nsa technical 10urna l - cryptocellarcryptocellar.org/nsa/nsa_tj_1956-80.pdf · nsa . technical...

202
DOCID: 3020956 NSA TECHNICAL 10URNA L CUMULATIVE INDEX I ' pproved for Release by NSA on 08-17-2006, FOlA Case # 12848 APRIL 1956 - FALL 1980 I Dervived From: NSAICSSM 123-2 I Dated 3 Sep 91 Declassify On: Source Marked "OADR" Date of Source: 3 Sep 91

Upload: others

Post on 22-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

DOCID: 3020956

NSA TECHNICAL 10URNA L

CUMULATIVE INDEX

I ' pproved for Release by NSA on 08-1 7-2006, FOlA Case # 12848

APRIL 1956 - FALL 1980

I Dervived From: NSAICSSM 123-2

I Dated 3 Sep 91 Declassify On: Source Marked "OADR"

Date of Source: 3 Sep 91

Russ Kick
Text Box
Brought to you by The Memory Hole: www.thememoryhole.org/nsa/bibs.htm

--

DOCID: 3020956 REF ID:A398598

Note to Readers

This is the second published cumulative index of NSA Technical Journal articles. This index aims a t readability and ease of use. It is sorted three ways: by title of article, by author, and by keywords. Its purpose is twofold: to give readers a general view of the scope of subjects that appeared in the NSA Technical Journal and to provide readers with a means to locate articles they may wish to use as general information on the job or as research tools for operational projects.

We hope you find the index useful and that you will contact the publications staff of the Center for Cryptologic History if you would like copies of an article. You may reach the publications staff a t 972-2895s or 688-2338b. If you send a written request for an article, address it to Center for Cryptologic History, E322, SAB 2, Door 22. Our e-mail address is [email protected].

Barry D. Carleen Chief, Publications

DOCID: 3020956 REF IDtA398598

NSA Technical Journal

Contents

Title Index .................................................. 1

Author Index ............................................... 59

............................................. KeywordIndex 123

.... LLL

REF IDzA398598

NSA TECHNICAL JOURNAL

CUMULATIVE

INDEX

Vol. I. No. 1, April 1956

to

Vol. XXV. No. 4, Fall 1980

DOCID: 3020956

- -

REF IDzA398598

NSA

Technical Journal

TITLE

INDEX

DOCID: 3020956

NSA Technical Journal '(b) (3)-P.L. 86-36 Indexed by Title

Title I Author Reference Keyword

ABC of Cifax, The (U) Vol. I, No. 2, Communications July 1956 Facsimile

Privacy

ABC of Ciphony, The (U)

ABNER: The ASA Computer Part 1: Design (U)

ABNER: The ASA Computer Part 2: Fabrication, Operation, and Impact (U)

About NSA (U)

Abstract Groups Defined by Generating Operators (U)

Addendum to "A Cryptologic Fairy Tale" (U)

African Language Problem at NSA,The (U)

ALRIGHT - A Map Overlay Generator (U)

Ambiguity Reduction by Markov Analysis of TEMPEST Signals (U)

Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System (U)

Analysis of a Transistor Monostable Multivibrator (U)

Vol. I, No. 2, Ciphony July 1966, Coding and Special Processing Linguistics Signals Issue

Snyder, Samuel Vol. XXV, Computers S. No. 2, Spring Cryptologic history

1980

Snyder, Samuel Vol. XXV, Computers S. No. 3, Cryptologic history

Summer 1980

Vol, IV, No. History 1, January NSA 1959

Sinkov, Abraham April 1960 Groups Operators

Tiltman, John H., Vol. XVIII, Cryptanalysis Brigadier No. 1, Winter

1973

Vol. XI, No. African language 3, Summer 1966

Vol. XI, No. Mapping 2, Spring 1966

Vol. XVI, No Signals 1, Winter TEMPEST 1971

Vol. XII, No. Signals 4. Fall 1967 TEMPEST

Vol. IV, No. Circuits 3, July 1959 Transistors

DOCID: 3020956

Title I Author Reference Keyword

Callimahos, Vol. XIV, No. Cryptanalysis Lambros D. 2, Spring Plain text

1969

Analysis of Lexical Meaning Vol. XIII, No. Communications across Cultures, An (U) 4, Fall 1968 Language

Analysis of Sorting Techniques for Multiple Signal Intercept (If)

Analysis of Thin Film Germanium Epitaxially Deposited onto Calcium Fluoride (U)

I Anglicisms in Puerto Rico (U)

Another Derivation of Binary Error Rates as a Function of Signal-to-Noise Power Ratio foe Various Modulation Schemes (U)

Antipodal Propagation (U)

APL Mechanization of Indirect Symmetry (U)

Apparent Paradox of Bayes Factors, The (U) I

Val. XII, NO. COMINT target 3, Summer identification 1967

Vol. VIII, No. Physics 2, Spring 1963

Vol. VIII, No. Ciphers 2, Spring Computer 1963

Vol. XVII, Spanish language No. 1, Winter

Vol. X, No. 3, Summer 1965

Collection Signal-to-noise ratio

Gerson, Vol. IV, No. Nathaniel C. 1, January

1959

Radio waves Transmitters

Vol. XVII, No. 3, Summer 1972

I Vol. X, No. 1, Winter 1965

Application of Cluster Analysis Vol. XXIII, and Multidimensional Scaling No. 3, to the Question of "Hands" and Summer 1978 "Languages" in the Voynich Manuscript, An (U)

Application of Fourier Special Fast Transforms to Combiners (U Fourier

Transform - Issue. Augvsl

Computer languages

Bayes factors Cryptanalysis

Cluster analysis Voynich Manuscript

Title I Author Reference Keyword

Application of Human Factors to the Specification and Design of Interactive Computer Systems

Application of Queuing Theory to Computer Systems, An (U)

D'Imperio, Mary 7;;n

Approximation of Central Limits (U)

Approximations to the Distjibution Function of Sums of Independent Identically Distributed Random Variables

Vol. XXIV, Computers No. 4, Fall Human factors 1979

Vol. XIX, No. Cr tianalysis 4. Fall 1974 F b l p r i t h m

Em25$w Manuscript 1979

APT System, The (U) I I

Vol. XIV, No. Computers 2, Spring Queuing theory 1969

Vd. XXIV, Cryptanalysis No. 3, Key generators Summer 1979

Vol. IV, No. Random variables 4, October 1959

Vol. X, No. 2, Mathematics Spring 1965

Vol. XXIII, Computers No. 3, Data processing Summer 1978

Are the Russians Gaining Salemme, Arthur Spring 1961 Russian language Wordwise? (U)

Aristocrat -An Intelligence Test for Computers (U)

Arithmetic of a Generation Principle for an Electronic Key Generator, The (U)

Arithmetic of the Addition Generation Principle for Electronic Key Generators (U)

Campaigne, Vvl. VII, No. Computers Howard H. 2, Spring Cryptanalysis

1962 I

Vol. 11, No. 1, Mathematics January 1957

I I ~ o l . 11. No. 3, Mathematics

I July 1957

DOCID: 3020956

Title

Arithmetic of the Linear Generation Principle for Electronic Key Generators, The (U)

Arithmetic of the Multiplication Generation Principle in the Koken Key Generator, The (U)

Art of Automatic Bearing Instrumentation, The (U)

Asian Communist Aircraft Location Systems (U)

Assignment Algorithm Applied to Manual Cryptosystems (U)

Assignment of Storage Space in Rapid-Access Memory Systems (U)

Association Factor in Information Retrieval, The (U)

Attack on Blair-Huffman Encipherments, An (U)

Automatic Maintenance (U)

Automa.ic Signal Identification

7

Author Referehee Keyword I Vol. 11, No. 4, Mathematics October 1957

I I

Vol. Il, No. 2, Mathematics April 1957

(b) (1) (b) ( 3 ) - 5 0 U S C

Vol. XVlII, Mathematics 4 0 3 No. 4, Fall (b) ( 3 ; - P . L . 1973 86-36

Vol. XX, No. Aircraft tracking 1, Winter 1975

Vol. XX, No. Computers 1, Winter Cryptanalysis 1975

Vol. 11, No. 2, Addressing Systems April 1957 Memory

I Winter 1961 Computers Information retrieval 1 S i n g 196 1 , Cipher

Vol. I, No. 1, Hagelin machines April 1956

Meyer, Joseph A. Vol. IX, No. Computers 1, Winter Maintenance

Special Issue, Signal identification January 1971 1 Vol. XXIV, Cryptosystem No. 2, Spring identification 1979

Bar Statistics, The (U)

Bar Statistics, The (U) (b: (1 i jt) ( > ) - ? I 1 USC 403 (b) (31-13 IJSC 748 ('K; ( - 3 ) - P . L . eG-36 L

Vol. VIII, No. Mathematics 2, Spring 1963

Vol. VIII, No. Mathematics 4, Fall 1963

DOCID: 3020956 9 8 5 9 8 (bl(3)-P.L. 86-36

Title

Bayes Marches On (U)

"Binary" System for Complex Numbers, A (U)

Bipolar Coding and Baseband Recovery (U)

Birth of ATLAS I (U)

Boer War Cipher, A (U)

Book Review: A History of NSA General-Purpose Electronic Digital Computers 7C3XTW

Book Review: Basic Crrptologic Glossary

Book Review: Cloak & Cipher (U)

Book Reuiew: Cryptanalysis of the Single Columnar Transposition Cipher (U)

Book Review: Lincos, Design of a Language for Cosmic Intercourse, Part I (U)

Book Review: Lost Languages (U)

Book Review: Mathematical Statistics (U)

I Author Reference Keyword

I Callimahos, Lambros D.

January 1960 Cryptanalysis Mathematics

Vol. X, No. 2, Mathematics Spring 1965 and Computer and Information Siences Issue

Vol. XII, No. Basebands 1, Winter Codes 1967

Vol. XVIII, Computers No. 1,Winter Cryptanalysis 1973

Vol. X, No. 3, Ciphers Summer 1965 Cryptologic history and Vol. X, No. 4, Fall 1965

Vol. IX, No. Book review 2, May 1964 Computers

Vol. XI, No. 1, Winter 1966

Vol. VII, No. 3, Summer 1962

Summer 1961

-1 Vol. VII. No. 1, Winter 1962

Fall 1960

Vol. VII, No. 4, Fall 1962

Book review Cryptology

Book review Cryptanalysis

Book review Cryptanalysis

Book review Communications Extraterrestrial

intelligence

Book review C r y ~ ~ l 0 g ~

Book review Mathematics

DOCID: 3020956

Title 1 Author Reference Keyword

Book Review: Mechanical Resolution of Linguistic Problems (UI

Campaigne, Howard. H.

Vol. 111. No. 4, December 1958

Book review Computers Language

Book Review: Military Cryptanalytics, Part I1 (U)

Campaigne, Howard H.

Vol. IV, No. 4, October 1959

Book review Cryptanalysis Military

Book Review: Modern Probability Theory and Its Applications (U) t-l Fall 1960 Book review

Probability theory

Book Review: Norse Medieval Cryptography in Runic Carvings (U)

Vol. XIII, No. 3, Summer 1968

Book review Cryptologic history

Fall 1960 Book review Probability theory

Book Review: Probability: An Introduction (U) I Book Review: Recent Literature on Algebraic Cryptography (U) u Vol. VII, No.

2, Spring 1962

Book review cr~~tof3raphy Mathematics

Book Review: The Broken Seal Callimahos, (U) I Lambros D.

Vol. XII, No. 3, Summer 1967

Book review Cryptologic history

Vol. XI, No. 2, Spring 1966

Book review Spanish cryptography

Book Review: TRATADO DE CRIPTOGRAFIA (u )

Book Review: "Analyses of the Case n = 3 in Algebraic Cryptography with Involutory Key-Matrix and Known Alphabet " (Journal fiir die Reine und Angewandte Mathemtik) (U)

Campaigne, Howard H.

Vol. IX, No. 3, August 1964

Book review Cryptanalysis

Vol. XII, No. 2, Spring 1967

Book Review: "How to Estimate Probabilities," (Journal of the Institute of Mathematics and Zts Application) (U)

Book review Mathematics

Campaigne, Howard H.

Book Review: "Involutory Cornmutants with Some Applications to Algebraic Cryptography, I" (Journal fiir Reine und Angewandte Mathemtik) (U)

Campaigne, Howard H.

Vol. XII, No. 1, Winter 1967

Book review Mathematics

DOCID: 3020956

(b) 3)-P.L. 86-36

Reference Keyword Title -

B m k Review: "Some Applications of High Speed Computers to the Case n = 2 of Algebraic Cryptography," (Mathematics of Computation,

Mathematics

Author

Vol. 15, No. 75) (U)

Book Review: "Some Further Methods in Algebraic Cryptography"; (Journul of the Mitchell Scientifi Society. No. 74) (U)

Book Review: "Variable Matrix Substitution in Algebraic Cryptography" (U)

Book Reviews: Pearl Harbor: Warning and Decision, Roberta Wohlstetter; But Not in Shume, John Toland; The Secret War, Sanche de Gramont; CIA - The Inside Story, Andrew Tully; Now I t Can Be TOM, Leslie R. Groves; Thinking About the Unthinkable, Herman Kahn; Strike in the West, James Daniel and John G. Hubbell (U)

Campaigne, Fall 1960 Book review Howard H. Mathematics

Campaigne, Vol.IV,No. Bookreview Howard H. 4, October Cryptography

1959

Unknown Vol. VIII, No. Book review reviewer 1, Winter Cryptologic history

1963

Bookbreaking Improvisations - Part I (U)

Bookbreaking Improvisations - Part I1 (U)

Borders of Cryptology, The (U)

Broadband Planar Log-Periodic Feed for the Spherical Reflector Used a t Arecibo Ionospheric Laboratory (U)

CAM I1 (U)

CAMINO (U)

Vol. XI, No. Bookbreaking 3, Summer Code 1966

Vol. XI, No. Bookbreaking 4, Fall 1966 Code

Vol. IV, No. Cryptology 4, October Electronic warfare 1959

Vol. X, No. 3, Antennas Summer 1965 Collection

Vol. IX, No. Computers 2, May 1964 Memory

Val. XII, No. Computers Virginia Jenkins 3, Summer Translation

1967

DOCID: 3020956

Title I Author Reference Keyword

Can Cryptologic History Repeat Itself? (U)

Can We Lick the Voice Problem? (U)

CANDEW: A Methodology for Evaluating HF Collection Potential (U)

CAPER Software Support System, The (U)

Capture-Jamming of SICINT Targets (U)

Categories of Cryptographic Phenomena -with a Few Examples of Effect and Cause (U)

CATNIP: Computer Analysis - Target Networks Intercept Probability (U)

Centralized Computer Support of Field Activities (U)

Cepstrum Vocoder, A (U)

Chaco: A Horrible Example (U)

Channel Modeling and Code Performance Evaluation (U)

Friedman, Vol. XMII, Cryptologic history William F. No. 3,

Summer 1973 L

1 Yol. XVII. Communications (b ) ( 1 i No. 3, (b) (3)-50 USC

Summer 197 4 0 3 (b) (3: -18 USC

Vol. XXII, HF collection 7 9 8 NO, 3, (b) (3)-P.L. Summer 1977 $6-36

I Vol. XXII, Software support No. 2, Spring Soviet 1977

Meyer, Joseph A. Vol. XII, No. Communications 2, Spring Cryptanalysis 1967

1 Vol. XII, No. Cryptography 4, Fall 1967

Vol. XVI, No. Collection 1, Winter Intercept 1971

Special Computer systems Council of Field sites Learned Organization Issue, 1972

I Special Issue, Communications January 197 1

Vol. XVIII, Translation errors No. 3, Summer 1973

i Vol. XXIII, Channels No. 2, Spring Communications 1978 and Special Mathematics and Engineering Issue, 1981- 1983

DOCID: 3020956

Keyword Title Author Reference

Russian language characteristic Features of the Russian Language of the Last Decade (U)

Chatter Patterns: A Last Resort (U)

Cipher Signal Phase Modulation (U)

Classes of Rotors without Parallels (U)

Cleaning the Augean Stables or How Much TA Can a Computer Do? (U)

Climbing Jacob's Ladder (U)

Cluster Analysis: Introduction to Models and Methods (U)

Cold-Cathode Counter Tube Study, A (U)

Chatter Traffic

Vol. XI, No. 2, Spring 1966

Vol. 11, No. 4, October 1957

Vol. XIV, No. 2, Spring 1969

Vol. X, No. 4, Fall 1965

Vol. XIII, No. 3, Summer 1968

Vol. XII, No. 3, Summer 1967

Vol. XXII, No. 2, Spring 1977

Vol. 111, No. 4, December 1958

Ciphers Modulation

Cryptanalysis Mathematics

Collected Editorials of Sydney Fairbanks (U)

Collection Management (U)

Collection of LINCOMPEX Signals (U)

Combining Functions in Key Generators (U)

COMNT Analysis and Reporting on the Developing Nations (U)

C ~ M I N T Satellites - A Space Problem (U)

Computers Traffic analysis

Fairbanks, April 1956 - Sydney July 1959

Vol. XIV, No. 1, Winter 1969

Vol. XVII, No. 2, Spring 1972

Spring 1961

Vol. XVII, No. 2, Spring 1972

Vol. IV, No. 4, October 1959

Computers Telecipher analysis

Mathematics

Pulses

Editorials

Collection management

Collection Signals

Keys Shift registers

Analysis COMINT Reporting

Communications satellite

DOCID: 3020956

Title 1 Author Reference Keyword I

COMINT Signals ~rends'('SBCQ! Vol. XXV, COMINT No. 2, Spring Signals trends

I 1980

COMINT - Hard Facts in the Cold Spring 1961 Communications War (U) Ethics

Vol. 11, No. 2, April 1957

Communications Intelligence Vol. 11, No. 2, COMINT (U) April 1957 Intercept

Communications Security and Special Computers Computers (U) Council of COMSEC

Learned Organization Issue, 1972

Communications with Extraterrestrial Intelligence (U)

Community Impacts on NSA Systems (U)

Comparison of the Efficiency of Two Methods of Estimating Certain Time Parameters, A (U)

Compiler Object Code Optimization (U)

I Callimahos, Lambros D.

Composition of Boolean Functions I (U) I Composition of Boolean Functions I1 (U)

Computer Applications: The Insatiable Appetite of the Analyst (U) 1

Vol. XI, No. Communications 1, Winter Extraterrestrial 1966 Intelligence

Vol. XXIII, Computers No. 3, Data processing Summer 1978 Networking

Vol. IX, No. Mathematics 2, May 1964

Vol. XVII, Compilers No. 1, Winter FORTRAN 1972

Special Fast Mathematics Fourier Issue, August 1973

Special Fast Mathematics Fourier Issue, August 1973

Vol. XIX, No. Computers 4, Fall 1974

Computer Automation of Circuit u Vol. VII, No. Circuit analysis Analysis (U) 4, Fall 1962 Computers

I DOCID: 3020956

Title I Author Reference Keyword

Computer Generation of Unrelated Latin Squares (U)

Computer Graphics in an Engineering Simulation Program (U)

Computer Processing of Natural Languages (U)

Computer Processing of Soviet Telemetry (U)

Computer Program Debugging: A New Era (U)

Computer Scripting (U)

Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer

Computer Sorting (U) I

Computer Transcription of Manual Morse (U) I Computer, There Is Thy Sting! (U)

Computer-Aided Bookbreaking of Two-Part Codes (U)

Vol. X. No. 3, Summer 1965

Vol. XVII, No. 2, Spring 1972

Special Council of Learned Organization Issue, 1972

Vol. XIII, No. 3, Summer 1968

Vol. XIII, No. 2, Spring 1968 and Special Computer and Information Sciences Issue

Vol. XXIV, No.1, Winter 1979

Vol. x x v , No. 4, Fall 1980

Cryptanalysis Latin squares

Computer programming

Computers Language processing

Computers Soviet telemetry

Computers Debugging

Computers Language Working aids

Communications Frequency hopping Jamming

Vol. XIII, No. Computers 3, Summer 1968

Vol. 111, No. Computers 3, July 1958 Manual morse

Transcription

Salemme, Arthur Vol. XVI, No. Computers J. 4, Fall 1971 Russian

Translation

Vol. XVII, Bookbreaking No. 2, Spring Computers 1972

DOCID: 3020956

Title

Computerized Depth Reading (U)

Computers and Advanced Weapons Systems (U)

Computers and Linguists Do Mix (U)

Computers and Queues (U)

Computers -The Wailing Wall (U)

COMSEC at WD S i t e s w

Conjugate Codebooks (U)

Content - Addressed Memaries (v)

Contextual Testing in Establishing Minimum Working Level Language Proficiency (U)

Continued Fractions and Mills' Algorithm (U)

Convergence Techniques for Finding Linear Approximations (U)

Convolutions, Cube Roots, and Computer Cryptography (U)

Cooley-Tukey Fast Fourier Transform for Base 4 and Base 4+ 2 (U)

Author Reference Keyword

Vol. XVII, Computers No. 1, Winter Cryptanalysis

Special Advanced weapons Council of systems Learned Computers Organization Issue, 1972

Vol. XVI, No. Computers 3, Summer Linguists 1971

January 1960 Computers Processes Queues

Meyer, Joseph A. Vol. I, No. 3, Codes October 1956 Cryptanalysis

Vol. VII, No. COMSEC Nathaniel C. 4, Fall 1962

Vol. XXII, Cryptanalysis No. 3, Summer 1977

Vol. IX, No. Computers 1, Winter Memory 1964

Vol. XXV, Language proficiency No. 1, Winter Testing 1980

Vol. XXV, Mathematics No. 3, Summer 1980

Special Fast Mathematics Fourier Issue, August 1973

Vol. XVIII, Computers No. 3, CryptotZra~h~ Summer 1973

Vol. XVII, Mathematics No. 4, Fall 1972

Author Reference Keyword

Vol. XIV, No. Signals analysis

Title -- -

Correlation and Power Spectra of Randomly Sampled and Held Signals (U)

2, Spring 1969

Vol. XVII, Military addresses No. 3, Summer 1972

Correlation of Frequency of Appearance of Military Unit Addresses to Unit Echelon and Combat Readiness Status (U)

Cost-Effectiveness Study of Spectrum Surveillance Systems, A (U)

Vol. XIV, No. Collection 3, Summer 1969

Vol. XVI, No. 4, Fall 1971

Mathematics Cosymmetric ~pproximations to Combining Functions (U)

Coupon Collecting and Cryptology (U) I Vol. XI, No.

