Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Secret Histories

View through CrossRef
Every Gothic fiction contains a secret history: lost manuscripts, doubled lives, mysterious menaces, dreaded revelations. More narrowly, secret histories are fictional works that offer imaginatively coherent yet nonstandard explanations for events transpiring in consensus reality. John Clute coined the term “Fantasies of History” for “Tales which uncover a Secret History of the World […] with the aid of fantasy devices […] invocations of Elder Gods […] fictional books […] secret masters” (Clute 1997: 334). Secret histories are not confined to the Gothic genre: similar techniques and tropes may be found in autobiography, the secret history of a life, or in nonfiction that presents conspiracy theories as fact (see secret societies ). Thrillers such as Dan Brown's The Da Vinci Code (2003) and its imitators reveal secret histories, as do more ambitious works not generally considered Gothic such as Umberto Eco's Foucault's Pendulum (1988), John Crowley's Aegypt sequence (1987–2007), and the novels of Thomas Pynchon and Don De Lillo.
Title: Secret Histories
Description:
Every Gothic fiction contains a secret history: lost manuscripts, doubled lives, mysterious menaces, dreaded revelations.
More narrowly, secret histories are fictional works that offer imaginatively coherent yet nonstandard explanations for events transpiring in consensus reality.
John Clute coined the term “Fantasies of History” for “Tales which uncover a Secret History of the World […] with the aid of fantasy devices […] invocations of Elder Gods […] fictional books […] secret masters” (Clute 1997: 334).
Secret histories are not confined to the Gothic genre: similar techniques and tropes may be found in autobiography, the secret history of a life, or in nonfiction that presents conspiracy theories as fact (see secret societies ).
Thrillers such as Dan Brown's The Da Vinci Code (2003) and its imitators reveal secret histories, as do more ambitious works not generally considered Gothic such as Umberto Eco's Foucault's Pendulum (1988), John Crowley's Aegypt sequence (1987–2007), and the novels of Thomas Pynchon and Don De Lillo.

Related Results

Verifiable secret sharing based on the Chinese remainder theorem
Verifiable secret sharing based on the Chinese remainder theorem
ABSTRACTA (t,n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such a way that (i) the secret can be recovered successfully with t or more than t s...
Le secret de la défense nationale : la raison d'État dans l'œil du droit
Le secret de la défense nationale : la raison d'État dans l'œil du droit
Résumé Le régime juridique du secret de la défense nationale a connu le 1er juillet 2021 sa réforme la plus importante depuis le décret du 17 juillet 1998 qui fixait jusque-là le r...
Shared Histories in Multiethnic Societies: Literature as a Critical Corrective of Cultural Memory Studies
Shared Histories in Multiethnic Societies: Literature as a Critical Corrective of Cultural Memory Studies
AbstractThe staging of history in literature is engaged in dynamic exchange with society’s memory discourses and in this context, literature is generally seen as playing a creative...
Memory-corrected quantum repeaters with adaptive syndrome identification
Memory-corrected quantum repeaters with adaptive syndrome identification
We address the challenge of incorporating encoded quantum memories into an exact secret key rate analysis for small and intermediate-scale quantum repeaters. To this end, we introd...
Secret Sharing and Shared Information
Secret Sharing and Shared Information
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized co...
Hierarchical Threshold Secret Image Sharing Scheme Based on Birkhoff Interpolation and Matrix Projection
Hierarchical Threshold Secret Image Sharing Scheme Based on Birkhoff Interpolation and Matrix Projection
This paper focuses on how to protect confidential image based on hierarchical threshold secret sharingscheme, against fake shadow attacks, collusion attacks and ...

Back to Top