Skip Public Info MenusPublic Info Menu
|
NSA Technical Journal Articles
- Emergency Destruction of Documents - April 1956 - Vol. I, No. 1
- Computers - The Wailing Wall - October 1956 - Vol. I, No. 3
- Communication Intelligence - April 1957 - Vol. II, No. 2
- An Introduction to IBM Methods in Cryptanalysis - July 1957 - Vol. II, No. 3
- Development of Automatic Telegraph Switching Systems - July 1957 - Vol. II, No. 3
- Chatter Patterns: A Last Resort - October 1957 - Vol. II, No. 4
- Introduction to Traffic Analysis - April 1958 - Vol. III, No. 2
- Signals from Outer Space - April 1958 - Vol. III, No. 2
- Science and Cryptology - July 1958 - Vol. III, No. 3
- Net Reconstruction - A Basic Step in Traffic Analysis - July 1958 - Vol. III, No. 3
- A Precursor of Modern Communications Intelligence- July 1958 - Vol. III, No. 3
- Weather; its Role in Communications Intelligence - July 1958 - Vol. III, No. 3
- A New Concept in Computing - December 1958 - Vol. III, No. 4
- About NSA - January 1959 - Vol. IV, No. 1
- Antipodal Propagation - January 1959 - Vol. IV, No. 1
- Data Transmission Over Telephone Circuits - January 1959 - Vol. IV, No. 1
- Soviet Science and Technology: Present Levels and Future Prospects -
January 1959 - Vol. IV, No. 1
- Analysis of a Transistor Monostable Multiviibrator - July 1959 - Vol. IV, No. 3
- Cryptanalysis in The German Air Force - April 1959 - Vol. IV, No. 2
- The Special Felix System - April 1959 - Vol. IV, No. 2
- Intercept of USSR Missile Transmissions - July 1959 - Vol. IV, No. 3
- LIGHTNING - July 1959- Vol. IV, No. 3
- A "Word Spotter" - October 1959 - Vol. IV, No. 4
- Approximation of Central Limits - October 1959 - Vol. IV, No. 4
- A Program for Correcting Spelling Errors - October 1959 - Vol. IV, No. 4
- COMINT Satellites - A Space Problem- October 1959 - Vol. IV, No. 4
- The Borders of Cryptology - October 1959 - Vol. IV, No. 4
- Did Aleksandr Popov Invent Radio? - January 1960 - Vol. V, No. 1
- Bayes Marches On - January 1960 - Vol. V, No. 1
- Abstract Groups Defined by Generating Operators - April 1960 - Vol. V, No. 2
- Book Review: Lost Languages - Fall 1960 - Vol. V. Nos. 3 & 4
- How the Germans Broke a U.S. Code - Fall 1960 - Vol. V, Nos. 3 & 4
- The "Tunny" Machine and Its Solution - Spring 1961 - Vol. VI, No. 2
- The Unbreakable Cipher - Spring 1961 - Vol. VI, No. 2
- Are the Russians Gaining Wordwise? - Spring 1961 - Vol. VI, No. 2
- The GEE System I - Fall 1961, Vol. VI, No. 4
- Book Review: Lincos, Design of a Language for Cosmic Intercourse, Part 1 -
Winter 1962 - Vol. VII, No. 1
- A Cryptologic Fairy Tale - Spring 1962 - Vol. VII, No. 2
- Aristocrat - An Intelligence Test for Computers - Spring 1962 - Vol. VII, No. 2
- Why Analog Computation? - Summer 1962 - Vol. VII, No. 3
- German Agent Systems of World War II - Summer 1962 - Vol. VII, No. 3
- The GEE System - V - Fall 1962 - Vol. VII, No. 4
- An Analysis of Thin Film Germanium Epitaxially Deposited onto Calcium Fluoride -
Spring 1963 - Vol. VIII, No. 2
- How to Visualize a Matrix - Summer 1963 - Vol. VIII, No. 3
- Book Review: Pearl Harbor: Warning and Decision - Winter 1963 - Vol. VIII, No. 1
- The LIGHTNING Program - Winter 1963 - Vol. VIII, No. 1
- Soviet Communications Journals as Sources of Intelligence - August 1964 - Vol. IX, No. 3
- Use of Bayes Factors With a Composite Hypothesis - Fall 1964 - Vol. IX, No. 4
- A List of Properties of Bayes-Turing Factors - Spring 1965 - Vol. X, No. 2