4, Fall 1966 Cryptanalysis Mathematics

Cover and Deception (U) I Vol. IV, No. 3, July 1959

Communications Deception

Cranks, Nuts, and Screwballs (U)

Vol. XI, No. 1, Winter 1966

Security

Vol. XI, No. 2, W i n g 1966

Creation of an Artificial Ionosphere to Extend the Radio Horizon for Frequencies below 100 MC, The (U)

Communications

I Zoebelein, Vol. XXII, Arthur J. No. 1, Winter

1977

Vol. X, No. 1, Winter 1965

Crisis Management in the National Senior Cryptologic Course (U)

Crisis management Decision making

Computers On-line processing

Cryptanalysis German air force

Cryptanalysis in the German Air Force (U)

Vol. IV, No. 2, April 1959

Callimahos, Vol. XVI, No. Lambros D. 4, Fall 1971

Ciphers Cryptanalysis

Cryptanalyst's Nightmare: An Oneiric Problem and Its Solution, A (U)

Vol. IX, No. 3, August 1964

Cryptanalytic Applications of Sequential Analysis (U)

Cryptanalysis Mathematics

Vol. IX, No. 3, August 1964

Computers Cryptanalysis

Cryptanalytic Use of High- Speed Digital Computing Machines (U)

DOCID: 3020956 9 (h) ( 3 ) - k . I . 8 h - ? G

Title

Cryptologic Fairy Tale, A (U)

Cryptologist: Can He Exist?, The (U)

Curiosa Scriptorum Sericorum: To Write But Not to Communicate (U)

cxco Story, The (U)

CY-600 View of Language, A (U)

Author Reference Keyword

Tiltman, John H., Vol. VII, No. Cryptologic history Brigadier 2, Spring Germany

1962

Vol. 11, No. 3, Cryptologists July 1957

Vol. XVI, No. Communications 3, Summer Writing 1971

Vol. XVI, No. Cryptanalysis 4, Fall 1971 Cryptologic history

Vol. XVIII, Language

I No. 3, Linguists Summer 1973

Cybernetics and Problems of Diagnostics: the Parallels between Medicine and Cryptanalysis (U)

Cycles from Nonlinear Shift Registers (U)

Darlington Compound Transistor as a Current Controlled Voltage Source, A (U)

Data Management Challenge. The (U)

Data Standardization and the Trace Factor (U)

Callimahos, Vol. XIV, No. Cryptanalysis Lambros D. 1 ,Winter Information analysi

1969

Special Shift registers Mathematics and Engineering Issue, 1981- 1983

Vol. IX, No. Electricity 4, Fall 1964

Vol. XVI, No. Computers 2, Spring Data management 1971

Vol. XVI, No. Data standards 2, Spring Information 1971 management

Data Standards for SICINT Vol. XVI, No. Data standardizatia Activities - Some Conflicting 1, Winter Objectives (U) 1971

Data Structures and Their D'Imperio, Mary Voi. IX, No. Computers Representation in Storage: Part 3, August Memory I (U) 1964

DOCID: 3020956

Reference Keyword

11 (U)

Data Transmission over Vol. IV, No. Digital data Telephone Circuits (U)

Database Services (U)

De Profundis; or the ABC of Vol. 11, No. 1, Cryptography Depth Reading (U) January 1957 Monoalphabetic

substitution

Debugging Made Easier (U) Vol. 111, No. Computers 4, December Debugging

Degrees of Freedom in an N-b Vol. I, No. I , Frequency Frequency Distribution (U) April 1956 Distribution

Deposited Films -Magnetic Vol. I, No. 3, Films Elements for the Memory oft October 1956 Storage Future (U)

Der Fall WICHER: German Meyer, Joseph A. Vol. XX, No. Cryptologic history Knowledge of Polish Success 2, Spring ENIGMA ENIGMA (U)

Design and Implementation o Vol. XXIII, Morse Digital Demodulator for Use No. 2, Spring Signals against On-Off Keyed Signals, The (UI

Designing Secure Reliable Vol. XXI, No. Computer security Software - A Methodology (U) 4, Fall 1976 Software

Determination of Missile and April 1960 Earth satellites Earth Satellite Trajectories Orbits from Radar Observations (U)

Determining Intercept Vol. XII, No. Intercept Assignments (U)

Development of Automatic Vol. 11. No. 3, Circuits Telegraph Switching Systems July 1957 Switching systems (U) u

DOCID: 3020956 I

I (31-P.L. 86-36 I

ib) (1) (b) (3'-50 USC 403 (b) (3) -18 USC

Reference 798

(b) (3)-P.L. 86-36

April 1956 translators

Vol. XXIV, Communications No. 1, Winter Morse code

Dialect: A Data Type for the Vol. XXII, Computers Person-Machine Interface (U)

Did Alexander Popov Invent January 1960 Radio Radio? (U)

Digitizer Queuing Model for Vol. XIV, No. Collection FROSTING (U) 4, Fall 1969 Queuing theory

Distribution of Letters in Shor Vol. XIV, No. Ciphers Messages of English, The (U)

Distribution of the Maximum Vol. VII, No. Binary stream Bulge in a Flat Random Binary 4, Fall 1962 Probability Stream, The (U)

Distribution of C b4 (u, f), The Special Fast Mathematics (U)

Don't Be Too Smart (U) January 1960 Codes Japanese military

Double Transposition - A Special Case (U)

Tiltman, John H., Vol. XVII, Cryptanalysis Brigadier No. 4, Fall

1972

Drama in Cryptologic Life (U) Callimahos, Vol. XIX, No. Cryptologic history Lambros D. b 1, Winter

1974

Drawing to a Straight Flush - A Vol. XXI, No. ELINT

Study in Technical Intelligence 3, Summer Technical intelligence (u) 1976

Earliest Applications of the Computer a t NSA (U)

Snyder, Samuel Vol. XVIII, Computers S. No. 1,Winter

1973

DOCID: 3020956 -398598

Title

Education in Diagnosis (U)

Ekctrical and Magnetic Projpertb~ of Comput@r Ta* (u) Electrical Design of Random Sequence Generators (U)

Electron Beam Recording for Wideband Analog Signals (U)

Electronic Calligraphy (U)

Author Reference Key word - . . -

1, Winter 1969

Vol. IX, Nu. Digital r e c o r d i n ~ I, Wintrr IBM 198$

Val. IX, No. Encryption 3, August 1964

Vol. XIV. No. Recording 3, Summer Signals 1969

Vol. XI, No. Calligraphy 1, Winter 1966

Elements of Shift Register Cryptology (U)

Emergency Destruction of Documents (U)

Vol. XVI, No. Cryptology 2, Spring Mathematics 1971

Vol. I, No. 1, Document April 1956 destruction

Employment of Military Linguists (U)

Entropy of German, The (U)

Enumeration of the Square Permutations of the Symmetric Group (U)

Error Formula for Iterative Prefiltering Frequency Estimates, An (U)

Error in a Capacitor-Type

Gurin, Jacob Vol. XIII, No. Military linguists 4, Fall 1968 and Special Linguistics Issue, 11

Vol. I, No. 2, Frequency July 1956 Probability

Vol. XVIII, Cryptomathematics No. 4, Fall 1973

Vol. XXII, Frequency No. 3, Linear prediction Summer 1977

Vol. 111, No. Pulses Totalizer (U) 4, December Waves

1958

Errors in High Frequency Vol. IV, No. Direction finding Direction Finding (U) 1, January

1959

DOCID: 3020956 98 iti(3I-P.L. 8 6 - 3 6

Title I Author Refe~ence Key word

Estimating the Number of Solutions in [GF (2)P of a System of Equations over the Integers (U)

Euclidean Algorithm and Distances between Wheel Settings, The (U)

Evaluating Intercept Systems (U)

Evaluating Intercept Techniques (U)

Exact Markoff Probabilities from Oriented Linear Graphs (U)

Example of Computer Graphics as Applied to Key Analysis, An (U)

Example of Substantive Analysis, An (U)

Experiences 1920-1939 (U)

Experimental Approach to an 'Environment Study in the HF Band (U)

Extending the Radio Horizon for Intercept Purposes by Using the Moon as a Reflector (U)

Extensible Model of a Hand Cryptosystem, An (U)

Extraterrestrial Intelligence (Ul

Extreme Values in Cryptanalysis (U)

Tiltman, John H., Val. XVII, Brigadier 1 No. 3,

Summer 1972

Vol. VIII, No. 4, Fall 1963

I Vol. X, No. 2, Spring 1965

Vol. XXIII, No. 1, Winter 1) 1978

Campaigne, Vol. XI, No. Howard H. 2, Spring

I 1966

Vol. IV, No. 4, October 1959

Mathematics

Cryptanalysis Mathematics

Signals

Intercept evaluation

Mathematics

Computer graphics

Analysis Soviet

Cryptologic history

Collection Signals

Intercept Signals

Computers Cryptanalysis

Communications Extraterrestrial

Intelligence

Cryptanalysis

DOCID: 3020956 e l 4 3 9 8 5 9 8 n

Title

Factors Affecting Required Antenna Gain in VHF Intercept (U)

Faithful Mirror. The (U)

"False Friends" of the Translator in the English and Russian Languages: A Translation from the Russian of V. V. Akulenko (U)

Fallacy of the One-Time-Pad Excuse, The (U)

Author Reference Keyword

Vol I., No.3, Antenna gain October 1956 VHF intercept

Vol. XIV, No. Bookbreaking 1, Winter 1969

Vol. XVI, No. Russian translation 4, Fall 1971

Vol. XIV, No. Cryptanalysis 3, Surntner 1969

Fallacy of the Systems Meyer, Joseph A. Vol. VII, No. Engineering Approach, The (U) 3, Summer

1962

Famous First Facts, NSA, Part Vol. XVII, Computers I: Pre-Computer Machine No. 4, Fall Cryptanalysis (U) 1972

Fast Dynamic Programming Vol. XXI, No. Mathematics Algorithm and Its Mathematical 1, Winter Basis, A (U) 1976

Fast Look-up in a Threaded Vol. XVI, No. Dictionary references Dictionary (U) 1, Winter

1971

FDM Activity Detection (U) Vol, XXI, No. FDM signals 1, Winter 1976

Few Tricks of the Trade for the Vol. XI, No. Russian language Translator of Russian, A (U) 4, Fall 1966 Translation

Finding the Best-Scoring Vol. XIV, No. Mathematics Permutation (U) 4, Fall 1969

"Fingerprinting" Code Croups Vol. XVII, Bookbreaking by Computer (U) No. 3, Computers

Summer 1972

FIR: A CDC 1604 Program for Vol. X, No. 1, Computers Solution of Systems of Linear Winter 1965 Mathematics Equations (U)

Title

Flattening Effect, The (U)

"Food for Thought" in LVHF Reception (U)

Foreign vs. U.S. Computers: An Appraisal (U)

Fourier Analysis on Finite Abelian Groups (U)

Fourier Coefficients and Function Decomposition (U)

Fourier Modulus Method of Cage Identification (U)

DOCID: 3020956 9 9 8 {b (31-P.T. 96-36

Author Reference Keyword

Kullback, Val. X, No. 1, Cryptology

20

-- - - -- -

Solomon

i

Winter 1965 Mathematics

Vol. XX, No. LVHF collection 4, Fall 1975

Special Computers Council of Learned Organization Issue, 1972

Vol. XXI, No. Mathematics 3, Summer 1976

Special Fast Mathematics Fourier Issue, August 1973

April 1960 Cryptanalysis

Vol. XVII, Bookbreaking No. 1, Winter Computers 1972

Vol. XXI, No. Translation 3, Summer 1976

Vol. XVI, No. Signals analysis 1, Winter 1971

Vol. IV, No. Digital circuits 4, October Logic 1959

Vol. VIII, No. COMINT

Frame Versus Corpus (U)

Freedom in Translation (U)

Frequency Analysis of a Set of Harmonically Related Tones (U)

Fundamentals of Majority Logic (U)

Future Problems of Intercept (U) Gerson.

FUZZY: An Evolutionary Model for Data Structures (U)

Garden Paths I Have Followed

Nathaniel C. 1, Winter ELINT 1963

Vol. XXIV, Programming No. 3, Software Summer 1979

Vol. IX, No. Cryptanalysis

(U) 3, August 1964

GEE System - I, The (U) Unknown t- Fall 1961

Cryptologic history Germany

DOCID: 3020956 9 9 8 5 9 8

Title I Author Reference Keyword

GEE System - 11, The (U)

GEE System - 111, The (U)

GEE System - IV, The (U)

GEE System - V, The (U)

GEE WHIZZER (U)

Generalizations of "Maximum- Entropy" (Pattern) Analysis (U)

Generating Function Approach to GRETAG, A (U)

Generating Random Characters on a Computer (U)

Generation of Permutations (U)

Genesis of Mobile Magoo, The tU)

Geodetic Latitude and Altitude from Geocentric Coordinates (LJ)

Geometric Approach to Waveform Recognition, A (U)

German Agent Systems of World War II*

German Radio Intelligence (U)

Unknown Vol. VII, No. Cryptologic history 1, Winter Germany 1962

Unknown Vol. VII, No. Cryptologic history 2, Spring Germany 1962

1 unknown Vol. VII, No. Cryptologic history 3, Summer Germany 1-1 1962 ( 9 ) ( 3 1 - P . L . 66-36

I b Vol. VII, No. Cryptologic history I 1 4, Fall 1962 Germany

I

Unknown Vol. VIII, No. Cryptanalysis 1, Winter 1963

Vol. XXIV, No. 2, Spring 1979

Vol. XXII, No. 1, Winter 1977

Vol. XII, No. 1, Winter 1967

Vol. IX, No. 2, May 1964

Vol. XX, No. 3, Summer 1975

Vol. XX, No. 1, Winter 1975

Vol. VIII, No. 2, Spring 1963

Vol. VII, No. 3, Summer 1962

Vol. x x v , No. 4, Fall 1980

Signal theory

Mathematics

Code generation Computers

Telemetry processing

Astrodynamics Mathematics

Mathematics

Cryptologic history Germany South America

Cryptologic history German COMINT

DOCID: 3 0 2 0 9 5 6

Title

German Tiresand Black Cats: Estimation of Population Size (U)

Graceful Degradation through Distributed Intelligence (U)

Author Reference Keyword

Growing up with Computers a t NSA EU)

Graph Theory (U)

Gweeks Had a Gwoup for It, The (U)

I

Handle with Care: Russian Transliteration (U)

Help Stamp Out Programming (U)

Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Saling, The (U)

High-Speed Automatic Scanning of Speech Bandwidth Channels (U)

Hill Climbing (U)

--

Vol. XIX, No. Cryptanalysis 3, Summer 1974

Vol. XXIII, Computers No. 3. Summer 1978

Vol. XII, No. Mathematics 3, Summer 1967

Eachus, Joseph, Special Computers 1 Council of

Organization I Learned Jacobs, E. Dale Issue, 1972 Marston, Charles J. Schierlmann, Samuel S. Snyder; Moderator, Howard H. Campaigne

Filby. P. W. Vol. XXI, No. Bletchley Park 2, Spring Cryptologic history 1976

Salemme, Arthur Vol. XII, No. Russian 4, Fall 1967 transliteration

Jacobs, Walter Vol. XIV, No. Computer 1". , t g ~ r n e r programming

Vol. XXI, No. Cryptanalysis 4, Fall 1976

Vol. XX, No. Speech scanning 4, Fall 1975

Vol. X, No. 4, Mathematics Fall 1965

DOCID: 3020956 -A398598 A

How Can the Communications Sciences Contribute to the Study of Natural Systems? (U)

Title

Hoopscotch (U)

How the Germans Broke a U.S. Code (U)

Author Reference Keyword

Vol. XII, No. Games 2, Spring 1967

How the Japanese Army Water Transport Code 2468 Was Broken (U)

How to Choose a Cood Crib (U)

How to Visualize a Matrix (U)

Human-Machine Interfaces for NSA Computer Systems (U)

Hybrid Circuits (U)

IFF: A New Branch of Cryptology (U)

In General t h n t e r a t i o n

Inexpensive Device for Pictorial Input and Output, An (U)

Informa tion Storage and Retrieval (U)

Information Theory and the Packing of Spheres (U)

( D'Imperio, Mary

Vol. XX, No. Collection 2, Spring 1975

Vol. VIII, No.. 3, Summer 1963

Fall 1960

Vol. XVIII, No. 4, Fall 1973

Vol. X, No. 4, Fall 1965

Vol. MII, No. 3, Summer 1963

Vol. XXIV No. 4, Fall 1979

Communications Cybernetics

Codes Germans

Cryptologic history Japan

Cryptanalysis

Mathematics

Computers SOLIS

Vol. 111, No. Circuits 1, January 1958

Vol. 11, No. 4, IFF October 1957 Planes

Vol. XII, No. Mathematics 1, Winter 1967

I

January 1960 Computer graphics

1 Vol. VIII, No. Information retrieval

I 1 4, Fall 1963

Vol. IV, No. Information theory 2, April 1959

-

DOCID: 3020956 -98 ibi(3 -P.L. 86-36

Title Author

Information Theory Applied to Computer Data Compression (U)

Insolvable Problem, An (U)

Reference Keyword

Vol. XXIII, Computers No. 4, Fall Data compression 1978 and Special Mathematics and Engineering Issue, 1981- 1983

Vol. VIII, No. Computers 3, Summer Cryptology 1963 Turing machine

Instant Expertise (U) Unknown Vol. XII, No. Buzzwords 1, Winter 1967

Integrated and Guided Wave Optics and Device Applications (U) r Vol. XXIV, Optics

No. 2, Spring Signals processing 1979 and Special Mathematics and Engineering Issue, 1981- 1983

Intercept and Electtomagnetics Gerson, Vol. XX, No. (U) Nathaniel C. 2, Spring

1975

Intercept of USSR Missile Gerson, Vol. IV, No. Transmissions (U) Nathaniel C. b 3, July 1959

Intercept System Analysis (U) Vol. XI, No. 2, Spring 1966

Interference and Intercept (U) Gerson, Vol. XVI, No. Nathaniel C. 1, Winter

1971

International or Cross-Country r l Vol. I, No. 3, Depths (U) October 1956

Introduction To APL, An (U) n Vol. XVI, No. 4, Fall 1971

Introduction to Computer Vol. 111, No. Binary Arithmetic, An (U) 2, April 1958

Electricity Optics

E lectrornagne tics Missile radiation

Communications Intercept

Intercept Noise

Cryptanalysis

Computers Cryptanalysis

Computers Mathematics

DOCID :

Title I Author Reference Keyword

Introduction to Cryptology - 11, An (U)

Introduction to Cryptology - I , An (U)

Introduction to Cryptology - 111, An (U)

Friedman, Vol. IV, No. Cryptologic history William F. 4, October

1959

Friedman, April 1960 Cryptologic history William F.

Friedman, Fall 1960 Cryptologic history William F.

Introduction to Cryptology - IV, Friedman, I Winter 1961 Cryptologic history An, (U) William F.

Introduction to Cryptology - V, An, (U)

Friedman, Summer 1961 Cryptologic history William F.

Introduction to Cryptology - VI, Friedman, Fall 1961 Cryptologic history An, (U) 1 William F.

Introduction to Diagnosis (U)

Introduction to Electronic Phase-Lock Oscillators, An (U)

Introduction to IBM Methods in Cryptanalysis, An (U)

Introduction to Log-Linear Models in Cryptanalysis (U)

Introduction to Magnetic Tape Recording and Its Use in Intercept Activities, An (U)

Introduction to Programming of a Digital Computer (U)

Introduction to Psycholinguistics, Paralinguistics, and Kinesics, An, (U)

Introduction to Semiconductor Physics and Diode Theory (U)

Vol. XIII, No. Cryptanalysis 3, Summer 1968 I !i?~i No. phase-lock

ascillators

Callimahos, Vol.II,No.3, Cryptanalysis (b)(3)-P.L. 86-36 Lambros D. July 1957

Vol. XXV, Computing No. 2, Spring Cryptanalysis 1 I980

Vol. I, No, 3, Communications October 1956 Recording

I Val. 11, No. 3, Computer programming July 1957

I 1 Vol. XII. No. Communications

U 2, Spring 1967

Vol. 11, No. 2, Electronics April 1957

DOCID: 3020956 ) -50 USC 1 0 3 (b) (31-18 USC 798

Title

Introduction to Statistical Pattern Recognition (U)

Author Reference Keyword

Vol. XXII, Pattern No. 3, recognition Summer 1977 and Special Mathematics and Engineering Issue, 1981-

Introduction to the Fast Fourier Transform, An (U)

Special Issue, Computers January 1971 Mathematics

Introduction to the Methods of I I Summer 1961 Thin film analysis Thin Film Analysis, An (U)

Introduction to the Special Issue (U)

Introduction to Traffic Analysis (U)

Introduction to "Hairpin" Registers (U)

Intuitive Exposition of Zierler's Method for Finding Linear Recursions, An (U)

Investigation of Nonrandom Features in the Optical Fourier Transform of Shift Register Sequences and Binary Key, An (U)

Investigation of Techni ues for the Analysis ofthe-[ T I (u)

SpecialFast Mathematics Fourier Issue, August 1973

Callimahos, Lambros D.

