Chiffrirund Dechiffrirkunst). Tübingen: J. G. Cotta.Google Scholar
Kraus, Kari
2009 “Conjectural Criticism: Computing past and future texts”. Digital Humanities Quarterly 3:4. No page given.Google Scholar
Kullback, Solomon
1976Statistical Methods in Cryptanalysis. Laguna Hills, Calif.: Aegean Park Press.Google Scholar
Lieber, Francis
1835 “Consonants”. Encyclopedia Americana ed. by Francis Lieber, Edward Wigglesworth, Thomas G. Bradford & Henry Vethake, vol. III1, 449–453 Philadelphia: Desilvern.Google Scholar
Link, David
2006a “Traces of the Mouth: Andrei Adreyevich Markov’s mathematization of writing”. History of Science 441.321–348. DOI logoGoogle Scholar
2006b “Chains to the West. Markov’s theory of connected events and its transmission to Western Europe”. Science in Context 191.561–589. DOI logoGoogle Scholar
Markov, Andrey A.
2006 [1913] “An Example of Statistical Investigation of the Text Eugene Onegin Concerning the Connection of Samples in Chains”. Translated by Gloria Custance and David Link. Science in Context 191.591–600. DOI logoGoogle Scholar
Meister, Aloys
1906Die Geheimschrift im Dienste der Päpstlichen Kurie von ihren Anfängen bis zum Ende des XVI. Jahrhunderts. Paderborn: Ferdinand Schöningh.Google Scholar
Mercanti, Fabio & Paola Landra
2007 “I ‘Ludi Matematici’ di Leon Batista Alberti”. EIRIS 21.15–47.Google Scholar
Meirion [i.e., William Owen Pughe
] 1799 “Proportion of Vowels and Consonants in Different Languages”. The Monthly Magazine 71.5–6.Google Scholar
Mollin, Richard A.
2005Codes: The guide to secrecy from ancient to modern times. Boca Raton, Fla.: Chapman & Hall. DOI logoGoogle Scholar
Morse, Edward L.
ed. 1914Samuel F. B. Morse: His letters and journals. Vol. II1. Boston: Houghton Mifflin.Google Scholar
Mrayati, Mohammed, Yahia Meer Alam & Hassan at-Tayyan
2002Al Kindī’s Treatise on Cryptanalysis. (= Series on Arabic Origins of Cryptology, 1.) Damascus: KFCRIS & KACST.Google Scholar
2003aIbn ‘Adlān’s Treatise al-mu’allaf lil-malik al-’Ašraf. (= Series on Arabic Origins of Cryptology, 2.) Ibid.Google Scholar
2003bIbn ad-Durayhim’s Treatise on Cryptanalysis. (= Series on Arabic Origins of Cryptology, 3.) Ibid.Google Scholar
Mrayati, Mohammed, Yahia Meer Alam, & Hassan at-Tayyan
2005Ibn Dunaynīr’s book: Expositive Chapters on Cryptanalysis. (= Series on Arabic Origins of Cryptology, 4.) Ibid.Google Scholar
Mrayati, Mohammed, Yahia Meer Alam & Hassan at-Tayyan
2007Two Treatises on Cryptanalysis. (= Series on Arabic Origins of Cryptology, 6.) Ibid.Google Scholar
Peng, Roger D. & Nicolas W. Hengartner
2002 “Quantitative Analysis of Literary Styles”. The American Statistician 561.175–185. DOI logoGoogle Scholar
Perec, Georges
1973 “Histoire du lipogramme”. Oulipo: La littérature potentielle, 73–89. Paris: Gallimard.Google Scholar
Perret, Paul-Michel
1890 “Les règles de Cicco Simonetta pour le déchiffrement des écritures secretes (4 juillet 1474)”. Bibliothèque de l’École des Chartes 511.516–525. Paris.Google Scholar
Pesic, Peter
1997 “François Viète – father of Modern cryptanalysis”. Cryptologia 211.1–29. DOI logoGoogle Scholar
Petruszewycz, Micheline
1979a “A. A. Markov, ses probabilités en chaîne et les statistiques linguistiques”. Mathématiques et Sciences Humaines 661.5–42.Google Scholar
1979b “Contribution pour servir à l’étude du choix que fit A. A. Markov d’un domaine d’application de sa théorie des chaînes”. Mathématiques et Sciences Humaines 661.43–49.Google Scholar
1983 “Chaînes de Markov et statistiques linguistiques”. Mots 71.85–95. DOI logoGoogle Scholar
Pierce, John R.
1973 “The Early Days of Information Theory”. IEEE Transactions on Information Theory 191.3–8. DOI logoGoogle Scholar
Poe, Edgar Allan
