[cryptography] Declassified NSA Tech Journals

Marsh Ray marsh at extendedsubset.com
Sun Nov 27 14:00:47 EST 2011


Came across this on Reddit:

Declassified NSA Tech Journals
http://www.nsa.gov/public_info/declass/tech_journals.shtml

It all looks so interesting it's hard to know where to start.

- Marsh

* Emergency Destruction of Documents - April 1956 - Vol. I, No. 1
* Development of Automatic Telegraph Switching Systems - July 1957 - 
Vol. II, No. 3
* Chatter Patterns: A Last Resort - October 1957 - Vol. II, No. 4
* Introduction to Traffic Analysis - April 1958 - Vol. III, No. 2
* Signals from Outer Space - April 1958 - Vol. III, No. 2
* Science and Cryptology - July 1958 - Vol. III, No. 3
* Net Reconstruction - A Basic Step in Traffic Analysis - July 1958 - 
Vol. III, No. 3
* Weather; its Role in Communications Intelligence - July 1958 - Vol. 
III, No. 3
* A New Concept in Computing - December 1958 - Vol. III, No. 4
* About NSA - January 1959 - Vol. IV, No. 1
* Antipodal Propagation - January 1959 - Vol. IV, No. 1
* Data Transmission Over Telephone Circuits - January 1959 - Vol. IV, No. 1
* Soviet Science and Technology: Present Levels and Future Prospects - 
January 1959 - Vol. IV, No. 1
* Cryptanalysis in The German Air Force - April 1959 - Vol. IV, No. 2
* The Special Felix System - April 1959 - Vol. IV, No. 2
* Intercept of USSR Missile Transmissions - July 1959 - Vol. IV, No. 3
* A Program for Correcting Spelling Errors - October 1959 - Vol. IV, No. 4
* COMINT Satellites - A Space Problem- October 1959 - Vol. IV, No. 4
* The Borders of Cryptology - October 1959 - Vol. IV, No. 4
* Did Aleksandr Popov Invent Radio? - January 1960 - Vol. V, No. 1
* Bayes Marches On - January 1960 - Vol. V, No. 1
* Book Review: Lost Languages - Fall 1960 - Vol. V. Nos. 3 & 4
* The "Tunny" Machine and Its Solution - Spring 1961 - Vol. VI, No. 2
* The GEE System I - Fall 1961, Vol. VI, No. 4
* Book Review: Lincos, Design of a Language for Cosmic Intercourse, Part 1 -
       Winter 1962 - Vol. VII, No. 1
* A Cryptologic Fairy Tale - Spring 1962 - Vol. VII, No. 2
* Aristocrat - An Intelligence Test for Computers - Spring 1962 - Vol. 
VII, No. 2
* Why Analog Computation? - Summer 1962 - Vol. VII, No. 3
* German Agent Systems of World War II - Summer 1962 - Vol. VII, No. 3
* The GEE System - V - Fall 1962 - Vol. VII, No. 4
* How to Visualize a Matrix - Summer 1963 - Vol. VIII, No. 3
* Book Review: Pearl Harbor: Warning and Decision - Winter 1963 - Vol. 
VIII, No. 1
* Soviet Communications Journals as Sources of Intelligence - August 
1964 - Vol. IX, No. 3
* Use of Bayes Factors With a Composite Hypothesis - Fall 1964 - Vol. 
IX, No. 4
* A List of Properties of Bayes-Turing Factors - Spring 1965 - Vol. X, No. 2
* A Boer War Cipher - Summer 1965 - Vol. X, No. 3 and Fall 1965 - Vol. 
X, No. 4
* Something May Rub Off! - Winter 1965 - Vol. X, No. 1
* Time Is - Time Was - Time Is Past Computes for Intelligence - Winter 
1965 - Vol. X, No. 1
* The Apparent Paradox of Bayes Factors - Winter 1965 - Vol. X, No. 1
* Extraterrestrial Intelligence - Spring 1966 - Vol. XI, No. 2
* Some Reminiscences - Summer 1966 - Vol. XI, No. 3
* Communications with Extraterrestrial Intelligence - Winter 1966 - Vol. 
XI, No. 1
* The Voynich Manuscript: "The Most Mysterious Manuscript in the World" 
- Summer 1967 - Vol. XII, No. 3
* Weather or Not - Encrypted? - Fall 1967 - Vol. XII, No. 4
* The Library and the User - Spring 1968 - Vol. XIII, No. 2
* Mokusatsu: One Word, Two Lessons - Fall 1968 - Vol. XIII, No. 4
* Key to The Extraterrestrial Messages - Winter 1969 - Vol. XIV, No. 1
* Curiosa Scriptorum Sericorum: To Write But Not to Communicate - Summer 
1971 - Vol. XVI, No. 3
* Multiple Hypothesis Testing and the Bayes Factor - Summer 1971 - Vol. 
XVI, No. 3
* The Rosetta Stone and Its Decipherment - Winter 1971 - Vol. XVI, No. 1
* Writing Efficient FORTRAN - Spring 1972 - Vol. IX, No. 1
* The Strength of the Bayes Score - Winter 1972 - Vol. XVII, No. 1
* Q.E.D. - 2 Hours, 41 Minutes - Fall 1973, Vol. XVIII, No. 4
* Rochford's Cipher: A Discovery in Confederate Cryptography - Fall 
1973, Vol. XVIII, No. 4
* Earliest Applications of the Computer at NSA - Winter 1973 - Vol. 
XVIII, No. 1
* Addendum to "A Cryptologic Fairy Tale" - Winter 1973 - Vol. XVIII, No. 1
* Some Principles of Cryptographic Security - Summer 1974 - Vol. XIX, No. 3
* Selected SIGINT Intelligence Highlights - Fall 1974 - Vol. XIX, No. 4
* Der Fall WICHER: German Knowledge of Polish Success on ENIGMA - Spring 
1975 - Vol. XX, No. 2
* A Personal Contribution to the Bombe Story - Fall 1975 - Vol. XX, No. 4
* Spacecraft Passenger Television from Laika to Gagarin - Spring 1976 - 
Vol. XXI, No. 2
* The Voynich Manuscript Revisited - Summer 1976 - Vol. XXI, No. 3
* An Application of Cluster Analysis and Multidimensional Scaling to the 
Question of "Hands" and "Languages" in the Voynich Manuscript - Summer 
1978 - Vol. XXIII, No. 3
* An Application of PTAH to the Voynich Manuscript - Spring 1979 - Vol. 
XXIV, No. 2
* German Radio Intelligence - Fall 1980 - Vol. XXV, No. 4



More information about the cryptography mailing list