Vol. 111, No. Traffic analysis 2, April 1958

Vol. XX, No. Cryptovariables 1, Winter 1975

Vol. XIII, No. Cryptography 1, Winter Linear recursions 1968

Vol. XIX, No. Cryptomathematics 4, Fall 1974

Vol. XX, No. Signals 4, Fall 1975 Soviet

Investigations into Adult Vol. XXIV, Language acquisition Language No. 3, Learning/Acquisitions (U) Summer 1979

Ionospheric Propagation (U) Gerson, Vol. 111, No. Communications Nathaniel C. and 4, December Ionosphere

1958

"It Is Obvious That . . .": A Vol. 111, No. Codes Painless Approach to 2, April 1958 Messages Cryptanalytic Diagnosis (U)

Title

JACQUARD - A Yates Algorithm Machine (U)

John Dee: Consultant to Queen Elizabeth I (U)

Author Reference Keyword

JACQUARD machine Fourier Issue, Mathematics August 1973

I Vol. XII, No. Cryptologic history 4, Fall 1967

Vol. XXIV Chinese communists No. 1 Winter Korean War _] 1979

Key to the Extraterrestrial Campaigne, Vol. XIV, No. Communications Messages (U) Howard H. 1, Winter I , 1969

Extraterrestrial intelligence

Labeled Oriented Graphs Which are Onto (u) I I Vol. X, No. 1, Mathematics

Winter 1965

Language and the COMINT Vol, XIX, No. COMINT Production Process (U) 3, Summer Language

1974

Language as a Bulk Commodity Vol. XX, No. Language (U) 3, Summer

1975

Language Files: A Basic COMINT Aid (U)

Language Levels and Cryptologic Jobs (U)

Salemme, Arthur Vol. IV, No. COMINT J. 2, Russian language

April 1959

Tetrault, Emery Vol. XVIII, Language W. No. 3, Qualification standards

Summer 1973

Language Problem at NSA, The -1 Vol. I, No. 1, Esperanto (u) 1 April 1956 Language

Layman's Guide to the Gurin, Jacob Vol. XXIII, Language Mysteries of Linguistics, A (U) No. 1, Winter Linguistics

1978

Learn with BOOK (U)

Learning Machines (U)

Learning Machines - Part I1 (U)

Vol. XI, No. Light reading 3, Summer I-' 1966

Jacobs, Walter Vol. 111, No. Learning machines 3, July 1958

Jacobs, Walter Vol. IV, No. Learning machines 2, April 1959

DOCID: 3020956 9 9 8 ( b ) ( 3 ) - P . L . 86-36

Title 1 Author Reference Keyword

Least Squares Analysis of a Vol. IV, No. Mathematics Probability Matrix, The (U) I Library and the User, The (U) I LIGHTNING (U)

~ G H T N I N G Program, hew

Linear and Quadratic Electro- Optic Effects (Pockels and Kerr Effects) (U)

Linear Approximation Attack on a n Irregularly Stepping Key Generator, A (U)

Linear Approximations and the Degree of the Function (U)

Linear Approximations Using Continuous Functions (U)

Linearly Induced Nonlinear Cycles (U)

Linguistic Canonical Forms: Tools for Analytic Progress (U)

List of Properties of Bayes- Turing Factors, A (U)

Logarithmic Scoring and Preliminary Testing (U)

Long and Short of Single Transpositions, The (U)

1, January 1 1959

Vol. XIII, No. Library 2, Spring Research 1968

I Campaigne, Vol. IV, No. Computers Howard H. 3, July 1959

Vol. VIII, No. Computers 1, Winter 1963

Vol. IX, No. Optics 4, Fall 1964

Special Fast Mathematics Fourier Issue, August 1973

Special Fast Mathematics Fourier Issue, August 1973

Special Fast Mathematics Fourier Issue, August 1973

Vol. XXII, Mathematics No. 4, Fall 1977

Vol. XIII, No. Communications 1, Winter Language 1968 and Special Linguistics Issue, I1

I Vol. X, No. 2, Mathematics Spring 1965

Vol. 11, No. 1, Cryptanalysis January 1957

Vol. XXI, No. Cryptanalysis Mathematics

DOCID: 3020956

Title Author

Law Cost Process for Printed Circuits, A (U)

Low Weight Linear Recursions in Key (U) I LVHF Propagation and Collection Techniques (U)

Machine Translation (U)

Machine-Aided Translation - Wild, Norman Where Is I t Today?(U)

Magic Digraphs (U) rn Magnetic Core Memories (U)

Management of Magnetic Tape (U) I Maps and the Conversion of Gauss-Kriiger Grid Coordinates I Markov Chain - The Models with the Short Memories (U)

Markov Models for Phonetic Text (U)

Reference Keyword

Vol. XVIII, Dictionaries No. 1,Winter Foreign languages 1973

Vol. 11, No. 1, Circuits January 1957

Vol. VIII, No. Mathematics 1, Winter 1963

Vol. XVI, No. LVHF collection 4, Fall 1971

Vol. XII, No. Machine translation 2, Spring 1967

Vol. XVIII, No. 2, Spring 1973 and Special Linguistics Issue, I1

Vol. XII, No. 1, Winter 1967

Vol. 11, No. 1, January 1957

Vol. X, No. 4, Fall 1965

Vol. 111, No. 1, January 1958

Vol. XVII, No. 1, Winter 1972

Vol. XVIII, No. 1,Winter 1973

Machine translation

Cryptanalysis

Computers Memory

Tape management

Mapping

Mathematics

Communications Speech

, - , , - ,

(b) (3)-P.L. 86-36 (b) ( 3 ) - P . L . 8 6 - 3 6 ( b i (31-7.1,. 86-36

Title I Author Reference Keyword

Mathematical Analysis of Jitter in a Digital Frequency Source (U)

Mathematical Modeling of TEMPEST Channels (U)

Mathematics and Computers in Cryptanalysis (U)

Matric Recursions (U)

Matrix Business: Part 11, This (U)

Matter Transmission (U)

Maximum Likelihood Estimation of a Trajectory and Its Variance (U)

Maximum Likelihood Estimation of an Orbit (U)

Maya Astronomical Computer, The (U)

"Maybe It's Related to the Phase of the Moon" (U)

Measurement of Insecurity for Imperfect Erasure, A (U)

Mechanical Translation (U)

Vol. VIII, No. Frequency 2, Spring 1963

Vol. XVI, No. Signals 3, Summer TEMPEST 1971

Special Computers Council of Mathematics Learned Organization Issue, 1972

Vol. XXII, Mathematics No. 3, Summer 1977

Vol. 111, No. Mathematics 3, July 1958

Vol. XXIV, Computers No. 4, Fall Encryption 1979

Vol. VIII, No. Cryptosecurity 1, Winter 1963

Vol. XIII, No, Satellite trajectory 1, Winter 1968

Fall 1961 Celestial mechanics

Vol. XXII, Astronomy No. 1, Winter Cryptologic history 1977

Vol. XVII, I I No. 4. Fall PRC

Vol. XXII, Degaussing No. 1, Winter Tape storage 1 1977 Vol I, No. 1, Translation April 1956

DOCID: 3020956

Title - -

Mechanical Treatment of Fibonacci Sequences, A (U)

Mechanization Systems and a New Look a t Management and Organization (U)

Metalin: A Draft of a Metalanguage (U)

Method of Recovery of Fibonacci Key, A (U)

Mickle-Muckle Principle in Hagelin Cryptanalysis, The (U)

MICROCOMPUTER: General- Purpose Signal Process, The (U)

Midway and Yarnamoto: Properly Revisited (U)

Minimizing Noise Effects in PCM (U)

Minimizing Wasted Space in Information Files (U)

Missile Trajectories (U)

Model 204 -The Analyst's Computer (U)

Modification of a Phantastmn Generator, A (U)

Modified Normal Curves (U)

Mokusatsu: One Word, Two Lessons (U)

MP-14: Unlimited Random Source (U)

I Author Reference Keyword I I 1 Vol. 11, No. 4, Cryptanalysis

I Vol. VII, No. Management 2, Spring

I Vol. Xi, No. Artificial language 4, Fall 1966

Vol. 1, No. 3, Cryptanalysis October 1956

Vol. IX, No. Cryptanalysis 4, Fall 1964 Hagelin machine

I Vol. XXII, Signal processing No. 2, Spring

Vol. XIII, No. 3, Summer 1968

I Vol. 11, No. 2, April 1957

Vol. XIV, No. 4, Fall 1969

Vol. 11, No. 1, January 1957

Vol. XXI, No. 3, Summer 1976

Vol. IV, No. 4, October 1959

Cryptologic history Midway

Collection

File storage

Missile trajectory

Analysis Computers

Circuits

Spring 1961 Cryptanalysis Mathematics

Vol. XIII, No. Translation 4, Fall 1968 and Special Linguistics Issue, I1

Vol. XVII, Computers No. 3, Cryptanalysis Summer 1972

DOCID: 3020956

Title I Author

"MUFFLER" BANDAID (LVHF and HF Communications Aid) (U)

Multichannel Language Processing As a System (U)

Multilingual Codes (U)

Multipath Differential Doppler Data (U)

Multiple Hypothesis Testing and the Bayes Factor (U)

Narrow-Band Speech S (U)

Need for System Approach, The (U)

Nest of Dragons, A: The Voice Problem (U)

Gurin, Jacob

Net Reconstruction - A Basic Step in Traffic Analysis (U)

New Approach to the One-Time Pad, A (U)

New Concept in Computing, A 1

Reference Keyword

Vol. XX, No. 3, Summer

Vol. XVII, Language processing No. 4, Fall 1972

Vol. X, No. 4, Codes Fall 1965 Language

Vol. XXI, No. Signals 3, Summer 1976

Vol. XVI, No. Cryptomathematics 3, Summer 1971

Vol. 111, Cipher equipment No. 4, Security December 1958 and Special Linguistics Issue (bi 13)

3GA

Vol. VII, No. SIGINT 2, Spring 1962

Vol. XXI, No. Language 1, Winter Voice problem 1976

Vol. 111, No. Traffic analysis 3, July 1958

Vol. XIX, No. Ciphers 3, Summer One-time pads 1974

Vol. 111, No. Computing 4, December 1958

New Mode of Operations in Vol. 11. No. 3, Circuits Junction Transistors, A (U) July 1957

No, Not Again! (U) Callimahos, Vol. I, No. 1, Ciphers Lambros D. April 1956

DOCID: 3020956

Title

Noise Communicatioa Technique for Speech (U)

Noisy Pluggings (U)

Note on a Solution of a Polyalphabetic Dinome System, A (U)

Note on Chinese Language Reform and NSA, A (U)

Note on Curve Fitting, A (U)

Note on Product Sequences, A (U)

Note on the English VCCCC Pattern or Maximum Post- Vocalic Consonant Clustering in Monosyllabic English Words, A (U)

Note on Univariant Interpolation (U)

Note on "A Low Cost Process for Printed Circuits" (U)

Note on "Logarithmic Scoring and Preliminary Testing" (U)

Notes on Chi-Square in Cryptanalysis (U)

Notes on Missile Terminal Ballistics (Soviet) (U)

Null Hypothesis, The (U)

Number of Components in a Random Linear Graph, The (U)

Offsets of Differences: Summation and Difference Methods (U)

Author Reference Keyword

7 Vol. VII. No. Communications 1 4, Fall 1962

I Vol. 111, No. Noise 2, April 1958

I Vol. I, No. 3, Ciphers October 1956

I

Wild, Norman Vol. I, No. 2, Chinese language July 1956

Vol. XIII, No. Mathematics 4, Fall 1968

Vol. XVI, No. Mathematics 2, Spring 1971

I Vol. XVII. Language identification I No. 1, Winter

Vol. 111, No. Interpolation 4, December 1958

Vol. 11, No. 3, Circuits July 1957

I Vol. 11, No. 4, Mathematics October 1957

I Vol. 11. No. 3, Cryptanalysis July 1957

Vol. IX, No. Missile trajectory , 1 ;".ter

Campaigne, Vol. I, No. 2, Cryptology Howard H. July 1956

Vol. IV, No. Cryptanalysis 2, April 1959

Vol. 11, No. 4, Encipherment October 1957

DOCID: 3020956

Title

On an Algorithm for Approximate Polybit Scoring Using Fourier Transforms (U)

Author Reference Keyword

1 Special Fast Mathematics (b)

Fourier Issue. August 1973

On Cipher (U) I I January1960 Ciphem

On Comparing Two Observed I I Vol. 111, No. Chi-squares Frequency Counts (U) 2, April 1958

On Cryptanalysis and u Vol. IV, No. Cryptanalysis Redundancy (U) 3, July 1959

On Key Analysis (U)

On Milking the Sacred Cow (U)

On Operatorless Computers (U)

On Tests of Sequences (U)

On the Distribution of n-Digit Groups by the Sum of Their Digits (U)

On the Expected Number of Random Stops Corresponding to a Given Menu (U)

On the Maximization of X'AX over the Vertices of the Cube (U)

On the Minimization of Integer Quadratic Forms over Nonzero Integer Vectors (U)

On the Selection of Cryptanalysts - Part I1 (U)

On the Selection of Personnel for Cryptanalysis (U)

On Understanding the Null Hypotheses of Test Statistics (U)

Callimahos, Lambros D.

Vol. XIX, No. Cryptanalysis 4, Fall 1974

Vol. XVII, Collection No. 2, Spring 1972

Vol. I.,, No. 1, Computers April 1956 Storage

Kullback. Vol. VII, No, Cryptanalysis

01. I, No. 2, Cryptography uly 1956 F 01. VIII, No. Cryptanalysis

01. VIII, No. Cryptanalysis , Winter 6%.

Mathematics o. 1, Winter

pril1960 Cryptanalytic personnel

anuary 1960 Cryptanalytic personnel

01. VIII, No. Mathematics , Fall 1963

Title Author

One Model for an Artificial Ionosphere (U) r Operation Babel (U)

Operation VANGUARD (U) I I O~erations Research in NSA 1

Optical Data Processing - A Cryptanalytic Perspective (U)

Optical Fourier Transform and Periodic Phenomena (U)

Optical Receiver, The (U)

Optimum Use of h g Weights (U)

Orbit Computation with the Vinti Potential and Universal Variables (U)

Orbit Fitting ta Angular Data (U)

Order Statistics for Cell Counts I OVERLORD, the Programmer's Friend: An Extension of the ~DASYS Operating System (U)

Parabolic "Mock" Design for an FFT - Implemented Filter Scheme (U)

Reference Keyword (bj 131-P L. 86-36

Vol. XI, No. Radio intercept 2. Spring 1966

Vol. IV, No. Computers 3, July 1959

Vol. I, No. 2, Communications July 1956 Earth satellites

Vol. X, No. 1, Management Winter 1965 Operations

Vol. XX, No. Cryptanalysis 3, Summer Data processing 1975

Vol. XVIII, Mathematics No. 3, Summer 1973

Vol. XXV, Spread spectrum No. 1, Winter 1980

Vol. XIII, No. Optical receiver 2, Spring 1968

Vol. IX, No. Computers 3, August Plain text 1964

Vol. XIX, No. Astrodynamics 1, Winter 1974

Vol. XXI, No. Astrodynamics 2, Spring 1976

Vol. XXIII, Mathematics No. 4, Fall 1978

Vol. XXII, Computer operating No. 2, Spring systems 1977

Special Issue, Filters January 1971

(DOCID: 3020956 i b ) (3)-50 USC 403

0 9 8 (b) 1 3 ) - P . 1 , . 86-36

Patent Matters and the Technical Employee (U)

Pattern Recognition (U)

Title

Penney-Ante (U) r

Author Reference Keyword

Perpetuation of Bias in Shift Register Devices (U)

Personal Contribution to the Bombe Story, A (U)

Parity as an Operation Checking Code (U)

Philosophy of U.S. Cryptography and Cryptographic Usage, A (U) I

Vol. VIII, No. Mathematics 3, Summer 1963

Phonemic Structure of Nootka, The (U)

Polar Ionosphere, The (U)

Possible Applications of Keyword Recognition in Voice Intercept (U)

Potential of Interactive Computer Programs in the Decryption Process of SIGINT, The (F43WW

Potential of Tropospheric Ducting as a Collection Technique, The (U)

PPM Telemetry Simulator (U)

Preamble for Push-to-Talk Ciphony, A (U)

Gerson, Nathaniel C. C Gurin, Jacob

Vol. X, No. 3, Inventions Summer 1965 Patents

Winter 1961 Pattern recognition

Vol. XII, No. Cryptanalysis 1, Winter 1967

Vol. XIV, No. Shift registers 4, Fall 1969

Vol. XX, No. Cryptologic history 4, Fall 1975 ENIGMA

Vol. XII, No. Cryptography 3, Summer 1967

Fall 1960 American Indian language

VO~. IX, NO. ELINT 2, May 1964 Signal analysis

Summer 1961 Ionosphere Physics

Vol. XXII, Keywords No. 1, Winter Voice intercept 1977

Vol. XXV No. Computers 3, Summer Cryptanalysis 1980 SIGINT

Vol. XX, No. Collection 1, Winter 1975

Fa11 1960 -]telemetry

Vol. XII, No. Communications 2, Spring 1967

DOCID: 3020956 REF ID:A398598 -ib) (3)-P.;. 86-36

Title I Author Reference

Communications Intelligence (U)

Preliminary Historical Report Unknown

h Vol. IX, No.

on the Solution of the "B" 2, May 1964 Machine (U)

Privacy and Protection in Vol. XVIII, Operating Systems (U) No. 2, Spring

1973

Probabilities of Hypotheses and Kullback-Leibler Information- Statistics in Multinomial Samples (U)

PROBE DATA (U)

Problem Solving with On-line Systems (U)

Problems of Meaning in Interlingual Dictionaries (U)

Processes for Random and Sequential Accessing in Dynamic Memories (U)

Vol. I, No. 3, October 1956

Meyer, Joseph A. Vol. XI, No. 1, Winter 1966

Product Sequences I1 (U)

Program Complexity Measure, A (U)

Program for Correcting Spelling Errors, A (U)

Programmatic Control of Parallel Processes (U)

Programming Concepts for Verification and Security (U)

Special Council of Learned Organization Issue, 1972

Vol. 111, No. 1, January 1958

Vol. XXII, No. 4, Fall 1977

Key word

Cryptologic history

Cryptologic history

Operating systems Privacy

Vol. XX, No. 4, Fall 1975

Vol. XXI, No. 4, Fall 1976

Vol. IV, No. 4, October 1959

Vol. XVII, No. 2, Spring 1972

Vol. XXII, No. 4, Fall

I 1977

On-line systems Problem solving

Language dictionaries

Dynamic memory Mathematics

Mathematics

Software engineering

Computers

Computer programming

Programming Software

'%da~~z793 02 0 956 REF IDzA398598 b)i3)-P.,. Ha-3C L

"(b) 1 2 ) - P . L . 86-36

Title I Author Reference Keyword -

Project EXPLORER (U)

Project TENNIS and External Influences on NSA Systems Development (U)

I Public Key Cryptosystems (U)

Vol. XVI, No. Cryptologic history 2, Spring Vietnam 1971

~ o l t e , ~ i l l i a m VOI. XXIII, 7 1 M. No. 2, Spring

1978 I

Vol. XXIV, ,Crwtjmathematics No. 3, Summer 1979

I Vol. XXIV, Cryptosystems No. 1, Winter

Q.E.D.- 2 Hours, 41 Minutes (U)

Quick Check for Transposal Garbles, A (U)

m ~ h e Case for Bad Grammar (U)

RAKE System for.Tropospheric Scatter, A (U)

I Callimahos, Vol. XVIII, Lambros D. No. 4, Fall

01. IV, No. , April 1959 nd Special inguistics

01. IX, No. , May 1964 d Special

inguistics

(b) (1) Ciphers !b) ( 3 ) -50 USC

403 (b) ( 3 ) - 1 8 USC 7 9 8 (b) (3)-P.L.

Russian grammar

01. X, No. 4, Collection

Random and Algebraic 01. XXIII, Mathematics Coverings of Binary Vectors (U) 0.3,

ummer 1978

Mathematics

Engineering Issue, 1981-

Random Walks with Restraining Barrier as Applied to the Biased Binary Counter

Vol. 111, No. Computers 2, April 1958 Sampling

DOCID: 3020956

Title Author Reference Key word i 3)-P.L. 86-36

Randomization Made to Order: Special ~ r y p t a n l y s i s )

"Random Numbers Are Too Council of Randamization Important to be Left to Chance" Learned (U) Organization

Issue, 1972

Range Dependence on System Vol. IV, No. Communications Temperatures (U) 1, January

1959

Rationale for and Preliminary Vol. XXIII, Computers Implementation of HYPERCAN No. 4, Fall Cryptanalysis (High Performance 1978 Cryptanalysis) (U)

Readinga Depth By Computer Jacobs, Walter Vol. X, No. 2, Computer (U) W. Spring 1965 programming

Reading TUNNY (U) Campaigne, Vol. VII, No. Cryptologic history Howard H. 4, Fall 1962 Germany

Real-Time Raster (U) Vol. XXf V, ELlNT collection No. 1, Winter 1979

Realization and Optimization of Vol. XIII, No. Filters the Audio Frequency 4, Fall 1968 Frequency Microminiature Thin Film Special Band-Pass Filters (U) Mathematics

and Engineering Issue, 1981- 1983

Receiving System Analysis (U) Vol. X, No. 1, Receivers Winter 1965

Reciprocal Alphabets and Friedman Squares (U)

Recognition of Latin Square Equivalence Classes (U)

Recollections Concerning the Birth of One-Time Tape and Printing-Telegraph Machine Cryptography (U)

Kullback, Vol. 111, No. Reciprocal Solomon 1, January alphabets

1958

Vol. XVI, No. Cryptanalysis 3, Summer 1971

Vol. I, No. 2, Cryptography July 1956

DOCID: 3020956

Title

Recording T e c v Affecting Total Intercept

Recovering the Structure of a Linear Shift Register (U)

Recovery of Pre-Detection Signals in the Optical Receiver (U)

Recurrent Events and Baudot Streams (U)

Red China's Drive for Literacy (U)

REDMAN Program, The (U)

Redundancy Exploitation in the Computer Solution of Double- Crostics (U)

Reference Patterns for Nearest Neighbor Rule (U)

Reliability and Checking in Computing Systems (U)

Remarks Concerning Substantialization (U)

Repagination? (U)

Report of the Second Computer Study Group (U)

Report on the Keyword System, A (U)

Author Reference Keyword

Vol. IX, No. Intercept 1, Winter Recording 1964

Vol. XIV, No. Cryptanalysis 4, Fall 1969

Vol. XIII, No. Signals 4, Fall 1968

I Vol. 11, No. 2, Baudot streams April 1957

Vol. XVI, No. Communist China 2, Spring 1971

Vol. IX, No. Data processing 1, Winter 1 964

Vol. VII, No. Computers 2, spring 1962

Vol. XXII, Signals analysis No. 1, Winter 1977

Vol. 11, No. 4, Computer October 1957 diagnostics

Vol. IX, No. Mathematics 4, Fall 1964

Vol. XVIII, Bookbreaking No. 4, Fall Computers 1 1973

Various Vol. XIX, No. Computer use 1, Winter NSA 1974

Kullback, Vol. IV, No. Codes Solomon, and F. 3, July 1959 Keywords W. Lewis

Representation of Signals on Vol. IX, No. Signals Orthonormal Bases, The (U)

DOCID: 3020956 REF IDtA398598 :(b) ( 3 ) - P . L . 86-36

Title Author Reference

Representative Machine Cipher Callimahos, Vol. 111, NO. Systems (U) Lambros D. 1, January

1958

Representing Data in Vol. 111, No. Computers (U) 1, January

I 1958

Research a t NSA (U) Campaigne, Vol. XfII, No. Howard H. 2, Spring

j 1968

Response of a Non-Linear Vol. VIII, No. Device to an Emitter 1, Winter Environment in the High 1963 Frequency Spectrum, The (U)

Reverse Sort Machine Listings D'Imperio, Mary Vol. XVIII, (U) No. 1,Winter

1973

Revision - de novo, A (U) Wray, W. D. Vol. I, No. 3, October 1956

RF Interference Phenomenon Vol. XXIII, and Intelligence Applications No. 4, Fall (u) 1978

Rocheford's Cipher: A Discovery Gaddy, David W. Vol. XVIII, in Confederate Cryptography No. 4, Fall (U) - 1973

Rocket Motion and Newton's Fall 1960 Second Law (U)

Role of Carrier (VCh) Telephony in Soviet World War I1 Strategic Communications (U)

Room 40 Compromise, The (U) I Meyer, Joseph A.

Rosetta Stone and Its Decipherment, The (U)

Callimahos, Lambros D.

Rotation Problem in Pattern I I Recognition, The (U)

Keyword

Cipher machines

Data representation

Research

Signals

Computer working aids

Cryptanalysis

Collection

Civil war Cryptologic history

Rocket motion

Vol. XIX, No. Communications 3, Summer Soviets 1974

Vol. XXV, Cryptologic history No. 1, Winter 1980

Vol. XVI, No. Cryptologic history 1, Winter Rosetta Stone 1971

Vol. VII, No. Pattern 1, Winter recognition 1962

Title

Roughness of Visitations in a Markov Chain, The (U)

Russian Diamond, A CU)

RYE, an Extended Capacity Remote Access System (U)

Scaling Matrix for the Analog Computer (U)

Scheduling Function in a Time- Sharing Environment, The (U)

Science and Cryptology (U)

ScientXc and Engineering Information Management in the Department of Defense (U)

Scoring Function and Its Distribution, A (U)

Security Architecture in SrGrNT Collection and Processing (U)

Selected SIGINT Intelligence Highlights (U)

Selection and Placement of Cryptanalytic Personnel (U)

SELLNOW - A Man- Machine Communication System for ELINT Data (U)

Sequential Least Squares Estimates (U)

Setwise Transitive Groups (U)

SIGINT Computer Processing in the 1980's (U)

Author Reference Keyword

Vol. VIII, No. Mathematics 2, Spring 1963

Vol. XII, No. Russian navy codes 2, Spring 1967

Vol. IX, No. Computer 2, May 1964 programming

Vol. VII, No. Computer 1, Winter programming 1962

Vol. XVI, No. Computer systems 2, Spring 1971

Meyer, Joseph A., ( Jr.

