[cryptography] Declassified NSA Tech Journals
Came across this on Reddit: Declassified NSA Tech Journals http://www.nsa.gov/public_info/declass/tech_journals.shtml It all looks so interesting it's hard to know where to start. - Marsh * Emergency Destruction of Documents - April 1956 - Vol. I, No. 1 * Development of Automatic Telegraph Switching Systems - July 1957 - Vol. II, No. 3 * Chatter Patterns: A Last Resort - October 1957 - Vol. II, No. 4 * Introduction to Traffic Analysis - April 1958 - Vol. III, No. 2 * Signals from Outer Space - April 1958 - Vol. III, No. 2 * Science and Cryptology - July 1958 - Vol. III, No. 3 * Net Reconstruction - A Basic Step in Traffic Analysis - July 1958 - Vol. III, No. 3 * Weather; its Role in Communications Intelligence - July 1958 - Vol. III, No. 3 * A New Concept in Computing - December 1958 - Vol. III, No. 4 * About NSA - January 1959 - Vol. IV, No. 1 * Antipodal Propagation - January 1959 - Vol. IV, No. 1 * Data Transmission Over Telephone Circuits - January 1959 - Vol. IV, No. 1 * Soviet Science and Technology: Present Levels and Future Prospects - January 1959 - Vol. IV, No. 1 * Cryptanalysis in The German Air Force - April 1959 - Vol. IV, No. 2 * The Special Felix System - April 1959 - Vol. IV, No. 2 * Intercept of USSR Missile Transmissions - July 1959 - Vol. IV, No. 3 * A Program for Correcting Spelling Errors - October 1959 - Vol. IV, No. 4 * COMINT Satellites - A Space Problem- October 1959 - Vol. IV, No. 4 * The Borders of Cryptology - October 1959 - Vol. IV, No. 4 * Did Aleksandr Popov Invent Radio? - January 1960 - Vol. V, No. 1 * Bayes Marches On - January 1960 - Vol. V, No. 1 * Book Review: Lost Languages - Fall 1960 - Vol. V. Nos. 3 & 4 * The "Tunny" Machine and Its Solution - Spring 1961 - Vol. VI, No. 2 * The GEE System I - Fall 1961, Vol. VI, No. 4 * Book Review: Lincos, Design of a Language for Cosmic Intercourse, Part 1 - Winter 1962 - Vol. VII, No. 1 * A Cryptologic Fairy Tale - Spring 1962 - Vol. VII, No. 2 * Aristocrat - An Intelligence Test for Computers - Spring 1962 - Vol. VII, No. 2 * Why Analog Computation? - Summer 1962 - Vol. VII, No. 3 * German Agent Systems of World War II - Summer 1962 - Vol. VII, No. 3 * The GEE System - V - Fall 1962 - Vol. VII, No. 4 * How to Visualize a Matrix - Summer 1963 - Vol. VIII, No. 3 * Book Review: Pearl Harbor: Warning and Decision - Winter 1963 - Vol. VIII, No. 1 * Soviet Communications Journals as Sources of Intelligence - August 1964 - Vol. IX, No. 3 * Use of Bayes Factors With a Composite Hypothesis - Fall 1964 - Vol. IX, No. 4 * A List of Properties of Bayes-Turing Factors - Spring 1965 - Vol. X, No. 2 * A Boer War Cipher - Summer 1965 - Vol. X, No. 3 and Fall 1965 - Vol. X, No. 4 * Something May Rub Off! - Winter 1965 - Vol. X, No. 1 * Time Is - Time Was - Time Is Past Computes for Intelligence - Winter 1965 - Vol. X, No. 1 * The Apparent Paradox of Bayes Factors - Winter 1965 - Vol. X, No. 1 * Extraterrestrial Intelligence - Spring 1966 - Vol. XI, No. 2 * Some Reminiscences - Summer 1966 - Vol. XI, No. 3 * Communications with Extraterrestrial Intelligence - Winter 1966 - Vol. XI, No. 1 * The Voynich Manuscript: "The Most Mysterious Manuscript in the World" - Summer 1967 - Vol. XII, No. 3 * Weather or Not - Encrypted? - Fall 1967 - Vol. XII, No. 4 * The Library and the User - Spring 1968 - Vol. XIII, No. 2 * Mokusatsu: One Word, Two Lessons - Fall 1968 - Vol. XIII, No. 4 * Key to The Extraterrestrial Messages - Winter 1969 - Vol. XIV, No. 1 * Curiosa Scriptorum Sericorum: To Write But Not to Communicate - Summer 1971 - Vol. XVI, No. 3 * Multiple Hypothesis Testing and the Bayes Factor - Summer 1971 - Vol. XVI, No. 3 * The Rosetta Stone and Its Decipherment - Winter 1971 - Vol. XVI, No. 1 * Writing Efficient FORTRAN - Spring 1972 - Vol. IX, No. 1 * The Strength of the Bayes Score - Winter 1972 - Vol. XVII, No. 1 * Q.E.D. - 2 Hours, 41 Minutes - Fall 1973, Vol. XVIII, No. 4 * Rochford's Cipher: A Discovery in Confederate Cryptography - Fall 1973, Vol. XVIII, No. 4 * Earliest Applications of the Computer at NSA - Winter 1973 - Vol. XVIII, No. 1 * Addendum to "A Cryptologic Fairy Tale" - Winter 1973 - Vol. XVIII, No. 1 * Some Principles of Cryptographic Security - Summer 1974 - Vol. XIX, No. 3 * Selected SIGINT Intelligence Highlights - Fall 1974 - Vol. XIX, No. 4 * Der Fall WICHER: German Knowledge of Polish Success on ENIGMA - Spring 1975 - Vol. XX, No. 2 * A Personal Contribution to the Bombe Story - Fall 1975 - Vol. XX, No. 4 * Spacecraft Passenger Television from Laika to Gagarin - Spring 1976 - Vol. XXI, No. 2 * The Voynich Manuscript Revisited - Summer 1976 - Vol. XXI, No. 3 * An Application of Cluster Analysis and Multidimensional Scaling to the Question of "Hands" and "Languages" in the Voynich Manuscript - Summer 1978 - Vol. XXIII, No. 3 * An Application of PTAH to the Voynich Manuscript - Spring 1979 - Vol. XXIV, No. 2 * German Radio Intelligence - Fall 1980 - Vol. XXV, No. 4 _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
participants (1)
-
Marsh Ray