1986The Annotated Tales of Edgar Allan Poe. Ed. by Stephen Peithman. New York: Avenel.Google Scholar
Quetelet, Adolphe
1828Correspondance Mathématique et Physique. Tome IV1. Bruxelles: Hayez.Google Scholar
1829Correspondance Mathématique et Physique. Tome V1. Ibid.Google Scholar
1832Correspondance Mathématique et Physique. Tome VII1. Ibid.Google Scholar
1853Compte rendu des travaux du Congrès général de statistique. Bruxelles: Hayez.Google Scholar
1873 “Notice sur Charles Babbage”. Annuaire de l’Académie Royale des sciences des lettres et des Beaux-arts de Belgique 391.149–165.Google Scholar
Reed, William J.
2001 “The Pareto, Zipf and Other Power Laws”. Economics Letters 741.15–19. DOI logoGoogle Scholar
Richardson, Mary, John Grabosek, Diann Reischman & Phyllis Curtiss
2004 “Morse Code, Scrabble, and the Alphabet”. Journal of Statistics Education 12:3. No page given. DOI logoGoogle Scholar
Sacco, Luigi
1951 [Original Italian ed. 1926] Manuel de Cryptographie. Paris: Payot.Google Scholar
Selenus, Gustavus [i.e., August the Younger of Brunswick-Lüneburg
] 1624Cryptomenytices et Cryptographiae Libri IX. Lüneburg: Johann & Heinrich Stern.Google Scholar
Shannon, Claude E[lwood]
1948 “A Mathematical Theory of Communication”. Bell System Technical Journal 271.379–423, 623–656. DOI logoGoogle Scholar
Shannon, Claude E.
1949 “Communication Theory of Secrecy Systems”. Bell System Technical Journal 281.656–715. DOI logoGoogle Scholar
1951 “Prediction and Entropy of Printed English”. Ibid. 301.50–64.Google Scholar
Stigler, Stephen M.
1999Statistics on the Table: The history of statistical concepts and methods. Cambridge, Mass.: Harvard University Press.Google Scholar
Stopes, Charlotte C.
1888The Bacon–Shakspere Question. London: Johnson.Google Scholar
Strasser, Gerhard F.
1983 “The Noblest Cryptologist: August the Younger of Brunswick-Lüneburg (Gustavus Selenus) and his cryptological activities”. Cryptologia 7:3.193–217. DOI logoGoogle Scholar
Thicknesse, Philip
1772A Treatise on the Art of Decyphering, and of Writing in Cypher. London: Brown.Google Scholar
Valerio, Paul-Louis Eugène
1893De la Cryptographie: Essai sur les méthodes de déchiffrement. Paris: Baudoin.Google Scholar
Vesin, Charles François
1838Traité d’obscurigraphie. Paris: Goullet.Google Scholar
Vitevitch, Michael S. & Paul A. Luce
1999 “Probabilistic Phonotactics and Neighborhood Activation in Spoken Word Recognition”. Journal of Memory and Language 401.374–408. DOI logoGoogle Scholar
Wepman, Dennis
Butts, Alfred Mosher”. American National Biography Online. New York: Oxford University Press.
Wheatley, Henry Benjamin
1862Of Anagrams. Hertford: Austin.Google Scholar
Williams, Charles B.
1956 “Studies in the History of Probability and Statistics IV: A note on early statistical study of literary style”. Biometrika 431.248–256.Google Scholar
Yasuoka, Koichi & Motoko Yasuoka
2011 “On the Prehistory of QWERTY”, Zimbun 421.161–174.Google Scholar
Ycart, Bernard
2013 “Alberti’s Letter Counts”. Literary and Linguistic Computing. DOI logo (print version in press).Google Scholar
Yule, George U[dny]
1944The Statistical Study of Literary Vocabulary. Cambridge: Cambridge University Press.Google Scholar
Zipf, George K[ingsley]
1949Human Behavior and the Principle of Least Effort: An introduction to human ecology. New York: Addison-Wesley.Google Scholar
Cited by

Cited by 1 other publications

[no author supplied]
2017. Current Bibliography of the History of Science and Its Cultural Influences, 2017. Isis 108:S1  pp. i ff. DOI logo

This list is based on CrossRef data as of 30 march 2024. Please note that it may not be complete. Sources presented here have been supplied by the respective publishers. Any errors therein should be reported to them.