Tordella, Louis

Vol. 111, No. Cryptology 3, July 1958 Science

Vol. X, No. 2, Information Spring 1965 management

Vol. XIII, No. Mathematics 4, Fall 1968

Vol. XX, No. Collection 1, Winter Security 1975

Vol. XIX, No. SIGINT 4, Fall 1974

Fall 1960 Personnel

Vol. WII, No. ELINT 4, Fall 1963

Vol. XII, No. Mathematics 2, Spring 1967

Vol. X, No. 2, Mathematics Spring 1965

Vol. XXII, Computer No. 2, Spring processing 1977

DOCID: 3020956 9 3 9 8 5 9 8

Title I Author Reference Keyword

SlGINT Implications of Military Oceanography (U)

SIGINT System Logic (U)

srG1N~ing with SACO: Experiences with the Rice Paddy Navy (U)

Signals from Outer Space (U)

Simple Homogeneity Test Using Log-Factors, A (U)

Simple Test for Slide or Kick, A (U)

Simplified Exposition of a New Cycle Search Technique (U)

Simulation of Cryptoprinciples (U)

Simultaneous Error Insinuation in Electronic Cipher Machines (U)

Six Characteristics of Information Handling Systems (U)

Six Point Program for Improved Intercept (Part I) (U)

Sliding Strips, Additive, Subtractive, and Minuend (U)

Slow Look at Fast Transforms, A (U)

Meyer, Joseph A.

Unknown

Vol. XII, No. Oceanography 4, Fall 1967

Vol. X, No. 2, SIGINT Spring 1965

(b ( 3 ) - P . L . 8 6 - 3 6 Vol. XXI, No. Cryptologic history) 1, Winter 1976

Vol. 111, No. Sputnik 2, April 1958

Vol. VIII, No. Ciphers 4, Fall 1963

Vol. VIII, No. Mathematics 4, Fall 1963

Vol. I, No. 1, Teleprinter cipher April 1956 analysis

Special Communicatio*, i : i -,, ,,, 4 0 3 Council of security jb) ( 3 1 - 1 9 usc 798 Learned ( 0 1 ( 3 ) - P . L . 86-36

Organization Issue, 1972

Meyer, Jweph A. Vol. XIV, No. Cipher machines J , ;E"'" Vol. XXI, No. Cryvtologic history I 1,Winter

Gerson, Nathaniel C.

Vol. XIV, No. Information systems 3, Summer 1969

Vol. VII, No. Intercept 3, Summer 1962

Vol. XI, No. Cryptanalysis 2, Spring 1966

Special Fast Mathematics Fourier Issue, August 1973

DOCID: 3020956

Title I Author Reference Keyword

Software Maintenance -The Other Side of Acquisition (U)

So You Want to Correlate (U)

Solution of a Fractionated Monome-Dinome System (U)

Vol. X, No. 2, Waveform Spring 1965 recognition

Solution of a Polyalphabetic Monome-Dinome System (U)

Solution of Additive-Minuend Busts (U)

Vol. XXIII, Software No. 3, maintenance Summer 1978

Vol. 11, No. 2, Cryptanalysis April 1957

Lutwiniak. Vol. I, No. 3, Cryptanalysis William October 1956

Vol. 111, No. Cryptanalysis 1, January I) 1958

Solution of Hill's Basic Vol. I, No. 2, Encipherment Algebraic Methods for July 1956 Enciphering Polygraphs (U)

Solution of the Japanese PURPLE Machine, The (U)

Solution of VEJX-0, or the Uses of Delta (U)

Solving a Playfair Cipher by Computer (U)

Some Applications of Information Theory (U)

Some Applications of the Chi- Square Test in Cryptanalysis (U)

Some Contributions towards a Course in COMINT Translation (U)

Some Cribbing Techniques (U)

Some Formulas concerning Bulges of Combining Functions (U)

Some Graphical Display Techniques for Fourier Analysis (U1

Friedman, Vol. XIX, No. Cryptologic history William F. 1, Winter PURPLE machine

1974

Lutwiniak, Vol. XVIII, Cryptanalysis William No. 2,Spring

1973

Vol. XIV, No. Computer 4, Fall 1969 cryptanalysis

Kullback, Vol. I, No. 1, Information theory Solomon April 1956

Callimahos, Vol. XIV, No. Cryptanalysis Lambros D. 4, Fall 1969

Vol. XVI, No. Translation 3, Summer 1971

Vol. XXIII, Cribbing techniques No. 1, Winter 1978

Special Fast Mathematics Fourier Issue, August 1973

Special Issue, Computer graphics January 1971

DOCID: 3020956 REF IDzA398598 9

Title Author Reference Keyword - Some Notes about Chi-square (U)

Some Noks on Information Theory (U)

Some Observations on Computer Aids to Indicator Recovery (U)

Some of My Best Friends Are Mathematicians (U)

Some Principles of Cryptographic Security (U)

Some Problems and Techniques in Bookbreaking (U)

Some Problems in the Field of Machine Translation or the Case of the Volatile Mouses (U)

Some Properties of Sample

Vol. VIII, No. Chi-squares 3, Summer 1963

Vol. IV, No. Information theory 1, January 1959

Vol. XVII, Cryptanalysis No. 4, Fall 1972

Lewis, Frank W. Vol. IV, No. Mathematicians 2, April 1959

Tiltman, John Vol. XIX, No. Cryptographic H., Brigadier 3, Summer security

1974

Vol. XI, No. Bookbreaking 1, Winter 1966

Salemme, Arthur Fall 1960 Machine J. translation

Special Fast Mathematics Fourier Issue, August 1973

Vol. IX, No. Information 4, Fall 1964 transmission

Vol. XIII, No. Vocoders 2, Spring 1968

Bulges (U)

Some Properties of the Two- State First-Order Markav Chain (U)

Some Recent Vocoder Studies a t the National Security Agency (U) ,

Some Reminiscences (U) Tiltman, John H., Vol. XI, No. Cryptanalysis Brigadier 3, Summer

1966

Some Thoughts concerning Traffic Analysis Mechanization ( u )

Something May Rub Mf! (U)

Soviet Communications Journals as Sources of

Vol. XI, No. Traffc analysis 3, Summer 1966

Lewis, Frank. W. Vol. X, No. 1, Cryptanalysis Winter 1965

I Vol. IX, No. Communications 3, August Soviet

Intelligence (U) \A 1964

: , ,

USC 403 USC 798

4, Fall 1971

Title

Spacecraft Passenger Television from Laika to Gagarin (U) n

Author Reference Keyword

Soviet Science and Technology: Present Levels and Future Prospects (U)

Spanish Languages, The (U) I I

Vol. XXV, No. 4, Fall 1980

Sinkov, Abraham

Speaker Identification by Machine: Where Do We Stand? (U)

Special Felix System, The (U)

-

Special Purpose CrypWlyt ic Computers: State of the Art (U)

i

SPECOL: A New AND, OR, NOT Language for Use with Computers (U)

Spectral Analysis and the Fast Fourier Transform (U)

Spoken Russian: The Other Grammar (U)

Spread Spectrum System Jamming Response (U)

Standard for Evaluating the Intelligence Content of Equipment Emanations (U)

Gurin, Jacob

Kullback, Solomon

Vol. IV, No. Science and 1, January technology 1959 Soviet

Vol. XXI, No. Space flights 2, Spring 1976

Vol. XIII, No. Spanish language 1, Winter 1 968

Vol. XIV, No. Speaker 4, Fall 1969 identification

Vol. IV, No. German code 2, April 1959

VOI. XXIII, Computers No. 1, Winter 1978

Vol. XII, No. Computer 1, Winter language 1967

Vol. XIV, No. Mathematics 1, Winter 1969

Vol. XIV, No. Russian language 3, Summer 1969

Vol. XXII, Signals No. 3, Spread spectrum Summer 1977

Vol. IX, No. Equipment 3, August emanations 1964

DOCID: 3020956

Title

REF ID:A398598 ( b ) ( 3 ) - P . L . 8 6 - 3 6

Statistical Description of the Noise and Emitter Environment, A (U)

Status of Optical Logic Elements for Nanosecond Computer Systems (U)

Stirling Numbers of the Second Kind (U)

Author

Strategic Warning: An Intelligence Gap That NSA Might Fill (U)

Strategy for Program Decomposition for a Distributed Pipeline, A (U)

Strength of the Bayes Score, The (U)

Study of Character-Handling by Computer a t NSA. A (U)

Study of Hourly Correlation of Trans-Horizon VHF-UHF Signals and Meteorological Conditions (U) r Study of Japanese Nominalization, A (U) I Subnanosecond Instrumentation (U)

Substantive Analysis (U)

Supporting the Support Facilities (U)

Survey of Bent Functions. A (U) I

Reference Keyword

Vol. X, No. 4, Collection Fall 1965

Vol. V111, No. Computers 3, Summer 1963

Vol. 111, No. Stirling numbers 1, January 1958

Vol. XVIIE, Strategic warning No. 3, Summer 1973

Vol. XXII, Mathematics No. 4, Fall 1977

Vol. XVlI, Mathematics No. 1, Winter 1972

Vol. XIV, No. Computers 2, Spring 1969

VoJ. XIV, No. Signals 2, Spring 1969

Vol. XXIII, Japanese No. 2, Spring language 1978

Vol. IX, No. Pulses 1, Winter 1964

Vol. IV, No. Analysis 2, April 1959

Vol. XVIII, Computer test No. 3, equipment Summer 1973

Special Fast Mathematics Fourier Issue, August 1973

DOCID: 3020956

! b i (1) ( b i ( 3 ) - 5 0 USC 4 0 3 (bi ( 3 1 - 1 8 USC 7 9 8 (bi (3)-P.L. 8 6 - 3 6

Title 1'

Survey of Multinomial Estimation for Code Weighting, A (U)

Survey of the Distance Problem, A (U)

Survey of the Status of the Voice Problem, A (U)

Symmetric A proximations to e Boolean Func 'ons (U)

Systems Approach to Training Radiotelephone Technicians, The (U)

Tail Probabilities for the Binomial Distribution (U)

"Take Care of Your Pennies . . . "(U)

Target in Space, A (U)

Technology of Future Powerful Personal Computers, The (U)

Telecommunications from the Tom-Tape to the Computer (U)

Issue, 1972

Teletype Processing in the Vol. XVIII, Signals processing FROSTING System (U) No. 2, Spring

1973

Author I

Reference Keyword - . .

Vol. XX, No. ~atherafiik 3, Summer 1975

Vol. XVIII, Crypto- No. 2, Spring mathematics 1973

Vol. XII, No. Voice 4, Fall 1967 communications

1 Vol. XIX, No. Mathematics 3, Summer 1974

Vol. XVIII, Communications No. 1,Winter Training 1973

Vol. VIII, No. Mathematics 3, Summer 1963

Vol. 111, No. Computers 1, January 1968

Special Council of U sate ltes Learned Organization Issue, 1972

Vol. XXV, Computers No. 3, Summer 1980

I Special CRlTICOMM Council of Learned Organization

DOCID: 3020956 REF IDzA398598 9

Title Author Reference Keyword

TEMAC (Text Macro Compiler): D'Imperio, Mary Vol. X, No. 3, Computers A Machine Language for Summer 1965 Machine language Processing Text (U) and

Computer (b) ( 3 ) - P . L . 8 6 - 3 6

and Information Science Issue

TEMPEST Considerations in Vol. XIV, No. COMSEC

Automatic Data Processing 1, Winter TEMPEST

Equipment Installations (U) 1969

Tetrahedral Plugging (U) Vol. VIII, No. Ciphers 2, Spring Key 1963

Text Recognition Procedure for Vol. XI, No. Cryptanalysis Cryptanalysis, A (U) 3, Summer

1966

Textual Criticism and NSA (U) . Vol. XIV, No. Editing 3, Summer 1969

Theoretical Linguistics and Vol. XXII, Linguistics Language Universals (U) No. 2, Spring

1977

Theory and Applications of Vol. XXI, No. Cryptanalysis Three-Way Multidimensional 2, Spring Scaling (U) 1976

Theory of Secondary Testing, Vol. XIII, No. Cryptanalysis The (U) 3, Summer

1968

Thermal Noise (U) Vol. VII, No. Electricity 3, Summer 1962

Thin Film Shifting Matrix, A Vol. VII, No. Currents (U) 4, Fall 1962

Thin Film Thermocouple (U) Vol. VII, No. Physics 4, Fall 1962

Third Revolution: Prospects for Vol. XIII, No. srGINT Continued SIGlNT Productivity, 3, Summer productivity The (U) 1968

lbi 131-50 USC 403

Title

This Is a Recording? (U)

This Matrix Business (U)

This Matrix Business: Part I1 (U)

Thoughts about Systems and Program Design (U)

Threaded File Retrieval System (U)

Thrusts and Boggles of Outrageous Escalation, The: A VOCABUZARY SURYEY ATTHE NATIONAL WAR COLLEGE (U)

Time Coordination of SCINT Sites (U)

Time Is -Time Was -Time Is Past Computers for Intelligence (U)

Time-Element Scramble (U)

Times of Shadow Passage for Earth Satellites (U)

Tour of Some Russian Translation Traps, A (U)

Trade-off Approach to Quality Intercept versus Quantity Intercept, A (U)

Traffic Analysis on Sovie u

Author Reference Keyword

Vol.XVII1, ~ e c o & k ) ( ~ ) - ~ . ~ ' 86- No. 2, Spring 1973

Vol. 111, No. Cryptanalysis 2, April 1958

Vol. 111, No. Cryptanalysis 4, December 1958

Vol. XVIII, Computer No. 2, Spring programming 1973

Vol. XII, No. Document storage 2, Spring 1967

Vol. XIII, No. Vocabulary 2, spring 1968

Vol. XII, No. Intercept sites 2, spring 1967

Campaigne, Vol. X, No. 1, Artificial Howard H. Winter 1 9 a intelligence

and Computers Computer and Information Science Issue

Vol. VII, No. Encipherment 4, Fall 1962 Speech privacy

Vol. VIII, No. Satellite 3, Summer tracking IS63

Salemme, Arthur Vol. XIV, No. Russian J. 4, Fall 1969 Translation

Vol. XXIII, ~ 1 ~ 1 ~ ~ c o l l e c t i o n No. 1, Winter and processing 1978

Vol. XIII, No. Traffic analysis ~ r a n s m i s s i o ~ ~ ~ 1 1 1, Winter

1968

Title I Author Reference Keyword

Transient Analysis of Coaxial Cables Considering Skin Effect (U)

Transient Response of Tunnel Diodes with Resistive Loading (U)

Transistor Phantastrons (U)

Translation of a Classic: A Matter of Ethics, The (U)

Vol. I, No. 2, Coaxial cables (b) (31-P.L. 86-36

July 1956

Vol. VII, No. Circuits 1, Winter 1962

Vol. IV, No. Circuits 2, April 1959

Gurin, Jacob Vol. XI, No. Literature 2, Spring Translation 1966

Transverse Mercator Projection, Vol. XXIV, Mapping The (U) No. 4, Fall

1979

Trends, Developments, and Pressures in SIGINT Reporting Today (U)

Trots" in Foreign Language Study (U)

Tunnel Diode Characteristic Function Generator (U)

Tunnel Diode Dynamic Logic Module, A (U)

--

--------p--

DOCID: 3020956 REF ID:A398598 A

Oliver, Donald B. Vol. XXI, No. MGINT reporting 1, Winter 1976

1 Vol. 11, No. 1, Language aids January 1957 and Special Linguistics

I Issue

Vol. VIII, No. Computers 1, Winter 1963

Summer 1961 Computers Logic

"TUNNY" Machine and Its Spring 1961 Cipher machines Solution, The (U) Brigadier Germany

Turing's Contributions to Cryptology (U)

Two New Language Models (U)

Typewriter" Key and the Stereotype, The (U)

Vol. VIII, No. Cryptology 3. Summer Mathematics 1963

Vol. XXIV, Language modeling No. 3, Summer 1979

Vol. IV, No. Code groups 4, October 1959

DOCID: 3020956

Title

U. S. Program in Direction Finding, A (U)

Unbreakable Cipher, The (U)

Under-Developed Languages, Under-Utilized Computers (U)

UNNA -An Introspective Signal Processor (U)

U p g r a d q Selected U.S. Codes and Ciphers with a Cover and Deception Capability (U)

Use of Bayea Factors with a Composite Hypothesis (U)

Use of Optical Density Measurements of Thin Films to Determine Vapor Distributions, The (U)

Use of Production Methods in Reading Transposed Letter Codes (U)

Use of Special Identification Techniques (SIT) in the Solution of Specific SICINT Problems, The (U)

Use of the B-Coefficient in Information Retrieval, The (U)

UTIL of English: A Study of the Quality of SIGINT Product (U)

Utilization of Code Limitations in Solving Bust Messages (U)

Output String

I Author Reference Keyword

Gerson, Vol. X, No. 2, Direction finding Nathaniel C. Spring 1965 Wullenweber systems

I Campaigne, Spring 1961 Ciphers Howard H. Cryptanalysis

Vol. XX, No. Computers 1, Winter L W P g e 1975

Vol. XX, No. Signal processing 2, Spring 1975

Vol. XXI, No. Ciphers 1, Winter Deception 1976

Vol. IX, No. Cryptanalysis 4, Fall 1964

Vol. VIII, No. Physics 3, Summer 1963

Vol.II,No. 1, Codes January 1957 and Special Linguistics Issue

Vol. XII, No. Signal identification 4, Fall 1967

Vol. XIII, No. Information 4, Fall 1968 retrieval

Vol. XVII, SIGINT reporting No. 4, Fall 1972

January 1960 Codes and Special Linguistics Issue

Vol. XXI, No. Mathematics 4, Fall 1976

Title

Variance of the Number of Ones in a Derived Stream of Zeros and Ones (U)

Verified Intercept Predictions (U)

VIDEOFILE: A New Information Storage System (U)

Viet Minh Cover Terms and Their Solution (U)

Voice Problem, The (U)

Voynich Manuscript Revisited, The (U)

Voynich Manuscript, The: 'The Most Mysterious Manuscript in the World" (U)

Waiting Times for Polygraphic Repeats (U)

Introduction

I Author Reference Keyword

'(b) ( 3 ) - P . L . 86-t Vol. XII, No. Mathematics 2, Spring 1967

Yol. XII, No. Intercept 1, Winter 1967

Vol. XIII, No. Informstion storage Video

Gaddy, David W. Vol. IV, No. Viet Minh 3, July 1959 cover terms and Special Lingxiistics Isssue

Special Voice Council of communications Learned Organization Issue, 1972

- - - '1

DOCID: 3020956 REF IDzA398598 -

I

Vol. XXI, No. Voynich Manuscript 3, Summer 1-I 1 976

WARsAN I1 - An Implementation of the FFT and Other Tools for Digital Signals Analysis (U)

Way the Ball Bounces,The: An Experiment in Deconvolution Filtering (U)

Weather or Not - Encrypted? (U) I

Tiltman, John H. Vol. XII, No. Voynich Manuscript Jr., Brigadier 3, Summer

1967 and Special Linguistics

Vol. XXIV, Cryptomathematics No. 2, Spring 1979

Vol. XIII, No. Cipher machines 1, Winter 1968

Special Issue, Digital signals January 1971 analysis

Special Issue, Mathematics January 1971

Vol. XII, No. COMSEC , 4, Fall 1967 North Vietnam

DOCID: 3020956 g8

Title Author Reference Keyword

Weather: Its Role in Communications Intelligence (U)

What Is Good TraCfic Analysis?

Vol. 111, No. ~ e a t h e i b) ( 3 ) - P . L . 86-

3, July 1968

Vol. XXIV, Tfaffic analysis (U)

What Next, Dr. Trithemius? (U)

Whole New World of Speech, A; Or, Maybe 1984 Will Be a Good Year After All! (U)

Why Analog Computation? (U)

Wideband and the SlGINT System (U)

Will the Real 53 Stand Up? (U)

No. 4, Fall 1979

Lewis, Frank W. Vol. XI, No. Cryptanalysis 4, Fall 1966

Vol. XXI, No. Keyword 4, Fall 1976 recognition

Vol. VII, No. Analog computers 3, Summer 1962

Vol. VIII, No. Intercept 4, Fall 1963

Vol. XIX, No. Cryptanalysis 1, Winter

Wireline Modem with Harmonic Distortion Equalization, A (U)

With Love (and Parentheses) from Peking (U)

1974

Vol. XXV, Communications No. 2, Spring Modems 1980 and Special Mathematics and Engineering Issue, 1981- 1983

Vol. XII, No. Chinese language 1, Winter Codes 1967

Words and the Intelligence Value of Conversations (U)

Gurin, Jacob Vol. XXIII, Language No. 2, Spring 1978

"Word Spotter, A" (U)

Work Breakdown Structure: A

Vol. IV, No. Computers 4, October 1959

Vol. XXV, Software Better Implementation to 1-1 ~ g " ~ , " , F ~ U acquisition Manage Software Overruns (U)

DOCID: 3020956 REF IDrA398598 .-

Title Author Reference Keyword - *

Worldwide Language Problems Voi. XIII, No. Language Ib ) ( 3 ) - p . L

at NSA (U) 4, Fall 1968 training

Writing Efficient FORTRAN (U) Vol. XVII, FORTRAN No. 2, Spring 1972

Fairbanks, Vol. IX, No. Cryptanalysis Sydney 1, Winter

1964

ZFlags in Hagelin Cryptanalysis (U)

- -- - - - _ _ _ _ _ _ -__ , . A L

DOCID: 3020956 REF ID:A398598

R Y

2

NSA

Technical

Journal

AUTHOR

INDEX

3 h

DOCID: 3020956 ( b i 11) (b)(3)-5C USC 403 (b)13)-P.L. 86-36

(b) (3)-P.L. 86-36 N S A Technical Journal Indexed by Author

VO~. IX, NO. ELINT I

2,May1964 Signalanalysis

Fourier Coefficients and Special Fast Mathematics Function Decomposition (U) Fourier Issue,

August 1973

Use of Optical Density Vol. VIII, No. Physics

Signals from Outer Space (U) Vol. 111, No. Sputnik 2, April 1958

Communications Intelligence Vol. 11, No. 2, COMINT April 1957 Intercept

Data Standards for StGINT Vol. XVI, No. Data standardization

Mechanization Systems and a Vol. VII, No. Management New Look a t Management and 2, Spring Organization (U) 1962

Number of Components in Vol. IV, No. Cryptanalysis Random Linear Graph, The (U) 2, April 1959

Model 204 - The Analyst's Vol. XXI, No. Analysis 3, Summer Computers 1976 i

I

Random and Algebraic Vol. XXIII, Mathematics Coverings of Binary Vectors (U) No. 3, i

Summer 1978 I and Special Mathematics and I

Engineering Issue, 1981- 1983

1

i I

1979 I

! I

59 I

DOCID: 3020956 0 8

{ b ) ( 3 ) - P . L . 3 6 - 3 6

Author Title Reference Keyword

On Cipher (U) January 1960 Ciphers

This Is a Recording? (U) Vol. XVIII, Recording No. 2, Spring 1973

Computer Program Debugging: Vol. XIII, No. Computers A New Era (U) 2, Spring Debugging

1968 and Special Computer and Information Sciences Issue

Theory of Secondary Testing, Vol. XIII, No. Cryptanalysis The (U) 3, Summer

1968

Can We Lick the Voice Problem? Vol. XVII, Communications (U) No. 3, Russian

Summer 1972

Deposited Films - Magnetic Vol. I, No. 3, Films Elements for the Memory of the October 1956 Storage Future (U)

