2024-03-29T09:19:08Zhttps://gredos.usal.es/oai/requestoai:gredos.usal.es:10366/732522022-02-07T16:30:14Zcom_10366_72202com_10366_4666com_10366_3823col_10366_72209
Gestión del Repositorio Documental de la Universidad de Salamanca
author
Ephron, H. D.
2010-03-03T10:25:04Z
2010-03-03T10:25:04Z
1961
Minos, 7 (1961)
0544-3733
http://hdl.handle.net/10366/73252
Cryptanalysis, as you all know, is the solving of secret writing without previous possession of the key. Basically it is a study of coincidences, an analysis of them, to eliminate those which are due to chance and to find the reason for those which are not due to chance. The most important part of the cryptanalyst's method, his standard operating procedure, is the tedious drudgery of counting frequencies and noting repetitions and coincidences. The most important weapon in his arsenal is ingenuity. His ammunition, which he uses without stint, is assumptions, which might perhaps be defined as educated guesses, were it not for the fact that for a cryptanalyst to use the word «guess» instead of «assumption» is to be drummed out of the fraternity. Of the latter the most important usually is the assumption of probable words.
spa
Attribution-NonCommercial-NoDerivs 3.0 Unported
Filología griega
Greek philology
Mycenaean Greek: A Lesson in Cryptanalysis
info:eu-repo/semantics/article
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
URL
https://gredos.usal.es/bitstream/10366/73252/1/Mycenaean_Greek_A_Lesson_in_Cryptanalysi.pdf
File
MD5
d49241559352581c741a02e374ce0f83
2546325
application/pdf
Mycenaean_Greek_A_Lesson_in_Cryptanalysi.pdf