The story of King George VI of the United Kingdom of Great Britain and Northern Ireland, his impromptu ascension to the throne and the speech therapist who helped the unsure monarch become worthy of it.
Helena Bonham Carter
The adventures of Gustave H, a legendary concierge at a famous hotel from the fictional Republic of Zubrowka between the first and second World Wars, and Zero Moustafa, the lobby boy who becomes his most trusted friend.
F. Murray Abraham,
After a stint in a mental institution, former teacher Pat Solitano moves back in with his parents and tries to reconcile with his ex-wife. Things get more challenging when Pat meets Tiffany, a mysterious girl with problems of her own.
David O. Russell
Robert De Niro
Harvard student Mark Zuckerberg creates the social networking site that would become known as Facebook, but is later sued by two brothers who claimed he stole their idea, and the co-founder who was later squeezed out of the business.
A fictitious love story loosely inspired by the lives of Danish artists Lili Elbe and Gerda Wegener. Lili and Gerda's marriage and work evolve as they navigate Lili's groundbreaking journey as a transgender pioneer.
Based on the real life story of legendary cryptanalyst Alan Turing, the film portrays the nail-biting race against time by Turing and his brilliant team of code-breakers at Britain's top-secret Government Code and Cypher School at Bletchley Park, during the darkest days of World War II. Written by
Alan Turing's team calls him out, saying they are the only ones who have been making anything progress. His team mentions that they used letter frequency analysis, to break some of the transmissions. However, letter frequency analysis is an attack that works well on substitution ciphers, but wouldn't have worked well on the Enigma. Letter frequency analysis works by analysis the frequency of letters in a language, as well as the frequency of letters in a cipher text. You then replace the cipher text letters with the corresponding language letter as ranked by frequency. If the newly generated plaintext is not fully decrypted, a person can usually find the errors easily. This attack would not work well on the Enigma, as it was not a simple substitution cipher. The rotors would click forward one position for each letter entered. Therefore, the key was, in part, based on the position of the letter in the plaintext. Typing the same letter consecutively would return a different cipher letter for each iteration of the letter, because the key for letter n is related to letter n-1. See more »
Are you paying attention? Good. If you're not listening carefully you will miss things. Important things. I will not pause, I will not repeat myself, and you will not interrupt me. If you think that because you're sitting where you are and I am sitting where I am that you are in control of what is about to happen, you 're mistaken. I am in control, because I know things that you do not know.
See more »