Fast Dynamic Programming Vol. XXI, No. Mathematics Algorithm and Its Mathematical 1, Winter Basis, A (U) 1976

Measurement of Insecurity for Vol. XXII, Degaussing Imperfect Erasure, A (U) No. 1, Winter Tape storage

1977

Estimating the Number of Vol. VIII, No. Mathematics Solutions in [GF (2)lnof a 3, Summer System of Equations over the 1963 Integers (U)

In General th4-Iteration Vol. XII, No. Mathematics Convergesw- 1, Winter

1967

On the Maximization of X'AX Vol. VIII, No. Cryptanalysis over the Vertices of the Cube 1, Winter (u) 1963

Systems Approach to Training Vol. XVIII, Communications Radiotelephone Technicians, No. 1,Winter Training The (Ul 1973

DOCID: 3 0 2 0 9 5 6 -98598 ( b ) ( 3 ) -P.L. 86-36

Author I Title

Study of Japanese Nominalization, A (u)

Linearly Induced Nonlinear Cycles (U)

Generalizations of "Maximum- Entropy" (Pattern) Analysis (U)

Some Thoughts concerning Traffic Analysis Mechanization (U)

Integrated and Guided Wave Optics and Device Applications

Potential of Interactive Computer Programs in the Decryption Process of SIGINT, The 4P0WtW

Bipolar Coding and Baseband Recovery (U)

i Another Derivation of Binary Error Rates a s a Function of Signal-to-Noise Power Ratio for Various Modulation Schemes (U)

Noise Communication Technique for Speech (U)

Preamble for Push-to-Talk Ciphony, A (U)

I RAKE System for Tropospheric Scatter, A (U)

Reference Keyword

Vol. XXIII, Japanese No. 2, Spring language 1978

Vol. XXII, Mathematics No. 4, Fall 1977

Vol. XXIV, Signal theory No. 2, Spring 1979

Vol. XI, No. Tr&c analysis 3, Summer 1966

Vol. XXIV, Optics No. 2, Spring Signals processing 1979 and Special Mathematics and Engineering Issue, 1981- 1983

Vol. XXV No. Computers 3, Summer Cryptanalysis 1980 SIGINT

Vol. XII, No. Basebands 1, Winter Codes 1967

Vol. X, No. 3, Collection Summer 1965 Signal-to-noise ratio

Vol. VII, No. Communications 4, Fall 1962

Vol. XII, No. Communications 2, Spring 1967

Vol. X, No. 4, Collection Fall 1965

DOCID: 3020956

(b) ( 3 ) - P . L . 86-36

I Title Reference Keyword

Computers Manual morse Transcription

Author

Transcription of Vol. 111, No. Manual Morse (U) 3, July 1958

Inexpensive Device for Pictorial Input and Output, An (U)

January 1960 Computer graphics

Vol. IV, No. 3, July 1959

Cryptanaly sis On Cryptanalysis and Redundancy (U)

On Operatorless Computers (U) Vol. I., No. 1, April 1956

Computers Storage

Program for Correcting Spelling Errors, A (U)

Vol. IV, No. 4, October 1959

Computers

"Take Care of Your Pennies . . . (U)"

Vol. 111, No. 1, January 1958

Computers

Document storage Threaded File Retrieval System (U)

Vol. XII, No. 2, Spring 1967

Euclidean Algorithm and Distances between Wheel Settings, The (U)

Vol. VIII, No. 1, Winter 1963

Cryptanal y sis Mathematics

Fast Dynamic Programming Algorithm and Its Mathematical Basis, A (U)

Vol. XXI, No. 1, Winter 1976

Mathematics

Generation of Permutations (U) Vol. IX, No. 2, May 1964

Cryptography

Time-Element Scramble (U) Vol. VII, No. 4, Fa11 1962

Encipherment Speech privacy

Maya Astronomical Computer, The (U)

Vol. XXII, No. 1, Winter 1977

Astronomy Cryptologic history

Application of Queuing Theory to Computer Systems, An (U)

Vol. XIV, No. 2, Spring 1969

Computers Queuing theory

Book Review: Lincos, Design of a Language for Cosmic Intercourse, Part I (U)

Vol. VII, No. 1, Winter 1962

Book review Communications Extraterrestrial intelligence

I Cosymmetric Approximations to Vol. XVI, No. Combining Functions (U) 4, Fall 1971

Mathematics

DOCID: 3020956 REF IDgA398598

h ) ( 3 , - t l . . Rh-36 6

Author Title Reference Keyword

Enumeration of the Square Vol. XVIII, Crypto- Permutations of the Symmetric No. 4, Fall mathematics Group (U) 1973

Optical Data Processing - A Vol. XX, No. Cryptanalysis Cryptanalytic Perspective (U) 3, Summer Data processing

1975

Recovering the Structure of a Vol. XIV, No. Cryptanalysis Linear Shift Register (U) 4, Fall 1969

Degrees of Freedom in an N-bit Vol. I, No. 1, Frequency Frequency Distribution (U) April 1956 Distribution

Hill Climbing (U) Vol. X, No. 4, Mathematics Fall 1965

Penney-Ante (U) Vol. XII, No. Cryptanalysis 1, Winter 1967

Recurrent Events and Baudot Vol. 11, No. 2, Baudot streams Streams (U) April 1967

CRISP1 (U) V O ~ . X, NO. 1, Computers Winter 1965 On-line processing

TEMPEST Considerations in Vol. XIV, No. COMSEC Automatic Data Processing 1, Winter TEMPEST Equipment Installations (U) 1969

Thin Film Shifting Matrix, A Vol. VII, No. Currents (U) 4, Fall 1962

Privacy and Protection in Vol. XVIII, Operating systems Operating Systems (U) No. 2,Spring Privacy

1973

Application of Fourier Special Fast Mathematics Transforms to Combiners (U) Fourier

Transform Issue, August 1973

Distribution of the Maximum Vol. VII, No. Binary stream Bulge in a Flat Random Binary 4, Fall 1962 Probability Stream, The (U)

Mathematical Analysis of Jitter Vol. VIII, No. Frequency in a Digital Frequency Source 2, Spring (u) 1963

Simple Homogeneity Test Using Vol. VIII, No. Ciphers Log-Factors, A (U) 4, Fall 1963

DOCID: 3020956

Author I Title Reference Keyword

Introduction to the Fast Fourier Transform, An (U)

Special bsue, January 1971

Computers Mathematics

I Book Review: Lo& Languages Fall 1960 Book review Cryptology

Signals I Multipath Differential Doppler Vol. XXI, No. 3, Summer 1976

I Scientific and Engineering Information Management in the Department of Defedse (U)

Vol. X, No. 2, Spring 1965

Information management

Computer graphics 11 Some Graphical Display Special Issue, January 1971 Techniques for Fourier Analysis 1 iu,

Teletype Processing in the FROSTING System (U)

Vol. XVIII, No. 2, Spring 1973

Signals processing

ABC of Ciphony, The (U) Vol. I, No. 2, July 1956 and Special Linguistics Issue

Ciphony Coding Processing S i a l s

11 Bookbreaking Improvisations - Vol. XI, No. 3, Summer 1966

Bookbreaking Code Part I (U)

Bookbreaking Improvisations - Part 11 (U)

Faithful Mirror, The (U)

Red China's Drive for Literacy (U)

RF Interference Phenomenon and Intelligence Applications (U)

Linguistic Canonical Forms: Tools for Analytic Progress (U)

Vol. XI, No. 4, Fall 1966

Bookbreaking Code

Vol. XIV, No. 1,Winter 1969

Bookbreaking

Vol. XVI, No. 2, Spring 1971

Communist China

Vol. XXIII, No. 4, Fall 1978

Collection

Vol. XIII, No. 1, Winter 1968 and Special Linguistics Issue 11

Communications L=ww3e

REF IDzA398598 DOCID: 3020956 ,,,,,,,,.,,,,,,

Book Review: Cryptanalysis of the Single Columnar Transposition Cipher (U)

Author

I Summer 1961

Title Reference Keyword

Note on the English VCCCC Vol. XVII, Language identification Pattern or Maximum Post- No. 1, Winter Vocalic Consonant Clustering in 1972 Monosyllabic English Words, A (U)

Computer Automation of Circuit Vol. VII, No. Circuit analysis Analysis (U) 4, Fall 1962 Computers

Introduction to Semiconductor Vol. 11, No. 2, Electronics Physics and Diode Theory (U) April 1957

Book review Cryptanalysis

Book review Cryptologic history

Callimahos, Lambros D.

Book Review: The Broken Seal (U)

Vol. XIV, No. Cryptanalysis 2, Spring Plain text

Vol. XII, No. 3, Summer 1967

1 1969

Communications with Extraterrestrial Intelligence IU)

Vol. XI, No. 1, Winter 1966

Communications Extraterrestrial intelligence

Cryptanalyst's Nightmare: An Oneiric Problem and Its Solution, A (U1

Vol. XVI, No. 4, Fall 1971

Ciphers Cryptanalysis

Cybernetics and Problems of Diagnostics: the Parallels between Medicine and Cryptanalysis (U)

Vol. XIV, No. 1,Winter 1969

Cryptanalysis Information analysis

De Profundis; or the ABC of Depth Reading (U)

Vol. 11, No. 1, January 1957

Cryptography Monoalphabetic substitution

Vol. XIX, No. 1, Winter 1974

Cryptologic history

I Introduction to IBM Methods in Cryptanalysis, An (U)

Vol. 11, No. 3, July 1957

Cryptanaly sis

Introduction to Tiaffic Analysis 1 (U) Vol. 111. No. 2, April 1958

Traffic analysis

Ciphers I No, Not Again! (U) Vol. I, No. 1, April 1956

DOCID: 3020956

Author

9 9 8

I Title Reference Keyword

1 On Key Analysis (U) Vol. XIX, No. 4, Fall 1974

Cryptanalysis

Q.E.D.- 2 Hours, 41 Minutes (U) Vol. XVIII, No. 4, Fall 1973

Ciphers

Representative Machine Cipher Systems (U)

Vol. 111, No. 1, January 1958

Cipher machines

Rosetta Stone and Its Decipherment, The (U)

Vol. XVI, No. 1, Winter 1971

Cryptologic hiatory Rosetta Stone

Some Applications of the Chi- Square Test in Cryptanalysis b(U)

Vol. XIV, No. 4, Fall 1969

Cryptanalysis

Campaigne, Howard H.

Aristocrat - An Intelligence Test for Computers (U)

Vol. VII, No. 2, Spring 1962

Computers Cryptanalysis

Book Review: "Analyses of the Case n = 3 in Algebraic Cryptography with Involutory Key-Matrix and Known Alphabet " (Jourml fur die 'Reine und Angewandte Mathematik) (U)

Vol. IX, No. 3, August 1964

Book review Cryptanalysis

Book Review: "How to Estimate Probabilities," (Journal of the Institute of Mathematics and Its Application) (U)

Vol. XII, No. 2, Spring 1967

Book review Mathematics

Book Review: "Involutory Commutants with Some Applications to Algebraic Cryptography, I" (Journal fur Reine u d Angewandte Matkmatik) ( U )

Vol. XII, No. 1, Winter 1967

Book review Mathematics

Book Review: Mechanical Resolution of Linguistic Problems (U)

Vol. 111, No. 4, December 1958

Book review Computers L~~kruaee

Book Review: Military Cryptanalytics, Part I1 (U)

Vol. IV, No. 4, October 1959

Book review Cryptanal ysis Military

DOCID: 3020956 REF IDzA398598

Author ( Title Reference Keyword

Book Reuiew: "Some Further Fall 1960 Book review Methods in Algebraic Mathematics Cryptography"; (Journal of the Mitchell Scientific Society, No. 74) (U)

Book Review: "Variable Matrix Substitution in Algebraic Cryptography" (U)

Distribution of Letters in Short Messages of English, The (U)

Extraterrestrial Intelligence (U)

Key to the Extraterrestrial Messages (U)

I LIGHTNING (U)

I Null Hypothesis, The (U)

I Reading TUNNY (U)

Research a t NSA (U)

I Time Is -Time Was - Time Is Past Computers for Intelligence

Unbreakable Cipher, The (U)

I Coupon Collecting and Cryptology (U)

I Composition of Boolean Functions I (U)

Vol. IV, No. Book review 4, October Cryptography 1969

Vol. XIV, No. Ciphers 2, Spring1969 Plaintext

Vol. XI, No. Communications 2, Spring Extraterrestrial 1966 intelligence

Vol. XIV. No. Communications 1, Winter Extraterrestrial 1969 intelligence

Vol. IV, No. Computers 3, July 1959

Vol. I, No. 2, Cryptology July 1956

Vol. VII, No. Cryptologic history 4, Fall 1962 Germany

Vol. XIII, No. Research 2, Spring 1968

Vol. X, No. 1, Artificial Winter 1966 intelligence and Computers Computer and Information Science Issue

Spring 1961 Ciphers Cryptanalysis

Vol. XI, No. Cryptanalysis 4, Fall 1966 Mathematics

Special Fast Mathematics Fourier Issue, August 1973

67 'b) 3 ) - P . L . 8 6 - 3 6

6

DOCID: 3020956

Author I Title

Matric Recursions (U)

- -

Generating Function Approach to CRETAG, A (U)

Band-Pass Filters (U) n

FIR: A CDC 1604 Program for Solution of Systems of Linear Equations (U)

Realization and Optimization of the Audio Frequency Microminiature Thin Film

Solution of Hill's Basic Algebraic Methods for Enciphering Polygraphs (U)

Composition of Boolean Functions I (U)

Composition of Boolean Functions I1 (U)

Distribution of Letters in Short Messages of English, The (U)

I Distribution of C bd (a, f l , The

Solution of Additive-Minuend Busts (U)

Contextual Testing in Establishing Minimum Working Level Language Proficiency (U)

Voynich Manuscript Revisited, The (U)

Reference Keyword

Vol. XXII,' Mathematics No. 1, Winter 1977

Vol. XXII, Mathematics No. 3, Summer 1977

Vol. XIII, No. Filters 4, Fall 1968 Frequency and Special Mathematics and Engineering Issue, 1981- 1983 - Vol. X, No. 1, Computer Winter 1965 Mathematics

Vol. I, No. 2, Encipherment July 1956

Special Fast Mathematics Fourier Issue, August 1973

Special Fast Mathematics Fourier Issue, August 1973

Vol. XIV, No. Ciphers 2, Spring Plain text 1969

Special Fast Mathematics Fourier Issue, August 1973

Vol. 111, No. Cryptanalysis 1, January 1958

Vol. XXV, Language proficiency No. 1, Winter Testing 1980

Vol. XXI, No. Voynich Manuscript 3, Summer 1976

- - - -

ibl ill

REF IDtA398598. ( h ( 3 ) - 5 0 USC 403

DOCID: 3020956 (bl (31-18 usc 7 9 8

9 (bl(3)-?.L. 86-36

ibi(3)-P.L. 86-36

Author 1 Title Reference Keyword

Design and Implementation of a Vol. XXIII, Digital Demodulator for Use No. 2, Spring against On-Off Keyed Signals, 1978 The (U)

I Frequency Analysis of a Set of Vol. XVI, No. Harmonically Related Tones (U) 1, Winter

1971

African Language Problem a t Vol. XI, No. NSA, The (U) 3, Summer

1966

I Magic Digraphs (U) Vol. XII, No. 1, Winter 1967

Vol. XXV, No. 1, Winter Ism

Wireline Modem with Harmonic Vol. XXV, Distortion Equalization, A (UI No. 2, Spring

1980 and Special Mathematics and Engineering Issue, 1981- 1983

Traffic Analysis on Sovie (-1 ?&::;NO. ~ r a n s m i s s i o n ~

1968

Morse Signals

Signals analysis

African language

Cryptanalysis

Spread spectrum

Communications Modems

Traffic analysis

Note on a Solution of a Voi. I, No. 3, Ciphers Polyalphabetic Dinome System, October 1956 A (U)

Variable-Length Output String Vol. XXI, No. Mathematics

3- 4, Fall 1976

Electrical Design of Random Vol. IX, No. Encryption Sequence Generators (U) 3, August

1964

One Model for an Artificial Vol. XI, No. Radio intercept Ionosphere (U) 2, Spring

1966

Trade-off Approach to Quality Vol. XXIII, SICINT collection Intercept versus Quantity No. 1, Winter and processing Intercept, A (U) 1978

DOCID: 3020956 m r \ n 3 9 8 5 9 8 -

Author Title

Control of

Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System (U)

Cluster Analysis: Introduction to Models and Methods (U)

Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Scaling, The (U)

Introduction-to Statistical Pattern Recognition (U)

Investigation of Nonrandom Features in the Optical Fourier Transform of Shift Register Sequences and Binary Key, An (U)

Investigation of Techni ues for of thd-1

Theory and Applications of Three-Way Multidimensional Scaling (U)

CANDEW: A Methodology for Evaluating tlF C;ollection Potential (11)

CAPER %ftw:irt? Support System, The (U 1

Reference Keyword

Vol. XVII, Computer No. 2, Spring programmnig 1972

Vol. XII, No. Signals 4, Fall 1967 TEMPEST

Vol. XXII, Mathematics No. 2, Spring 1977

Vol. XXI, No. Cryptanalysis 4, Fall 1976

Vol. XXII, Pattern No. 3, recognition Summer 1977 and Special ( b i I 1 i Mathematics (b):3)-5@usc 4C3

and (b) (3)-1E USC 798 ( b ) ( 3 ) - P . L . 8 6 - 3 6

Engineering Issue, 1981- 1983

Vol. XfX, No. Crypto- 4, Fa11 1974 mathematics

Vol. XX, No. Signals 4, Fall 1975 Soviet

Vol. XXI, No. Cryptanalysis 2, Spring 1976

Vol. XXII, HF collection No. 3, Summer 1977

Voi. Y XII, Software support No. 2, Spring Soviet 1977

DOCID: 3020956 9 9 8 5 9 8

Author Title Reference Key word .--

On the Expected Number of Vol. VIII, No. Cryptanalysis Random Stops Corresponding to 1, Winter a Given Menu (U) 1963

Thin Film Thermocouple (U) Vol. VII, No. Physics 4, Fall 1962

Application of Human Factors to Vol. XXIV, Computers the Specification and Design of No. 4, Fall Human factors Interactive Computer Systems 1979 (U)

Data Standardization and the Vol. XVI, No. Data standards Trace Factor (U) 2, Spring Information

1971 management

Some Properties of Sample Special Fast Mathematics Bulges (U) Fourier Issue,

August 1973

Wideband and the SIGINT Vol. VIII, No, Intercept System (U) 4, Fall 1963

Linear and Quadratic Electro- Vol. IX, No. Optics Optic Effects (Pockels and Kerr 4, Fall 1964 Effects) (U)

Approximation of Central Vol. IV, No. Random variables Limits 4, October

1959

Exact Markoff Probabilities Vol. 11. No. 3, Mathematics from Oriented Linear Graphs July 1957 (U)

Stirling Numbers of the Second Vol. 111, No. Stirling numbers Kind (U) 1, January

1958

Survey of Multinomial Vol. XX, No. Mathematics Estimation for Code Weighting, 3, Summer A (U) 1975

Transient Analysis of Coaxial Vol. I, No. 2, Coaxial cables Cables Considering Skin Effect July 1956 (U)

Some Properties of the Two- Vol. IX, No. Information State First-Order Markov Chain 4, Fall 1964 transmission (U)

DOCID: 3020956 I--! 98(1) b) (31-50 USC 403

t b ) ( 3 ) - F . L . 86-3n ~ b ) (3)-18 USC 798

Author I Title Reference Keyword

Vol. XVI, No. l] 4. Fall 1971 vie navy

1 Work Breakdown Structure: A Vol. XXV, Software Better Implementation to No. 4, Fall acquisition Manage Software Overruns (U) 1980

Software Maintenance -The Vol, XXIII, Software Other Side of Acquisition (U) No. 3, maintenance

Summer 1978

On the Selection of Personnel for January 1960 Cryptanalytic Cryptanalysis (U) personnel

On the Selection of April 1960 Cryptanalytic Cryptanalysts - Part 11 (U) personnel

Real-Time Raster (U) Vol. XXIV, ELINT collection No. 1, Winter 1979

1 I Note on Product Sequences. A Vol. XVI. No. Mathematics 2, Spring 1971

Slow Look at Fast Transforms, Special Fast Mathematics A (U) Fourier Issue,

August 1973

Survey of Bent Functions, A (U) Special Fast Mathematics Fourier Issue, August 1973

Experimental Approach ta an Vol. VIII, No. Collection Environment Study in the HF 4, Fall 1963 Signals Band (U)

Art of Automatic Bearing Vol. XVIII, Mathematics Instrumentation, The (U) No. 4, Fall

1973

Introduction to Vol. XII, No. Communications Psycholinguistics, 2, Spring Paralinguistics, and Kinesics, 1967 An, (U)

Introduction to the Methods of Summer 1961 Thin film analysis Thin Film Analysis, An (U)

DOCID: 3020956 9 3 9 8 5 9 8

I Low Weight Linear Recursions Vol. VIII, No. Mathematics in Key (U) 1, Winter

1963

Author

Hoopscotch (U) Vol. XII, No. Games 2, Spring 1967

Title Reference Keyword

IFF: A New Branch c;f Vol. 11, No. 4, IFF Cryptology (U) October 1957 Planes

Scientific and Engineering Vol. X, No. 2, Information , Information Management in the Spring 1965 management Department of Defense (U)

D'Imperio, Mary

Assignment of Storage Space in Rapid-Access Memory Systems (U)

Computer Sorting (U)

Magnetic Core Memories (U)

Some Cribbing Techniques (U)

Hybrid Circuits (U)

Vol. 11, No. 2, Addressing Systems April 1957 Memory

Vol. XIII, No. Computers 3, Summet 1968

Vol. 11, No. 1, Computers January 1957 Memory

Vol. XXIII, Cribbing techniques No. 1, Winter 1978

Vol. 111, No. Circuits 1, January 1958

Application of Cluster Analysis Vol. XXIII, Cluster analysis and Multidimensional Scaling No. 3, Voynich Manuscript to the Question of "Hands" and Summer 1978 "Languages" in the Voynich Manuscript. An (U)

Application o 43 the vol. XXIV, Voynich Manuscrlp , An Ub( No. 2, Spring Voynic Manuscript - Data Structures and Their Vol. IX, No. Computers Representation in Storage: Part 3, August Memory I (U) 1964

Data Structures and Their Vol. IX, No. Computers Representation in Storage: Part 4, Fall 1964 Memory I1 (U)

DOCID: 3 0 2 0 9 5 6 9 8

Author I Title Reference Keyword

Human-Machine Interfaces for NSA Computer Systems (U)

Vol. XXIV, Computers No. 4, Fall SOLIS 1979

Reverse Sort Machine Listings (U)

Vol. XVIII, Computer No. 1,Winter working aids 1973

Study of Character-Handling by Computer at NSA, A (U)

Vol. XIV, No. Computers 2, Spring 1969

TEMAC (Text Macro Compiler): A Machine Language for Processing ~ e x t (U)

Vol. X, No. 3, Computers Summer 1966 Machine language and Computer and Information Science Issue

Growing Up with Computers a t NSA (U) '

Special Computers Council of Learned

Eachus, Joseph

r i In General the PCAH Iteration Converges (U)

Organization Issue, 1972

Vol. XII, No. 1, Winter 1967

Mathematics

Tunnel Diode Characteristic Function Generator (U)

Vol. VIII, No. 1, Winter 1963

Computers

Symmetric Approximations to Boolean Functions (U)

Vol. XIX, No. 3, Summer 1974

Mathematics

Vol. IV, No. 3, July 1959 I Computers

Signal theory

Operation Babel (U)

Generalizations of "Maximum- Entropy" (Pattern) Analysis (U)

Vol. XXIV, No. 2, Spring 1979

Engstrom, H. T. Science and Cryptology (U) I Vol. 111, No. 3, July 1958

Cryptology Science u Arithmetic of the Addition

Generation Principle for Electronic Key Generators (U)

Vol. 11. No. 3, July 1957

Mathematics

DOCID: 3020956 REF ID:p398598 A

Author I Title Reference Keyword

Mathematics Vol. 11, No. 1, January 1957

Arithmetic Qfa Generation Principle for an Electronic Key Generator, The (U)

Arithmetic of the Linear Generation Principle for Electronic Key Generators, The (U)

Vol. 11, No. 4, October 1957

Mathematics

Arithmetic of the Multiplication Generation Principle in the Koken Key Generator, The (U)

Vol. 11, No. 2, April 1957

Mathematics

Book Review: "Some Applications of High Speed Computers to the Case n= 2 of Algebraic Cryptography," (Mathematics of Computation, Vol. 15, No. 75) (U)

Fall 1961 Book review Mathematics

I I Number of Components in Random Linear Graph, The (U)

Vol. IVY No. 2, April 1959

Cryptanal ysis

I I Random Walks with Restraining Barrier a s Applied

Vol. 111, No. 2, April 1958

Computers Sampling

I I Collected Editorials of Sydney Fairbanks (U)

April 1956 - July 1959

Editorials

Cryptanalysis Z-Flags in Hagelin Cryptanalysis (U)

Vol. IX, No. 1, Winter 1964

I I Communications Security and Special Council of Learned Organization Issue, 1972

Computers COMSEC Computers (U)

I I Channel Modeling and Code Performance Evaluation (U)

Vol. XXIII, No. 2, Spring 1978 and Special Mathematics and Engineering Issue, 1981- 1983

Channels Communications

DOCID: 3020956 -9 * (b)i3)-1.L. 86-36

Author 1 Title

I

Book Review: Norse Medieval Cryptography in Runic Carvings (U)

Continued Fractions and Mills' Algorithm (U)

Filby, P. W.

