enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Political commentary of the Aeneid - Wikipedia

    en.wikipedia.org/wiki/Political_commentary_of...

    The Aeneid was written during a period of political unrest in Rome. The Roman republic had effectively been abolished, and Octavian (Augustus Caesar) had taken over as the leader of the new Roman empire. The Aeneid was written to praise Augustus by drawing parallels between him and the protagonist, Aeneas. Virgil does so by mirroring Caesar ...

  3. Aeneid - Wikipedia

    en.wikipedia.org/wiki/Aeneid

    Aeneas Flees Burning Troy, by Federico Barocci (1598). Galleria Borghese, Rome, Italy Map of Aeneas' fictional journey. The Aeneid (/ ɪ ˈ n iː ɪ d / ih-NEE-id; Latin: Aenēĭs [ae̯ˈneːɪs] or [ˈae̯neɪs]) is a Latin epic poem that tells the legendary story of Aeneas, a Trojan who fled the fall of Troy and travelled to Italy, where he became the ancestor of the Romans.

  4. Res Gestae Divi Augusti - Wikipedia

    en.wikipedia.org/wiki/Res_Gestae_Divi_Augusti

    The text is not a full account of the years between 44 BC, the assassination of Augustus' adoptive father Julius Caesar, and AD 14, the year in which he died. Instead, it is a personal account of the first Emperor's life and those achievements that he decided to be worth remembering by the Roman people. [ 8 ]

  5. Caesar cipher - Wikipedia

    en.wikipedia.org/wiki/Caesar_cipher

    The Vigenère cipher uses a Caesar cipher with a different shift at each position in the text; the value of the shift is defined using a repeating keyword. [14] If the keyword is as long as the message, is chosen at random, never becomes known to anyone else, and is never reused, this is the one-time pad cipher, proven unbreakable. However the ...

  6. History of cryptography - Wikipedia

    en.wikipedia.org/wiki/History_of_cryptography

    All of the electromechanical machines used in World War II were of this logical class, as were the Caesar and Atbash ciphers and essentially all cipher systems throughout history. The 'key' for a code is, of course, the codebook, which must likewise be distributed and kept secret, and so shares most of the same problems in practice.

  7. Timeline of cryptography - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_cryptography

    600-500 – Hebrew scholars make use of simple monoalphabetic substitution ciphers (such as the Atbash cipher) c. 400 – Spartan use of scytale (alleged) c. 400 – Herodotus reports use of steganography in reports to Greece from Persia (tattoo on shaved head) 100-1 A.D.- Notable Roman ciphers such as the Caesar cipher.

  8. Lusus Troiae - Wikipedia

    en.wikipedia.org/wiki/Lusus_Troiae

    History and origin [ edit ] The lusus Troiae was "revived" by Julius Caesar in 45 or 46 BC, [ 6 ] perhaps in connection with his family claim to have descended from Iulus , the son of Aeneas who in the game of the Aeneid rides a horse that was a gift from the Carthaginian queen Dido . [ 7 ]

  9. Roman d'Enéas - Wikipedia

    en.wikipedia.org/wiki/Roman_d'Enéas

    It is written in French octosyllabic couplets totaling a little over 10,000 lines. Its subject matter is the tale of Aeneas, based on Virgil's Aeneid. It is one of the three important Romans d'Antiquité ("Romances of Antiquity") of this period; the other two are the Roman de Thèbes (anonymous) and the Roman de Troie of Benoît de Sainte-Maure.