The OS doesn't record info like this (why would it?) itself. Consider: if the OS itself logged keystrokes, there'd be little use for keyloggers as a kind of malware, yet in reality they're very popular. Unless you've been running a keylogger program, you probably can't get the data.
It may be possible to read the last few keystrokes out of the keyboard buffer if the memory wasn't zeroed or overwritten - though you'd probably need a kernel module to do it, since I doubt there's a way to get the raw memory of the kernel buffer from userspace by default - but the keyboard buffer isn't that big and isn't timestamped, so all you'd get at best are the last N keystrokes, whenever they happened. The keyboard buffer will also probably not survive a reboot, and a sufficiently-paranoid kernel dev may actually have set it up to zero itself out (especially after stuff like logging in a user) specifically to avoid it being used as a keylogger (I believe TrueCrypt does this for encrypted boot volumes; I know BitLocker on Windows does).
Otherwise, your "best" bet (in scare quotes, because what I'm about to suggest is not normally considered a good idea) is to install a keylogger on your own machine, set it up to log somewhere hopefully very secure (remember, it's going to catch all kinds of stuff, like passwords and email bodies and so on), and use that going forward. The data from before you install it is likely unrecoverable, but at least you'll have a growing file of everything you've ever typed in going forward...