I UTIL of English: A Study of the Quality of SICINT Product (U)

Gweeks Had a Gwoup for It, The (U)

1 Precursor of Modern Communications Intelligence (U)

Third Revolution: Prospects for Continued SICINT Productivity, The (U)

Response of a Non-Linear Device to a n Emitter Environment in the High Frequency Spectrum, The (U)

Statistical Description of the Noise and Emitter Environment, A (U)

I Example of Computer Graphics as Applied to Key Analysis, An

I Computers and Advanced Weapons Systems (U)

I Remarks concerning Substantialization (U)

SELLNOW - A Man-Machine Communication System for ELINT Data (U)

Reference Keyword

Vol. XXV, Mathematics No. 3, Summer 1980

Vol. XXI, No. Eletchley Park 2, Spring Cryptologic history 1976

Vol. XIII, No. Book review 3, Summer Cryptologic history 1968

Vol. XVII, SIGINT reporting No. 4, Fall 1972

Vol. 111, No. Cryptologic history 3, July 1958

Vol. XIII, NO. srCrNT 3, Summer productivity 1968

Vol. VIII, No. Signals 1, Winter 1963

Vol. XI No. 4, Collection Fall 1965

Vol. XXII, Computer graphics No. 1, Winter 1977

Special Advanced weapons Council of systems Learned Computers Organization Issue, 1972

Vol. XVIII, Computers No. 1,Winter Cryptanalysis 1973

Vol. IX, No. Mathematics 4, Fall 1964

Vol. VIII, No. ELINT 4, Fall 1963

DOCID: 3020956 REF ID:A398598

Author 1 Title Reference Keyword I

Matter Transmission (U) Vol. VIII, No. Cryptosecurity 1, Winter 1963

I I Automatic Signal Identification Special Issue,. Signal identScation January 1971

FDM Activity Detection (U) Vol. XXI, No. FDM signals 1, Winter 1976

Reference Patterns for Nearest Vol. XXII, Signals analysis Neighbor Rule (U) No. 1, Winter

1977

Friedman, William F.

Can Cryptologic History Repeat Vol. XVIII, Cryptologic history Itself? (U) No. 3,

Summer 1973

Introduction to Cryptology - I , Vol. IV, No. Cryptologic history An (U) 4, October

1959

Introduction to Cryptology - 11, April 1960 Cryptologic history An (U)

Introduction to Cryptology - 111, Fall 1960 Cryptologic history An (U)

Introduction to Cryptology - IV, Winter 1961 Cryptologic history I An, i u i

Introduction to Cryptology - V, Summer 1961 Cryptologic history I An, (Ui

I Introduction to Cryptology - VI, Fall 1961 Cryptologic history An, (U)

Solution of the Japanese PURPLE Vol. XIX, No. Cryptologic history Machine, The (U) 1, Winter PURPLE machine

1974

Gaddv. David W. 1 Rocheford's Cioher: A Discovery Vol. XVIII, Civil war in ~ o n f e d e r a t . ~ r y p t o ~ r a ~ h ~ - No. 4, all- Cryptologic history

1973

Viet Minh Cover Terms and Vol. IV, No. Viet Minh Their Solution (U) 3, July 1959 cover terms

and Special Linguistics Isssue

DOCID: 3020956 Ib] ( 3 1 - P . L . 86-36

6 9 8

Author I Title Reference Keyword

Gerson, Nathaniel C.

Multichannel Language Processing as a System (U)

Rocket Motion and Newton's Second Law (U)

, Correlation and Power Spectra of Randomly Sampled and Held

I Analysis of Sorting Techniques for Multiple Signal Intercept (U)

Cost-Effectiveness Study of Spectrum Surveillance Systems,

Vol. XVII, Language processing No. 4, Fall 1972

Fall 1960 Rocket motion

Vol. XIV, No. Signals analysis 2, Spring 1969

VO~. XII, NO. COMINT target 3, Summer identification 1967

Vol. XIV, No. Collection 3, Summer 1969

Antipodal Propagation (U) Vol. IV, No. Radio waves 1, January Transmitters 1959

CoMsEC a t IUD Sites- Vol. VII, No. COMSEC 4, Fall 1962

Future Problems of Intercept (U) Vol. VIII, No. COMINT 1, Winter ELINT 1963

Ionospheric Propagation (U) Vol. 111, No. Communications 4, December Ionosphere 1958

Intercept and Electromagnetics Vol. XX, No. Electricity (U) 2, Spring Optics

1975

Intercept of USSR Missile Vol. IV, No. Electromagnetics Transmissions (U) 3, July 1959 Missile radiation

Interference and Intercept (U) Vol. XVI, No. Intercept 1, Winter Noise 1971

I Polar Ionosphere, The (U) Summer 1961 Ionosphere Physics

Six Point Program for Improved Vol. VII, No. Intercept Intercept (Part I) (U) 3, Summer

1962

DOCID: 3020956 REF IDzA398598 9

Title Reference Key word

U. S. Program in Direction Vol. X, No. 2, Direction finding Finding, A (U) Spring 1965 Wullenweber

systems 1

Determination of Missile and April 1960 Earth satellite Earth Satellite Trajectories Orbits from Radar Observations (U)

Geodetic Latitude and Altitude Vol. XX, No. Astrodynamics from Geocentric Coordinates (U) 1, Winter Mathematics

1975

Least Squares Analysis of a Vol. IV, No. Mathematics Probability Matrix, The (U) 1, January

1959

Logarithmic Scoring and Vol. 11, No. 1, Cryptanalysis Preliminary Testing (U) January 1957

Maps and the Conversion of Vol. 111, No. Mapping Gauss-KrQger Grid Coordinates 1, January (u) 1958

Maximum Likelihood Fall 1961 Celestial mechanics Estimation of an Orbit (U)

Mechanical Treatment of Vol. 11, No. 4, Cryptanalysis Fibonacci Sequences, A (U) October 1957

Orbit Computation with the Vol. XIX, No. Astrodynamics Vinti Potential and Universal 1, Winter Variables (U) 1974

Orbit Fitting to Angular Data Vol. XXI, No. Astrodynamics (U) 2, Spring

1976

Sequential Least Squares Vol. XII. No. Mathematics Estimates (U) 2, Spring

1967

Times of Shadow Passage for Vol. VIII, No. Satellite Earth Satellites (U) 3, Summer tracking

1963

Transverse Mercator Projection, Vol. XXIV, Mapping The (U) No. 4, Fall

1979

On the Expected Number of Vol. VIII, No. Cryptanalysis Random Stops Corresponding to 1, Winter a Given Menu (U) 1963

Author

I ,

DOCID: 3020956

Title Reference Keyword Author

Characteristic Features of the Vol. XI, No. Russian language Russian Language of the Last 2, Spring '

Decade (U) 1966

The Case for Bad Grammar Vol. IX, No. Russian grammar 2, May 1964 and Special (bi (1) Linguistics Issue

(bi(3)-50 USC 403

(b)(Z)-13 USC 799

Spoken Russian: The Other Grammar (U)

Vol. XIV, No. 3, Summer 1969

Russian language ( bi ( - P. L .

II Weather or Not - Encrypted? (U) Vol. XII, No. 4, Fall 1967

COMSEC North Vietnam

Standard for Evaluating the Intelligence Content of Equipment Emanations (U)

Vol. IX, No. 3, August 1964

Equipment emanations

II Book Review: Basic Cryptologic Glossary (C)

Vol. XI, No. 1, Winter 1966

Book review Cryptology

II Exact Markoff Probabilities from Oriented Linear Graphs

Vol. 11. No. 3, July 1957

Mathematics

II List of Properties of Bayes- Turing Factors, A (U)

Vol. X, No. 2, Spring 1965

Mathematics

Mickle-Muckle Principle in Hagelin Cryptanalysis, The (U)

Vol. IX, No. 4, Fall 1964

Cryptanalysis Hagelin machines

Roughness of Visitations in a Markov Chain, The (U)

Vol. VIII, No. 2, Spring 1963

Mathematics

Turing's Contributions to Cryptology (U)

Vol. VIII, No. 3, Summer 1963

Cryptology Mathematics

COMINT Analysis and Reporting on the Developing Nations (U)

Vol. XVII, No. 2, Spring 1972

Analysis COMINT Reporting

1 Fourier Analysis on Finite Vol. XXI, No. Mathematics Abelian Groups (U) 3, Summer

1976

Computer Generation of Vol. X, No. 3, Cryptanalysis Unrelated Latin Squares (U) Summer 1965 Latin squares

DOCID: 3020956 REF ID:A398598 A A a

Author I Title Reference Keyword

Generating Random Characters on a Computer (U)

Rationale for and Preliminary implementation of HYPERCAN (High Performance Cryptanalysis) (U)

Scientific and Engineering Information Management in the Department of Defense (U)

Gurin, Jacob Employment of Military Linguists (U)

Vol. XII, No. Code generation 1, Winter Computers 1967

Vol. XXIII, Computers No. 4, Fall Cryptanalysis 1978

Special Computers Council of Learned Organization Issue, 1972

Vol. X, No. 2, Information Spring 1965 management

Vol. XIII, No. Military linguists 4, Fall 1968 and Special Linguistics Issue, I1

Layman's Guide to the Vol. XXIII, Language Mysteries of Linguistics, A (U) No. 1, Winter Linguistics

1978

Nest of Dragons. A: The Voice Problem (U)

Possible Applications of Keyword Recognition in Voice Intercept (U)

Speaker Identification by Machine: Where Do We Stand? (U)

Translation of a Classic: A Matter of Ethics, The (U)

Vol. XXI, No. 1, Winter 1976

Vol. XXII, No. 1, Winter 1977

Vol. XIV, No. 4, Fall 1969

Vol. XI, No. 2, Spring 1966

Language Voice problem

Keywords Voice intercept

Speaker identification

Literature Translation

Words and the Intelligence Vol. XXIII, Language Value of Conversations (U) No. 2, Spring

1978

"Maybe It's Related to the Phase Vol. XVII, Callsign generation of the Moon" (U) No. 4, Fall PRC

1972

DOCID: 3020956

Author I Title Reference Keyword

I Growing Up with Computers a t NSA (U)

Use of Production Methods in Reading Transposed Letter Codes (U)

Special Computers Council of Learned Organization Issue, 1972

Vol. 11, No. 1, Codes January 1957 and Special Linguistics Issue

I Electron Beam Recording for Wideband Analog Signals (U)

Optical Receiver, The (U)

Recovery of Pre-Detection Signals in the Optical Receiver (U)

Did Alexander Popov Invent Radio? (U)

Soviet Communications Journals as Sources of Intelligence (U)

I Combining Functions in Key Generators (U)

LVHF Propagation and Collection Techniques (U)

On Milking the Sacred Cow (U)

On an Algorithm for Approximate Polybit Scoring Using Fourier Transforms (U)

Electrical and Magnetic Properties of Computer Tape (U)

I Range Dependence on System Temperatures (U)

Vol. XIV, No. Recording 3, Summer Signals 1969

Vol. XIII, No. Optical receiver 2, Spring 1968

Vol. XIII, No. Signals 4, Fall 1968

January 1960 Radio

Vol. IX, No. Communications 3, August Soviet 1964

Spring 1961 Keys Shift registers

Vol. XVI, No. LVHF collection 4, Fall 1971

Vol. XVII, Collection No. 2, Spring 1972

Special Fast Mathematics Fourier Issue, August 1973

Vol. IX, No. Digital recordings 1, Winter IBM 1964

Vol. IV, No. Communications 1, January 1959

DOCID: 3020956 REF IDgA398598 9

Author 1 Title Reference Keyword

Markov Chain -The Models with the Short Memories (U)

II Learn with BOOK (U)

Hybrid Circuits (U)

Low Cost Process for Printed Circuits, A (U)

Modifhation of a Phantastron Genetator, A (U)

New Mode of Operations in Junction Transistors, A (U)

Transistor Phantastrons (U)

I ( Cover and Deception (U)

New Approach to the One-Time Pad, A (U)

Problem Solving with On-line Systems (U)

Reliability and Checking in Computing Systems (U)

Vol. XVII, Mathematics No. 1, Winter 1972

Vol. XI, No. Light reading 3, Summer 1966

Vol. 111, No. Circuits 1, January 1958

Vol. 11, No. 1, Circuits January 1957

Vol. IV, No. Circuits 4, October 1959

Vol. 11. No. 3, Circuits July 1957

Vol. IV, No. Circuits 2, April 1959

Vol. IV, No. Communications 3,July1959 Deception

(b) : ? )

Vol. XIX, No. Ciphers O(,A

3, Summer One-time pads 1974

Special On-line systems Council of Problem solving Learned Organization Issue, 1972

Vol. 11, No. 4, Computer October 1957 diagnostics

Threaded File Retrieval System Vol. XII, No. Document storage (U) 2, Spring

1967

Cryptanalytic Applications of Vol. IX, No. Cryptanalysis Sequential Analysis (U) 3, August Mathematics

1964

I Multiple Hypothesis Testing Vol. XVI, No. Cryptomathematics and the Bayes factor (U) 3, Summer

1971

DOCID: 3020956

Author Title

Distribution. A (U)

11 Project EXPMRER'(U)

Introduction to Computer Binary Arithmetic, An (U)

Assignment Algorithm Applied to Manual Cryptosystems (U)

Introduction to "Hairpin" Registers (U)

for Operation

Dialect: A Data Type for the Person-Machine Interface (U)

Extensible Model of a Hand Cryptosystem, An (U)

I I FUZZY: An Evolutionary Model for Data Structures (U)

2 GEE System - V, The (U)

Jacobs, Walter Finding the Best-Scoring W. Permutation (U)

I Growing up with Computers a t NSA (U)

Insolvable Problem, An (U)

Reference Keyword - - --

Vol. XIII, No. Mathematics 4, Fall 1968

Vol. XVI, No. Cryptologic history 2, Spring Vietnam 1971

Vol. 111, No. Computer 2, April 1958 Mathematics

Vol. XX, No. Computers 1, Winter Cryptanalysis 1975

Vol. XX, No. Cryptovariables 1, Winter 1975

Vol. 11, No. 2, April 1957

Vol. XXII, Computers No. 2, Spring 1977

Vol. XXIII, Computers No. 1, Winter Cryptanalysis 1978

Vol. XXIV, Programming No. 3, Software Summer 1979

Vol. VII, No. Cryptologic history 4, Fall 1962 Germany

Vol. XIV, No. Mathematics 4, Fall 1969

Special Computers Council of Learned Organization Issue, 1972

Vol. XIV, No. Computer 3, Summer programming 1969

Vol. VIII, No. Computers 3, Summer Cryptology 1963 Turing machine

Author

Jenkins, Virginia

Title Reference Keyword

Learning Machines (U) Vol. 111, No. Learning machines 3, July 1958

Learning Machines - Part I1 (U) Vol. IV, No. Learning machines 2, April 1959

Pattern Recognition (U) Winter 1961 Pattern recognition

Reading a Depth by Computer Vol. X, No. 2, Computer (U) Spring 1965 programming

CAMINO (U) Vol. XII, No. Computers 3, Summer Translation 1967

On the Distribution of n-Digit Vol. I, No. 2, Cryptography Groups by the Sum of Their July 1956 Digits (U)

Some Notes about Chi-Square Vol. VIII, No. Chi-Squares (U) 3, Summer

1963

Variance of the Number of Ones Vol. XII, No. Mathematics in a Derived Stream of Zeros and 2, Spring Ones (U) 1967

Role of Carrier (VCh) Telephony Vol. XIX, No. Communications in Soviet World War I1 Strategic 3, Summer Soviets Communications (U) 1974

On the Maximization of AX Vol. VIII, No. Cryptanalysis over the Vertices of the Cube 1, Winter (u) 1963

Automatic Crib-Dragging Vol. I, No. 1, Hagelin machines Device for Hagelin Machines, April 1956 An (U)

Cycles from Nonlinear Shift Special Shift registers Registers (U) Mathematics

and Engineering Issue, 1981- 1983

Public Key Cryptosystems (U) Vol. XXIV Cryptosystems No. 1 Winter 1979

Thin Film Shifting Matrix, A Vol. VII, No. Currents 4, Fall 1962

DOCID: 3020956 99 * t~'3)-P.L. 56-36

1

Author I Title Reference Keyword

About NSA (U) Vol. IV, No. History 1, January NSA 1959

I Text Recognition Procedure for Vol. XI, No. Cryptanalysis I Cryptanalysis, A (U)

I Magic Digraphs (U)

Computer Processing 4-1 Telemetry (U)

Fast Look-up in a Threaded Dictionary (U)

1 Cost-Effectiveness Study of Spectrum SurveiIlance Systems, [ A (UI

I Data Transmission Over Telephone Circuits (U)

I Analysis of Lexical Meaning across Cultures, An (U)

Kullback, Solomon

1 CY-600 View of Language, A

"False Friends" of the Translator in the English and Russian Languages: A Translation from the Russian of V. V. Akulenko (U)

Freedom in Translation (U)

3, Summer 1966

Vol. XII, No. Cryptanalysis 1, Winter 1967

Vol. XIII, No. , Com~uter , 3, Summer 1968

Vol. XVI, No. Dictionary references 1, Winter 1971

Vol. XIV, No. Collection 3, Summer 1969

Vol. IV, No. Digital data 1, January Transmission 1959

Vol. XIII, No.. Communications 4, Fall 1968 Language

Vol. XVIII, Language No. 3, Linguists Summer 1973

Vol. XVI, No. Russian translation 4. Fall 1971

Vol. XXI, No. Translation 3, Summer 1976

Problems of Meaning in Vol. 111, No. Language Interlingual Dictionaries (U) 1, January dictionaries

1958

I Flattening Effect, The (U) Vol. X, No. 1, Cryptology Winter 1965 Mathematics

DOCID: 3 0 2 0 9 5 6 9 : A 3 9 8 5 9 8

Reciprocal Alphabets and Vol. III,.No. Reciprocal Friedman Squares (U) 1, January alphabets

1958

Author

I Some Applications of Vol. I, No. 1 Information theory Information Theory (U) April 1956

Title Reference Keyword

On Tests of Sequences (U) Val. VII. No. Cryptanalysis 1, Winter 1962

Report on the Keyword System, A (U)

Special Felix System, The (U)

( Entropy of German, The (U)

Book Review: Mathematical Statistics (U)

Book Review: Modern Probability Theory and its Applications (U)

I Book Review: Probability: An Introduction (U)

Book Review: Recent Literature on Algebraic Cryptography (U)

Comparison of the Efficiency of Two Methods of Estimating Certain Time Parameters, A (U)

On Comparing Two Observed Frequency Counts (U)

On Tests of Sequences (U)

Vol. IV, No. 3, July 1959

Vol. IV, No. 2, April 1959

Vol. I, No. 2, July 1956

Vol. VII, No. 4, Fall 1962

Fall 1960

Fall 1960

Codes Keywords

German code

Frequency Probability

Book review Mathematics

Book review Probability theory

Book review Probability theory

Vol. VII, No. Book review 2, Spring Cryptography 1962 Mathematics

Vol. IX, No. Mathematics 2, May 1964

Vol. 111, No. Chi-squares 2, April 1958

Vol. VII, No. Cryptanalysis 1, Winter 1962

Probabilities of Hypotheses and Vol. I, No. 3, Cryptology Kullback-Leibler Information- October 1956 Statistics in Multinomial Samples (U)

Simple Test for Slide or Kick, A Vol. VIII, No. Mathematics 4, Fall 1963

DOCID: 3020956 9

' (bi (3)-P.L. 86-36

Author I Title Reference Keyword

Linear Approximation Attack Special Fast Mathematics on an Irregularly Stepping Key Fourier Issue, Generator, A (U) August 1973

Maya Astronomicdl Computer, Vol. XXII, Astronomy The (U) No. 1, Winter Cryptologic history

1977

ABC of Cifax, The (U) Vol. I, No. 2, Communications July 1956 Facsimile

Privacy

OVERLORD. the Programmer's Vol. XXII, Computer operating Friend: An Extension of the No. 2, Spring systems IDASYS Operating System (U) 1977

I I Error Formula for Iterative Vol. XXII, Frequency Prefiltering Frequency No. 3, Linear prediction Estimates, An (U) Summer 1977

"Typewriter" Key and the Vol. IV, No. Code groups Stereotype, The (U) 4, October

1959

Utilization of Code Limitations January 1960 Codes in Solving Bust Messages (U) and Special

Linguistics Issue

I I Apparent Paradox of Bayes Vol. X, No. 1, Bayes factors Factors, The (U) Winter 1965 Cryptanalysis

I I Bayes Marches On (U) January 1960 Cryptanalysis Mathematics

I I Notes on Chi-square in Vol. 11. No. 3, Cryptanalysis Cryptanalysis (U) July 1957

Optimum Use of Log Weights (U)

Solving a Playfair Cipher by Computer (U)

Use of Bayes Factors with a Composite Hypothesis (U)

Note on "A Low Cost Process for Printed Circuits" (U)