- Approximations to the Distribution Function of Sums of Independent Identically Distributed Random Variables -
Spring 1965 - Vol. X, No. 2
- A 'Binary' System for Complex Numbers - Spring 1965 - Vol. X, No. 2
- Another Derivation of Binary Error Rates as a Function of Signal-to-Noise Power Ratio for Various Modulation Schemes -
Summer 1965 - Vol. X, No. 3
- A Boer War Cipher - Summer 1965 - Vol. X, No. 3 and Fall 1965 - Vol. X, No. 4
- Something May Rub Off! - Winter 1965 - Vol. X, No. 1
- Time Is - Time Was - Time Is Past Computes for Intelligence - Winter 1965 - Vol. X, No. 1
- The Apparent Paradox of Bayes Factors - Winter 1965 - Vol. X, No. 1
- Extraterrestrial Intelligence - Spring 1966 - Vol. XI, No. 2
- Some Reminiscences - Summer 1966 - Vol. XI, No. 3
- Communications with Extraterrestrial Intelligence - Winter 1966 - Vol. XI, No. 1
- Collected Editorials of Sydney Fairbanks - December 1966 - Special Issue
- Bipolar Coding and Baseband Recovery - Winter 1967 - Vol. XII, No. 1
- The Voynich Manuscript: "The Most Mysterious Manuscript in the World" - Summer 1967 - Vol. XII, No. 3
- John Dee: Consultant to Queen Elizabeth I - Fall 1967 - Vol. XII, No. 4
- Weather or Not - Encrypted? - Fall 1967 - Vol. XII, No. 4
- The Library and the User - Spring 1968 - Vol. XIII, No. 2
- Mokusatsu: One Word, Two Lessons - Fall 1968 - Vol. XIII, No. 4
- Key to The Extraterrestrial Messages - Winter 1969 - Vol. XIV, No. 1
- An Application of Queueing Theory to Computer Systems - Spring 1969 - Vol. XIV, No. 2
- Curiosa Scriptorum Sericorum: To Write But Not to Communicate - Summer 1971 - Vol. XVI, No. 3
- Multiple Hypothesis Testing and the Bayes Factor - Summer 1971 - Vol. XVI, No. 3
- The Rosetta Stone and Its Decipherment - Winter 1971 - Vol. XVI, No. 1
- Foreign vs. U.S. Computers: An Appraisal - Special Issue 1972
- Growing Up With Computers at NSA - Special Issue 1972
- Writing Efficient FORTRAN - Spring 1972 - Vol. IX, No. 1
- Anglicisms in Puerto Rico - Winter 1972 - Vol. XVII, No. 1
- The Strength of the Bayes Score - Winter 1972 - Vol. XVII, No. 1
- APL Mechanization of Indirect Symmetry - Summer 1972 - Vol. XVII, No. 3
- Experiences 1920-1929 - Summer 1972 - Vol. XVII, No. 3
- The Apparent Paradox of Bayes Factors - Summer 1972 - Vol. XVII, No. 3
- Famous First Facts, NSA Part I: Pre-Computer Machine Cryptanalysis - Fall 1972 - Vol. XVII, No. 4
- Q.E.D. - 2 Hours, 41 Minutes - Fall 1973, Vol. XVIII, No. 4
- Rochford's Cipher: A Discovery in Confederate Cryptography - Fall 1973, Vol. XVIII, No. 4
- Earliest Applications of the Computer at NSA - Winter 1973 - Vol. XVIII, No. 1
- Addendum to "A Cryptologic Fairy Tale" - Winter 1973 - Vol. XVIII, No. 1
- Report of the Second Computer Study Group - Winter 1974 - Vol. XIX, No. 1
- Some Principles of Cryptographic Security - Summer 1974 - Vol. XIX, No. 3
- Selected SIGINT Intelligence Highlights - Fall 1974 - Vol. XIX, No. 4
- Der Fall WICHER: German Knowledge of Polish Success on ENIGMA - Spring 1975 - Vol. XX, No. 2
- A Personal Contribution to the Bombe Story - Fall 1975 - Vol. XX, No. 4
- Spacecraft Passenger Television from Laika to Gagarin - Spring 1976 - Vol. XXI, No. 2
- The Voynich Manuscript Revisited - Summer 1976 - Vol. XXI, No. 3
- An Application of Cluster Analysis and Multidimensional Scaling to the Question of "Hands" and "Languages" in the Voynich Manuscript - Summer 1978 - Vol. XXIII, No. 3
-
An Application of PTAH to the Voynich Manuscript - Spring 1979 - Vol. XXIV, No. 2
- German Radio Intelligence - Fall 1980 - Vol. XXV, No. 4
|
|