Click You are not allowed to view links.
Register or
Login to view. to access this event in the You are not allowed to view links.
Register or
Login to view..
This event is not VM specific or related but may be of interest to VM researchers.
Cryptography in Theory and Practice: the German-French Context (1300-1800)
International Conference
Heidelberg, Germany
11-12 April 2024
Organization
Camille Desenclos (Université de Picardie Jules Verne)
Sven Externbrink (Universität Heidelberg)
Eveline Szarka (Universität Heidelberg)
Jörg Ulbert (Université Bretagne Sud)
Scientific Advisory Board
Dejanirah Couto (École pratique des hautes études)
Camille Desenclos (Université de Picardie Jules Verne)
Sven Externbrink (Universität Heidelberg)
Benedek Láng (Eötvös Loránd University)
Beáta Megyesi (Uppsala Universitet)
Eveline Szarka (Universität Heidelberg)
Jörg Ulbert (Université Bretagne Sud)
A call for papers (abstracts) was issued in March 2023 with a deadline in April 2023. The scientific advisory board was then to have selected from the submissions in May 2023. No additional details have been published since then. Stay tuned for more information when known. In the meantime, those who are interested can review the existing information at the following links:
On H-German (H-Net Network on German History):
You are not allowed to view links.
Register or
Login to view.
On the CFP website for The University of Pennsylvania · Department of English:
You are not allowed to view links.
Register or
Login to view.
On The Renaissance Society of America (RSA) News and Announcements page:
You are not allowed to view links.
Register or
Login to view.
Full CFP PDF:
You are not allowed to view links.
Register or
Login to view.
The aim of the planned conference is to shed light on early modern cryptography from a German-French context for the purpose of initiating new research. Preference was to be given to papers that address the following questions:
- History of cryptography literature (authors, contexts of origin, intended audience, structure, as well as systematization, reception, development, and communication of techniques).
- Studies of the influence of cryptography literature on practice and vice versa.
- Management of cryptography and postal espionage in ministries.
- Activities of the Black Chambers (postal espionage practices).
- Development of encryption techniques.
- Case studies: quantitative and qualitative analysis of coded passages in correspondences.