Vol. IX, No. Computers 3, August Plain text 1964

Vol. XIV, No. Computer 4, Fall 1969 cryptanalysis

Vol. IX, No. Cryptanalysis 4, Fall 1964

Vol. 11, No. 3, Circuits July 1957

DOCID: 3020956 TO -398598

Author I Title Reference Keyword

Random Walks with Restraining Barrier as Applied to the Biased Binary Counter (U)

Mathematics and Computers in Cryptanalysis (U)

Lewis. Frank W. I Book Review: Cloak & Cipher

Vol. 111, No. Computers 2, April 1958 Sampling

Special Computers Council of Mathematics Learned Organization Issue, 1972

Vol. VII, No. Book review 3, Summer Cryptanalysis 1962

Categories of Cryptographic Vol. XII, No. Cryptography Phenomena - with a Few 4, Fall 1967 Examples of Effect and Cause (U)

Fallacy of the One-Time-Pad Vol. XIV, No. Cryptanalysis Excuse, The (U) 3, Summer

1969

Garden Paths I Have Followed Vol. IX, No. Cryptanalysis (U) 3, August

1964

German Agent Systems of Vol. VII, No. Cryptologic history World War I1 3, Summer Germany

1962 South America

"It Is Obvious That . . .": A Vol. 111, No. Codes Painless Approach to 2, April 1958 Messages Cryptanalytic Diagnosis (U)

Report on the Keyword System, Vol. IV, No. Codes 3, July 1959 Keywords

I Some of My Best Friends Are Vol. IV, No. Mathematicians Mathematicians (U) 2,April1959

I Something May Rub Of l (U) Vol. X, No. 1, Cryptanalysis Winter 1965

What Next, Dr. Trithemius? (U) Vol. XI, No. Cryptanalysis 4, Fall 1966

Introduction to Magnetic Tape Vol. I, No. 3, Communications Recording and Its Use in October 1956 Recording Intercept Activities, An (U)

DOCID: 3020956

Author

Lutwiniak, William

Solution of VEJX-0, or the Uses of Delta (U)

Title Reference Keyword

Recording Techniques Affecting Vol. IX, No. Intercept Total Intercept fet 1, Winter Recording

1964

Long and Short of Single Vol. XXI, No. Cryptanalysis Transpositions, The (U) 2, Spring Mathematics

1976

Quick Check for fiansposal Vol. IV, No. Garbles Garbles. A (U) 2, April 1969

and Special Linguistics Issue

Net Reconstruction -A Basic Val. 111, No. Traffic analysis Step in Tr&c Analysis (U) 3. July 1958 91 ~ " ~ ~ 7 g , C ~ m a t h e s n a t i c s

No. 3,

CAM 11 (U) Vol. IX, No. Computers 2, May 1964 Memory

Solution of a Polyalphabetic Vol. I, No. 3, Cryptanalysis Monome-Dinome System (U) October 1956

MICROCOMPUTER: General- Purpose Signal Process, The (U)

Introduction to Log-Linear Models in Cryptanalysis (U)

Midway and Yamamoto: Properly Revisited (U)

I Classes of Rotors without Parallels (U)

Prograinming Concepts for Verification and Security (U)

Vol. XVIII, No. 2,Spring 1973

Vol. XXII, No. 2, Spring 1977

Vol. x x v , No. 2, Spring 1980

Vol. XIII, No. 3, Summer 1968

Vol. X, No. 4, Fall 1965

Vol. XXII, No. 4, Fall 1977

Cryptanal y sis

Signal processing

Computing Cryptanalysis

Cryptologic history Midway

Cryptanalysis Mathematics

Programming Software

90

TOP SE-

DOCID: 3020956 -Q~A398598

Author I Title Reference Keyword

Broadband Planar Log-Periodic Vol. X, No. 3, Antennas Feed for the Spherical Reflector Summer 1965 Collection Used a t ~ r e c i b o Ionospheric Laboratory (U)

Creation of an Artificial Vol. XI, No. Communications Ionosphere to Extend the Radio 2, Spring Horizon for Frequencies Below 1966 100 MC, The (U)

Extending the Radio Horizon for Intercept Purposes by Using the Moon as a Reflector (U)

Vol. X, No. 2, Intercept Spring 1965 Signals

Study of Hourly Correlation of Trans-Horizon VHF-UHF Signals and Meteorological Conditions (U)

I Marston, E. Dale

Linearly Induced Nonlinear Cycles (U)

Inexpensive Device for Pictorial January 1960 Computer graphics Input and Output, An (U)

Growing up with Computers a t Special Computers NSA (U) Council of

Learned Organization Issue, 1972

Exposition of a New ycle Search Technique (U)

the Augean Stables or ow Much TA Can a Computer

Vol. XXlV Chinese communists No. 1 Winter Korean War 1979

(b (1) ( t ) ( 3 ) - 5 0 USC 4 0 3

Vol. XIV, No. Signals 1;; i i j I ~ " , ~ ~ , ~ ~ 2, Spring 1969

Vol. XXII, Mathematics No. 4, Fall 1977

arrow-Band Speech Security tF1,

Vol. I, No. 1, Teleprinter cipher April 1956 analysis

Vol. XIII, No. Computers 3, Summer Traffic analysis 1968

Vol. 111, No. Cipher equipment 4, December Security 1958 and Special Linguistics - Issue

DOCID: 3020956

Author I Title Reference Keyword

Evaluating Intercept Techniques (U)

-

Vol. XI, No. 2, Spring 1966

Intercept evaluation

American Indian language I Phonemic Structure of Nootka,

The (U) Fall 1960

APL Mechanization of Indirect Symmetry (U)

Vol. XVII, No. 3, Summer 1972

Computer languages

Vol. XVII, No. 1, Winter 1972

Compilers FORTRAN

Compiler Object Code Optimization (U)

Program Complexity Measure, I * (UI Vol. XXI, No. 4, Fall 1976

Software engineering

Vol. XVIII, No. 2, Spring 1973

Computer programming

Thoughts about Systems and Program Design (U)

(Collection of LINCOMPEX Signals Vol. XVII, No. 2, Spring 1972

Collection Signals

Introduction to Log-Linear Models in Cryptanalysis (U)

Vol. x x v , No. 2, Spring 1980

Computing Cryptanalysis

Recognition of Latin Square Equivalence Classes (U)

Vol. XVI, No. 3, Summer 1971

Cryptanalysis

Machine translation Machine Translation (U) Vol. XII, No. 2, Spring 1967

Creation of an Artificial Ionosphere to Extend the Radio Horizon for Frequencies below 100 MC, The (U)

Vol. XI, No. 2, Spring 1966

Communications

Factors Affecting Required Antenna Gain in VHF Intercept (U)

Cranks, Nuts, and Screwballs (U)

Vol I., No.3, October 1956

Antenna gain VHF intercept

Vol. XI, No. 1, Winter 1966

Security

DOCID: 3 0 2 0 9 5 6 g8 ' (b) ( 3 ) - P . L . 26-26

Author I Title Reference Keyword

Thrusts and Boggles of Outrageous Escalation, The: A

VOCABULARY SURVEY AT THE NATIONAL WARCOLLEGE (U)

Vol. XIII, No. Vocabulary 2, Spring 1968

Computers and Queues (U) January 1960 Computers Queues

Vol. IV, No. Cryptanalysis 4, October 1959

Extreme Values in Cryptanalysis (U)

How to Visualize a Matrix (U) Vol. VI [ I , No. Mathematics 3, Summer 1963

Modified Normal Curves (U) Spring 1961 Cryptanalysis Mathematics

Convergence Techniques for Special Fast Mathematics .Finding Linear Approximations Fourier Issue, (u) August 1973

Collection Management (U) Vol. XIV, No. Collection management 1, Winter 1969

Evaluating Intercept Systems (U)

Intercept System Analysis (U)

Vol. IX, No. 4, Fall 1964

Signals

Vol. XI, No. 2, Spring 1966

Communications intercept

Receiving System Analysis (U) Vol. X, No 1, Winter 1965

Receivers

I Verified Intercept Predictions Vol. XI[. No 1, Winter 1967

lntercept

Vol. IV, No 4, October 1959

Computers

Automatic Maintenance (U) Meyer, Joseph A.

Vol. IX* No. 1, Winter 1964

Computers Maintenance

Communications Cryptanalysis

Capture-Jamming of SIGINT Targets (ti)

Vol. XII* No. 2, Spring 1967

DOCID: 3020956

Author Title Reference Keyword

COMINT - Hard Facts in the Cold Spring 1961 Communications War (U) Ethics

Computers -The Wailing Wall Vol. I, No. 3, Codes (U) October 1956 Cryptanalysis

Der Fall WICHER: German Vol. XX, No. Cryptologic history Knowledge of Polish Success on 2, Spring ENIGMA

ENIGMA (U) 1975

Fallacy of the Systems Val. VII, No. Engineering Approach, The (U) 3, Summer

1962

Vol. XI, No. SIGINT 1, Winter 1966

Room 40 Compromise, The (U) Vol. XXV, Cryptologic history No. 1, Winter 1980

Security Architecture in SlGINT Val. XX, No. Collection Collection and Processing (U) 1, Winter Security

1975

SIGINT Implications of Military Vol. XII, No. Oceanography Oceanography (U) 4, Fall 1967

Simultaneous Error Insinuation Vol. XIV, No. Cipher machines in Electronic Cipher Machines 1, Winter (u) 1969

Strategic Warning: An Vol. XVIII, Strategic warning Intelligence Gap That NSA No. 3, Might Fill (U) Summer 1973

CAMINO (U) Vol. XII, No. Computers 3, Summer Translation 1967

Language and the COMINT Vol. XIX, No. COMINT Production Process (U) 3, Summer Language

1974

Language as a Bulk Commodity Vol. XX, No. Language (U) 3, Summer

1975

Look at It This Way (U) Vol. XVIII, Dictionaries No. 1,Winter Foreign languages 1973

DOCID: 3020956 9 9 8 5 9 8

Author Title Reference Keyword

Some Contributions towards a Vol. XVI, No. Translation Course in COMINT Translation 3, Summer (u) 1971

Design and Implementation of a Vol. XXIII, Morse Digital Demodulator for Use No. 2, Spring Signals against On-Off Keyed Signals, 1978 The (U)

Setwise Transitive Croups (U) Vol. X, No. 2, Mathematics Spring 1965

Debugging Made Easier (U) Vol. 111, No. Computers 4, December Debugging 1958

Elements of Shift Register Vol. XVI, No. Cryptology Cryptology (U) 2, Spring Mathematics

1971

Thermal Noise (U) Vol. VII, No. Electricity 3, Summer 1962

Computerized Depth Reading Vol. XVII, Computers (U) No. 1, Winter Cryptanalysis

1972

Processes for Random and Vol. XXII, Dynamic memory Sequential Accessing in No. 4, Fall Mathematics Dynamic Memories (U) 1977

Generating Function Approach Vol. XXII, Mathematics GRETAG, A (U) No. 1, Winter

1977

Matric Recursions (U) Vol. XXII, Mathematics No. 3, Summer 1977

Slow Look a t Fast Transforms, Special Fast Mathematics A (U) Fourier Issue,

August 1973

High-speed Automatic Vol. XX, No. Speech scanning Scanningof Speech Bandwidth 4, Fall 1975 Channels (U)

Bar Statistics, The (U) Vol. VIII, No. Mathematics 2, Spring 1963

Sliding Strips, Additive, Subtractive, and Minuend (U)

Author Title Reference Keyword

Bar Statistics, The (U) Vol. VIII, No. Mathematics 4, Fall 1963

Textual Criticism and NSA (U) 1

I I Personal Contribution to the Bombe Story, A (U)

Intuitive Exposition of Zierler's Method for Finding Linear Recursions, An (U)

Maps and the Conversion of Gauss-Kriiger Grid Coordinates (U)

Missile Trajectories (U)

I I Note on Curve Fitting, A (U)

I ( Order Statistics for Cell Counts

I I Analysis of a Transistor Monostable Multivibrator (U)

Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer (U)

Vol. XI, No. Cryptanalysis 2, Spring 1966

Vol. XIII, No. Cryptography 1, Winter Linear recursions 1968

Vol. XIV, No. Editing 3, Summer 1969

Vol. 11, No. 1, Language aids January 1957 and Special Linguistics Issue

Vol. XX, No. Cryptologic history 4, Fall 1975 ENIGMA

Vol. 111, No. Mapping 1, January 1958

Vol. 11, No. 1, Missile trajectory January 1957

Vol. XIII, No. Mathematics 4, Fall 1968

Vol. XXIII, Mathematics No. 4, Fall 1978

Vol. XIV, No. Ciphers 2, Spring Modulation 1969

Vol. IV, No. Circuits 3, July 1959 Transistors

Vol. XXV, Communications No. 4, Fall Frequency hopping 1980 Jamming

DOCID: 3 0 2 0 9 5 6 ..,,-98598

Author Title Reference Keyword

REDMAN Program, The (U) Vol. IX, No. Data processing 1, Winter 1964

Intuitive Exposition of Zierler's Vol. XIII, No. Cryptography Method for Finding Linear 1. Winter Linear recursions Recursions, An (U) 1968

Markov Models for Phonetic Vol. XVIII, Communications Text (U) No. 1,Winter Speech

1973

Graceful Degradation Through Vol. XXIII, Computers Distributed Intelligence (U) No. 3,

Summer 1978

Use of Special Identification Vol. XII, No. Signal Techniques (SIT) in the Solution 4, Fall 1967 identification of Specific S I ~ I N T Problems, The (U)

Subnanosecond Vol. fX, No. Pulses Instrumentation (U) 1, Winter

1964

Nolte, William Project TENNIS and External Vol. XXIII, M. Influences on NSA Systems No. 2. Spring

Development (U) 1978

Error in a Capacitor-Type Vol. 111, No. Pulses Totalizer (U) 4, December Waves

1958

Factors Affecting Required Vol I., No.3, Antenna gain Antenna Gain in VHF Intercept October 1956 VHF intercept (U)

Survey of the Status of the Voice Vol. XII, No. Voice Problem, A (U) 4, Fall 1967 communications

VIDEOFILE: A New Information Val. XIiI, No. Information storage Storage System (U) 2, Spring Video

1968

u Solution of Additive-Minuend Vol. 111, No. Cryptanalysis Busts (U) 1, January

1958

Information Theory and the Vol. IV, No. Information theory Packing of Spheres (U) 2, April 1959

DOCID: 3020956

Author I Title Key word Reference

Minimizing Noise Effects in PCM (U)

Vol. 11, No. 2, April 1957

Collection

Classes of Rotors without Parallels (U)

Vol. X, No. 4, Fall 1965

Cryptanalysis Mathematics

Trends, Developments, and Pressures in SICINT Reporting Today (U)

Rotation Problem in Pattern Recognition, The (U)

Vol. XXI, No. 1, Winter 1976

SIGINT reporting

Vol. VII, No. 1, Winter 1962

Pattern recognition

Vol. XVIII, No. 2,Spring 1973

Crypto- mathematics

( Survey of the Distance Problem,

I Darlington Compound Transistor a s a Current

Vol. IX, No. 4, Fall 1964

Electricity

Controlled Voltage Source, A (U)

Representation of Signals on Orthonormal Bases, The (U)

Vol. IX, No. 1, Winter 1964

Signals

Computers Tunnel Diode Characteristic Function Generator (U)

Vol. VIII, No. 1, Winter 1963

I Why Analog Computation? (U) Vol. VII, No. 3, Summer 1962

Analog computers

Weather: I ts Role in Communications Intelligence

Vol. 111, No. 3, July 1958

Weather

(U)

Philosophy of U.S. Cryptography and Cryptographic Usage, A (U)

Vol. XII, No. 3, Summer 1967

Cryptography

Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Scaling, The

Vol. XXI, No. 4. Fall 1976

Cryptanalysis

Computer programming

RYE, a n Extended Capacity Remote Access System (U)

Vol. IX, No. 2, May 1964

DOCID: 3020956 REF ID:A398598 9

Author Title Reference Keyword

Development of Automatic Vol. 11. No 3, Circuits Telegraph Switching Systems July 1957 Switching Systems (U)

Recollections Concerning the Vol. 1, No 2, Cryptography Birth of One-Time Tape and July 1956 Printing-Telegraph Machine Cryptography (UI

Some Notes on Information Vol. IV, No. Information theory Theory (L') 1 ,January

1959

Realization and Optimization of Vol XIII, No. Filters the Audio Frequency 4, Fall 1968 Frequency Microminiature Thin Film Special Band-Pass Filters (U) Mathematics

and Engineering Issue, 1981- 1983

Some Recent Vocoder Studies a t Vol. XIII, No. Vocoders the National Security Agency 2, Spring (u) 1968

Note on a Solution of a Vol. I, No. 3, Ciphers Polyalphabetic Dinome System, October 1956 A (U)

Randomization Made to Order: Special Cryptanalysis "Random Numbers Are Too Council of Randomization Important to be Left to Chance" Learned (U) Organization

lssue, 1972

Introduction to Electronic Vol. VIII, No. Phase-lock Phase-Lock Oscillators, An (U) 2, Spring oscillators

1963

Introduction to Programmingof Vol. 11, No. 3, Computer a Digital Computer (U) July 1957 programming

Cryptanalytic Use of High- Vol. IX, No. Computers Speed Digital Computing 3, August Cryptanalysis Machines (U) 1964

DOCID: 3020956

Author 1 Title Reference Keyword

Vol. X, No. 2, Spring 1965 and Computer and Information Sciences Issue

Mathematics

Number of Components in Random Linear Graph, The (U)

Vol. IV, No. 2, April 1959

Cryptanalysis

I Perpetuation of Bias in Shift Register Devices (U1

Vol. XIV, No. 4, Fall 1969

Shift registers

Vol. VIII, No. 2, Spring 1963

Ciphers Key

RYE, an Extended Capacity Remote Access System (U)

Vol. IX, No. 2, May 1964

Computer programming

I Fundamentals of Majority Logic Vol. IV, No. 4, October 1959

Digital circuits Logic

Vol. 111, No. 4, December 1958

Communications Ionosphere I Ionospheric Propagation (U1

Phillips, Cecil SiGlNT Computer Processing in I the 1980s (U) Vol. XXII, Computer No. 2, Spring processing 1977

Digitizer Queuing Model for FROSTING (U)

JACQUARD - A Yates Algorithm Machine (U)

On Understanding the Null 3 Hypotheses of Test Statistics (U)

Vol. XIV, No. Collection 4, Fall 1969 Queuing theory

Special Fast JACQUARD machine Fourier Issue, Mathematics August 1973

Vol. VIII, No. Mathematics 4, Fall 1963

I Spread Spectrum System Jamming Response (U)

Vol. XXII, Signals No. 3, Spread spectrum Summer 1977

Computer Graphics in an Engineering Simulation Program (U)

Vol. XVII, Computer No. 2, Spring programming 1972

DOCID: 3020956 REF ID:A398598 ib, (1)

TOP SEC- (oj(3)-50 USC 403 (b) (3)-18 USC 799 (b) (3)-P.L. 86-35

'bi (31-P L. 86-36

Author I Title Reference Keyword

Writing Efficient FORTRAN (U) Vol. XVII, FORTRAN No. 2, Spring 1972

Experimental Approach to an Vol. VIII, No. Collection Environment Study in the HF 4, Fall 1963 Signals Band (U)

Drawing to a Straight Flush -A Vol. XXI, No. ELiNT Study in Technical Intelligence 3, Summer Technical intelligence (u) 1976

Genesis of Mobile Magoo, The Vol. XX, No. Telemetry processing (U) 3, Summer

1975

Vol. XXI, No. Cr tolo ic histor 1, Winter 1976 f E e l

Spacecraft Passenger Television Vol. XXI, No. Space flights from Laika to Gagarin (U) 2, Spring

1976

Two New Language Models (U) Vol. XXIV, Language modeling No. 3, Summer 1979

German Radio Intelligence (U) Vol. XXV, Cryptologic history No. 4, Fall German COMINT 1980

Operation V A ~ C U A R D Vol. I , No. 2, Communications July 1956 Earth satellites

Linear Approximations and the Special Fast Mathematics Degree of the Function (U) Fourier Issue,

August 1973

Simulation of Cryptoprinciples Special Communications (U) Council of security

Learned Organization Issue, 1972

Analysis ofThin Film Vol. VIII, No. Physics Germanium Epitaxially 2, Spring Deposited onto Calcium 1963 Fluoride (U)

Scaling Matrix for the Analog Vol. VII, No. Computer Computer (U) 1, Winter programming

A 1962

DOCID: 3020956

Author I Title Reference Keyword

Status of Optical Logic Vol. VIII, No. Computers Elements for Nanosecond 3, Summer Computer Systems (U) 1963

Vol. XX, No. 1, Winter 1975

Aircraft tracking Asian Communist Aircraft Location Systems (U)

Vol. XXII, No. 3. Summer 1977

Cryptanalysis Conjugate Codebooks (U)

Vol. X, No. 3, Summer 1965 and Vol. X, No. 4, Fall 1965

Ciphers Cryptologic history

Boer War Cipher, A (U)

SELLNOW - A Man-Machine Communication System for ELINT Data (U)

Vol. VIII, No. 4, Fall 1963

ELINT

Theoretical Linguistics and Language Universals (U)

Vol. XXII, No. 2, Spring 1977

Linguistics

Cryptanalysis I I How to Choose a Good Crib (U) Vol. X, No. 4, Fall 1965

With Love (and Parentheses) from Peking (U)

Vol. XII, No. 1, Winter 1967

Chinese language Codes

I I Time Coordination of SIGIN'T Vol. XII, No. 2, Spring 1967

Intercept sites

Vol. IX, No. 1, Winter 1964

Missile trajectory I I Ballistics (Soviet) (U)

Vol. I , No. 1, April 1956 I Esperanto

Language Language Problem a t NSA, The (U,

Metalin: A Draft of a Vol. XI, No. Artificial language Metalanguage (U) 4, Fall 1966

Multilingual Codes (U) Vol. X, No. 4, Codes Fall 1965 Language

Worldwide Language Problems Vol. XIII, No. Language at NSA (U) 4, Fall 1968 training

DOCID: 3020956 -298598

Author Title

Algorithm (U)

Product Sequences I 1 ( U )

How the Japanese Army Water Transport Code 2468 Was Broken (LT)

CATNIP: Computer Analysis - Target Networks Intercept Probability (U)

Number of Components in Random Linear Graph, The (U)

Optical Fourier Transform and Periodic Phenomena (U)

Anglicisms in Puerto Rico (U)

Book Review: A History of NSA General-Purposc Electronic Digital Computers RSf2.Q-

I Low Cost Process for Printed Circuits, A (U)

I On the Minimization of Integer Quadratic Forms over Nonzero .Integer Vectors (U)

Cooley-Tukey Fas t Fourier Transform for Base 4 and Base 4 + 2 ( U )

Book Review: TRATADO DE CRIPTOCRAFIA (U)

Chaco: A Horrible Example (U)

Reference Keyword

Vol. XXV, Mathematics No. 3, Summer 1980

Vol. XX, No. Mathematics 4, Fall 1975

Vol. XVIII, Cryptologic history No. 4, Fall J a p a n 1973

Vol. XVI, No. Collection 1, Winter Intercept 1971

Vol. IV, No. Cryptanalysis 2, April 1959

Vol. XVIII, Mathematics No. 3, Summer 1973

Vol. XVII, Spanish language No. 1, Winter 1972

Vol. IX, No. Book review 2, May 1964 Computers

Vol. It , No. 1, Circuits January 1957

Vol.XXV, Mathematics No. 1, Winter 1980

Vol. XVII, Mathematics No. 4, Fall 1972

Vol. XI, No. Book review 2, Spring Spanish cryptography 1966

Vol. XVIII, Translation er rors No. 3, Summer 1973

DOCID: 3020956 9 9 8

L I ( 3 ) - r . ~ . e c - 3 6

Mokusatsu: One Word, Two Vol. XIII, No. Translation Lessons (L') 4, Fall 1968

and Special Linguistics Issue, 11

Author

Spanish Languages, The (U)

Title Reference Keyword

I I Note on Univariant

Scheduling Function in a Time- Sharing Environment, The (U)

I I Attack on Blair-Huffman Encipherments, An (U)

I I Don't Be Too Smart (U)

I1 Method of Recovery of Fibonacci Key, A (U)

I I John Dee: Consultant to Queen Elizabeth I (U)

I I Special Purpose Cryptanaly tic Computers: State of the Art (U)

Salemme, Arthur J.

Vol. XIII, No. Spanish language 1, Winter 1968

Vol. III, No. Interpolation 4, December 1958

Vol. XX, No. Collection 2, Spring 1975

Vol. XVI, No. Computer systems 2, Spring 1971

Spring 1961 Ciphers i b ) (1:

0 (b) ( 3 ) - 50 USC 4 0 3

January 1960 Codes [b) (3: - P . L . Japanese military 8 6-36

Vol. I, No. 3, Cryptanalysis October 1956

Vol. XII, No. Cryptologic history 4, Fall 1967

Vol. IV, No. Cryptology 4, October Electronic warfare 1959

Vol. XXIII, Computers No. 1, Winter 1978

Are the Russians Gaining Spring 1961 Russian language Wordwise? (U)

Computer, There is Thy Sting! Vol. XVl, No. Computers (u) 4, Fall 1971 Russian

Translation

I Language Files: A Basic Vol. IV, No. 2 COMINT COMIPiT Aid (U) April 1959 Russian language

Few Tricks of the Trade for the Vol. XI, No. Russian language Translator of Russian, A (U) 4, Fall 1966 Translation

DOCID: 3020956 REF ID:A398598

Author I Title Reference Key word

Handle with Care: Russian Transliteration (U)

Schierlmann, Charles J.

Some Problems in the Field of Machine Translation or the Case of the Volatile Mouses (U)

Tour of Some Russian Translation Traps, A (U)

Use of the B-Coefficient in Information Retrieval, The (U)

On the Maximization of X'AX over the Vertices of the Cube (LT)

Midway and Yamamoto: Properly Revisited (L;)

Parabolic "Mock" Design for a n FFT -Implemented Filter Scheme (U)

Database Services (U)

APT System, The (U)

Vol. XII, No. Russian 4, Fall 1967 transliteration

Fall 1960 Machine translation

Vol. XIV, No. Russian 4, Fall 1969 Translation

Vol. XIII, No. Information 4, Fall 1968 retrieval

Vol. VIII, No. Cryptanalysis 1, Winter 1963

Vol. XIII, No. Cryptologic history 3, Summer Midway 1968

Special Issue, Filters January 197 1

Vol. XII, No. Databases 1, Winter Soviet (b) 1 )

1967 (b)(3)-5C USC 403 (t)13)-P.L. 86-36

Vol XXIII, Computers No. 3, Data processing Summer 1978

Growing up with Computers a t Special NSA (U) Council of

Learned Organization Issue, 1972

Wandering Wheel, The (An Vol. XIII, No. Introduction ta-TMT 1, Winter

1968

Cold-Cathode Counter Tube Vol. 111, No. Study, A (L:) 4, December

1958

PPM Telemetry Simulator (U) Fall 1960

Computer Scripting (U) Vol. XXIV, No. 1, Winter 1979

Computers

Cipher machines

Cathode Pulses

Computers Language Working aids

DOCID: 3020956

Author I Title Reference Keyword

COMINT Signals Trends Val. XXV, COMlNT No. 2, Spring Signals trends 1980

How Can the Communications Vol. VIII, No. Communications Sciences Contribute to the Study 3, Summer Cybernetics of Natural Systems? (U) 1963

Parity a s an Operation Vol. VIII, No. Mathematics Checking Code (U) 3, Summer

1963

I I Substantive Analysis (U) Vol. IV, No. Analysis 2, April 1959

MP-14: Unlimited Random Vol. XVII, Computers Source (U) No. 3, Cryptanalysis

Summer 1972

German Tires and Black Cats: Vol. XIX, No. Cryptanalysis Estimation of Population Size 3, Summer (u) 1974

Conjugate Codebooks (U) Vol. XXII, Cryptanalysis No. 3, Substitution Summer 1977

Convolutions, Cube Roots, and Vol. XVIII, Computers Computer Cryptography (U) No. 3, Cryptography

Summer 1973

Introduction to the Special Issue Special Fast Mathematics Fourier Issue, August 1973

Linear Approximation Attack on a n Irregularly Stepping Key Generator, A (U)

Strength of the Bayes Score, The (U)

Approximations to the Distribution Function of Sums of Independent Identically Distributed Random Variables

Special Fast Mathematics Fourier Issue, August 1973

Vol. XVII, Mathematics No. 1, Winter 1972

Vol. X, No. 2, Mathematics Spring 1965

DOCID: 3020956 REF ID:A398598 BRA

Author Title Reference Keyword

Telecommunications from the Special CR~TICOMM Torn-Tape to the Computer (U) Council of

Learned Organization Issue, 1972

Determining Intercept Vol. XII, No. Intercept Assignments (U) 2, Spring

1967

Management of Magnetic Tape Vol. X, No. 4, Tape management (u) Fall 1965

Minimizing Wasted Space in Vol. XIV, No. File storage Infortnation Files (U) 4, Fall 1969

Need for System Approach, The Vol, VII, No. SrGINT

(U) 2, Spring 1962

Operations Research in NSA Vol. X, No. 1, Management (u) Winter 1965 Operations

Representing Data in Vol. 111, No. Data Computers (U) 1, January representation

1958

Six Characteristics of Vol. XIV, No. Information systems Information Handling Systems 3, Summer (u) 1969

Cryptologist. Can He Exist?, Vol. 11, NO. 3, Cryptologists The (U) July 1957

Curiosa Scriptorum Sericorum: Vol. XVI, No. Communications To Write But Not to 3, Summer Writing Communicate (U) 1971

What Is Good Traffic Analysis' Vol. XXIV, Traffic analysis (U) No. 4, Fall

1979

Developments in the Automatic Vol. XXIV, Communications Acquisition and Translation of No. 1, Winter Morse code Hand-Keyed Morse Code (U) 1979

Conjugate Codebooks (C') Vol. XXII, Cryptanalysis No. 3, Substitution Summer 1977

Emergency Destruction of Vol. I, No. 1, Document Documents (U) April 1956 destruction

DOCID: 3020956 9 5 9 8 T

'b\ '3)-P.L. 86-36

Author I Title Reference Keyword

Linear Approximations Using Special Fast Mathematics Continuous Functions (U) Fourier Issue,

August 1973

Designing Secure Reliable Vol. XXI, No. Computer security Software - A Methodology (LT) 4, Fall 1976 Software

International or Cross-Country Vol. I , No. 3, Cryptanalysis Depths (U) October 1956

Sinkov, Abraham Abstract Groups Defined by Generating Operators (U)

April 1960 Groups Operators

Soviet Science and Technology; Present Levels and Future Prospects (U1

Vol. IV, No. I, January 1959

Science and technology'

Soviet

Vol. XX, No. 1, Winter 1975

Collection Potential of Tropospheric Ducting as a Collection Technique, The (U)

I cxco Story, The (U) Vol. XVI, No. 4, Fall 1971

Cry ptanalysis Cryptologic history

SPECOL.: A New AND, OR, NOT Language for Use with Computers (U)

Vol. XII, No. 1, Winter 1967

Computer language

Ambiguity Reduction by Markov Analysis of TEMPEST Signals (U)

Vol. XVI, No. 1, Winter 1971

Signals TEMPEST

Mathematical Modeling of TEMPEST Channels (U)

Vol. XVI, No. 3, Summer 197 1

Signals TEMPEST

Vol. VIII, No. 3, Summer 1963

Mathematics Tail Probabilities for the Binomial Distribution (U)

Snyder, Samuel S.

ABNER: The ASA Computer Vol. XXV, Computers Part 1: Design (U) No. 2. Spring Cryptologic history

1980

ABNER: The ASA Computer Vol. XXV, Computers Part 2: Fabrication, Operation, No. 3, Cryptologic history and Impact (U) Summer 1980

Earliest Applications of the Vol. XVIII, Computers Computer a t KSA (U) No. 1,Winter

1973

DOCID: 3020956 REF IDzA398598 9

Author I Title Reference Keyword

Famous First Facts, NSA, Part Vol. XVII, Computers I: Pre-Computer Machine No. 4, Fall Cryptanalysis (U) 1972

Growing up with Computers a t Special Computers NSA (U) Council of

Learned Organization Issue, 1972

Vol. 11, No. 4, October 1957 1 Encipherment Offsets of Differences:

Summation and Difference Methods (U)

Development of High Speed Automatic Morse Translators, The (U)

Vol. I, No. 1, April 1956

Morse translators

Analytic Computer Technique for Anagramming Columnar Transposition (U)

Vol. VIII, No. 2, Spring 1963

Cipher Computer

Simple Test for Slide or Kick, A (U)

Computer-Aided Bookbreaking of Two-Part Codes (U)

Vol. VIII, No. 4, Fall 1963

Mathematics

Vol. XVII, No. 2, Spring 1972

Bookbreaking Computers

Computers and Linguists Do Mix (U)

Vol. XVI, No. 3, Summer 197 1

Computers Linguists

Frame versus Corpus (U) Vol. XVII, No. 1, Winter 1972

Bookbreaking Computers

Redundancy Exploitation in the Computer Solution of Double- Crostics (U)

Vol. VII, No. 2, Spring 1962

Computers

Repagination? (U) Vol. XVIII, No. 4, Fall 1973

Bookbreaking Computers

Under-Developed Languages, Under-Utilized Computers (U)

Vol. XX, No. 1, Winter 1975

Computers Language

Vol. XIX, No. 1, Winter 1974

Cryptanalysis Will the Real 53 Stand Up? [C)

DOCID: 3020956 TOP p 8 -50 ~ s c L o j

(b) (31-18 TJSC 798 (b) 13)-P.;. 86-36

(b)13)-P.;. 86-36

Author I Title Reference Keyword

Vol. XXIV, Cryptanalysis No. 3, Key generators

I Summer 1979

Vol. 111, No. Noise 2, April 1958

Some Formulas concerning Special Fast Bulges of Combining Functions Fourier Issue. ( u ) August 1973

Vol. XXIV, No. 2, Spring = 1979

Information Theory Applied to Vol. XXIII, Computer Data Compression No. 4, Fall (U) 1978 and

Special Mathematics and Engineering Issue, 1981- 1983

Mathematics

Cryptosy stem identification

Computers Data compression i b ) (1) (b) (3)-18 USC 1 9 8 (D) ( 3 ) -P.L. 85-36

I RAKE System for Tropospheric Val. X, No. 4, Collection Scatter, A (U) Fall 1965

Climbing Jacob's Ladder (U) Vol XII, No, Computers 3, Summer Telecipher analysis 1967

Association Factor in Winter 1961 Computers Information Retrieval, The (U) Information retrieval

Information Storage and Vol. VIII, No. Information retrieval , Retrieval (U) 4, Fall 1963

Use of the B-Coefficient in Vol. XIII, No. Information Information Retrieval, The (U) 4, Fall 1968 retrieval

Chatter Patterns: A Last Resort Vol. 11, No. 4, Chatter October 1957 Traffic

I Target in Space, A (U) Special I I Council of satellites Learned Organization Issue, 1972

DOCID: 3020956 TOPS -8598

Author I Titie Reference Keyword

Errors in High Frequency Direction Finding (U)

Voice Problem, The (U)

1 / ~ ; ~ g t h of the .ayes s o r e , he

How the Germans Broke a U.S. Code (U)

I I Some Problems and Techniques in Bookbreaking (U)

Example of Substantive Analysis, An (U)

Some Graphical Display Techniques for Fourier Analysis (U)

Technology of Future Powerful Personal Computers, The (U)

Investigations into Adult Language Learning/Acquisitions (U)

Language Levels and Cryptologic Jobs (U)

COMlNT Satellites - A Space Problem (U)

11 Library and the User, The (U)

Vol. IV, No. 1, January 1959

Special Council of Learned Organization Issue, 1972

Vol. XVII, No. 1, Winter 1972

Fall 1960

Vol. XI, No. 1, Winter 1966

Vol. XI, No. 3, Summer 1966

Vol. XXIV, No. 1 Winter 1979

Special Issue, January 1971

Direction finding

Voice communications

Mathematics

Codes Germans

Bookbreaking

Analysis Soviet

Computers Language Working aids

Computer graphics

Vol. XXV, Computers No. 3, Summer 1980

Vol. XXIV, Language acquisition No. 3, Summer 1979

Vol. XVIII, Language No. 3, Qualification standards Summer 1973

Vol. IV, No. Communications 4, October satellite 1959

Vol. XIII, No. Library 2, Spring Research 1968

DOCID: 3 0 2 0 9 5 6

Author I Title Reference Keyword

Maximum Likelihood Estimation of a Trajectory and Its Variance (U)

II Whole New World of Speech, A; Or, Maybe 1984 Will Be a Good Year After All! (U)

Fourier Modulus Method of Cage Identification (U)

I I Tunnel Diode Dynamic Logic Module, A (U)

Transient Response of Tunnel Diodes With Resistive Loading

Tiltman, John H., Brigadier

Trade-off Approach to Quality Intercept Versus Quantity Intercept, A (U)

Addendum to "A Cryptologic Fairy Tale" (U)

Development of the Additive., The (U)

Double Transposition - A Special Case (U)

Experiences 1920-1939 (U)

Some Principles of Cryptographic Security (U)

Some Reminiscences (U)

I "TUNNY" Machine and Its Solution, The (U)

Vol. XIII, No. Satellite trajectory 1, Winter 1968

Vol. XXI, No. Keyword 4, Fall 1976 recognition

April 1960 Cryptanalysis

(b) (1) Summer 1961 Computers (b) (3)-50 USC

4 0 3 (b) (3: -18 USC

Vol. VII, No. Circuits 7 9 8 1, Winter (b) (3)-P.L.

1962 86-36

Vol. XXIII, SIGINT collection No. 1, Winter and processing 1978

Vol. XVIII, Cryptanalysi~ No. 1, Winter 1973

Vol. VII, No. Cryptologic history 2, Spring Germany 1962

4, Fall 1963

Vol. XVII, Cryptanalysis No. 4, Fall 1972

Vol. XVII, Cryptologic history No. 3, Summer 1972

Vol. XIX, No. Cryptographic 3, Summer security 1974

Vol. XI, No. Cryptanalysis 3, Summer 1966

Spring 1961 Cipher machines Germany

DOCID: 3020956 REF ID:A398598 9

Keyword Author Reference Title

Voynich Manuscript Most Mysterious Manuiscript in the World"

Vol. XII, No. 3, Summer 1967 and Special Linguistics Issue I1

Status of Optical Logic Elements for Nanosecond Computer Systems (U)

Vol. VIII, No. 3, Summer 1963

Computers

Vol. VIII, No. 2, Spring 1963

Mathematics Geometric Approach to Waveform Recognition, A (U)

Vol. X, No. 2, Spring 1965

Waveform recognition

So You Want to Correlate (U)

WARSAN 11 -An Implementation of the FFT and Other Tools for Digital Signals Analysis (U)

Special Issue, January 1971

Digital signals analysis

u Tordella, Louis W

I Tunnel Diode Dynamic Logic Module, A (U1

Summer 1961 Computers Logic

Selected SlClNT intelligence Highlights (U)

Vol. XIX, No. 4, Fall 1974

SICINT

Randomization Made to Order: "Random Numbers Are Too Important to be Left to Chance"

I (U)

Special Council of Learned Organization Issue, 1972

Cryptanalysis Randomization

Some Recent Vocoder Studies a t the National Security Agency 1 (U)

Vol. XIII, No. 2, Spring 1968

Vocoders

Graph Theory (L') Vol. XII, No. 3, Summer 1967

Mathematics

Cryptologic history Germany

Unknown I GEE System - 1, The (u) Fall 1961

Unknown GEE System - 11, The (L'1 Vol. VII, No. 1 , Winter 1962

Cryptologic history Germany

Vol. VII, No. 2, Spring 1962

Unknown Cryptologic history Germany

GEE System - 111, The (C')

Author I Title Reference Keyword

Unknown

Unknown

Unknown

Unknown

Unknown

Unknown reviewer

GEE System - IV, The (U) Vol. VII, No. Cryptologic history a 3, Summer Germany

1962

GEE WHIZZER (U) Val. VIH, NO. Cryptanalysis 1, Winter 1963

Instant Expertise (U) Vol. XII, No. Buzzwords 1, Winter 1967

Preliminary Historical Report Vol. IX, No. Cryptologic history on the Solution of the "B" 2, May 1964 Machine (U)

SIGINT System Logic (U) Vol. X, No. 2, SICINT Spring 1965

- - - - -

DOCID: 3020956 rn I -8

Book Reviews: Pearl Harbor: Vol. VIII, NO. Book review Warning and Decision, Roberta 1 , Winter Cryptologic history Wohlstetter; But Not in Shume, 1963 John Toland; The Secret War, Sanche de Gramont; CIA - The Inside Story, Andrew Tully; Now It Can Be Told, Leslie R. Groves; Thinking About the Unthinkable, Herman Kahn; Strike in the West, James Daniel and John G. Hubbell (U)

Patent Matters and the Vol. X, No. 3, Inventions Technical Employee (U) Summer 1965 Patents

Vol. XXIV, No. 4, Fall

Computers Encryption

Processes for Random and Vol. XXII, Sequential Accessing in No. 4, Fall

I977 Dynamic Memories (U)

1 Upgrading Selected U.S. Codes Vol. XXI, No. and Ciphers with a Cover and 1, Winter Deception Capability (U) 1976

Report of the Second Computer Vol. XIX, No. Study Group (C) 1, Winter

1974

Dynamic memory Mathematics

Ciphers Deception

Computer use NSA

:b) (1) (b) (3)-18 3SC 798 (b) (3)-P.L. 86-36

Various

REF ID:A398598 DOCID: 3020956 ,S-

Author I Title Reference Keyword

Some Observations on Vol. XVII, Cryptanalysis Computer Aids to Indicator No. 4, Fall Recovery (U) 1972

Data Management Challenge, Vol. XVI, No. Computers 1 The (U) 2, Spring Data management

I GEE System - V, The (lj)

Computer Processing of Natural Languages (U)

Spectral Analysis and the Fast Fourier Transform (U)

Vol. VII, No. Cryptologic history 4, Fa11 1962 Germany

Special Computers Council of Language processing Learned Organization Issue, 1972

Vol. XIV, No. Mathematics 1, Winter 1969

Way the Ball Bounces, The: An Experiment in Deconvolution Filtering (U)

Note on "Logarithmic Scoring and Preliminary Testing" (U)

UNNA - An Introspective Signal Processor (U)

Way the Ball Bounces, The: An Experiment in Deconvolution Filtering (U)

I Solution of a Fractionated Monome-Dinome System (U)

I Conjugate Codebooks (U)

I Selection and Placement of Cryptanalytic Personnel (L')

Labeled Oriented Graphs Which are Onto (U)

Special Issue, Mathematics January 1971

Vol. 11, No. 4, Mathematics October 1957

Vol. XX, No. Signal processing 2, Spring 1975

Special Issue, Mathematics January 197 1

Vol. 11, No. 2, Cryptanalysis April 1957

Vol. XXII, Cryptanalysis No. 3, Summer 1977

Fall 1960 Personnel

Vol. X, No. 1, Mathematics Winter 1965

DOCID: 3020956 9 5 9 8

f k ) ' ) - I . . bh-36

Author

Wild, Norman

Title Reference Keyword --

Centralized Computer Support Special Computer systems of Field Activities (U) Council of Field sites

Learned Organization Issue, 1972

Cryptanalysis in the German Vol. IV, No. Cryptanalysis Air Force (U) 2, April 1959 German air force

Content - Addressed Memories Vol. IX, No. Computers (U) 1, Winter Memory

1964

Strategy for Program Vol. XXII, Mathematics Decomposition for a Distributed No. 4, Fall Pipeline, A (U) 1977

Introduction to Diagnosis (U) Vol. XIII, No. Cryptanalysis 3, Summer 1968

Russian Diamond, A (U) Vol. XII, No. Russian navy codes 2, Spring 1967

Introduction To APL, An (U) Vol. XVI, No. Computers 4, Fall 1971 Cryptanalysis

Fundamentals of Majority Logic Vol. IV, No. Digital circuits (U) 4, October Logic

1959

LIGHTNING Program, ~ h e k Vol. VIII, No. Computers 1, Winter 1963

New Concept in Computing, A Vol. 111, No. Computing (u) 4, December

1958

Transient Analysis ofcoaxial Vol. I, No. 2, Coaxial cables Cables Considering Skin Effect July 1956 (U)

Machine-Aided Translation - Vol. XVIII, Machine translation Where Is It Today? (U) No. 2, Spring

1973 and Special Linguistics Issue, 11

DOCID: 3020956 9 3 9 8 5 9 8

S ~ G I N T ~ ~ ~ with SACO: Vol. XXI, No. Cryptologic history

1976

Magnetic Core Memories (U) Vol. 11, No. 1, Computers January 1957 Memory

ALRIGHT - A Map Overlay Vol. XI, No. Mapping Generator (U) 2, Spring

1966

Electronic Calligraphy (U) Vol. XI, No. Calligraphy 1, Winter 1966

Representing Data in Vol. 111, No. Data I , January representation 1958

"Food for Thought" in L V H F Vol. XX, No. L V H F c ollection

"MUFF1.ER BANDAID (LVHF and Vol XX, No H F Communications Aid) (U) 3, Summer

1975

Computer Applications: The Vol. XIX, No. Computers Insatiable Appetite of the 4, Fall 1974

Education in Diagnosis (U) Vol. XIV, No. Cryptanalysis 1, Winter 1969

Wireline Modem with Harmonic Vol. XXV, Communications Distortion Equalization, A ( C ) No. 2, Spring Modems

1980 and Special Mathematics and Engineering Issue, 1981- 1983

Receiving System Analysis (U) Vol. X. No. 1, Receivers Winter 1965

DOCID: 3020956 b) ( 3 ) - 5 0 USC 4 C 3 cdg) (b) jl ) $33-18 USC '98 {D)(3]-P.;. 86-36 (b)(3)-P.L. 86-36

Author

Wray, W. D.

Title Reference Keyword ppppp -

Integrated and Guided Wave Special Optics Optics and Device Applications Mathematics Signals processing (U) and

Engineering Issue, 1981- 1983

Matric Recursions (U) Vol. XXII, Mathematics No. 3, Summer 1977

Vol.XXIV, Computers ( b ) ( l ) No. 4, Pal1 Encryption (b) ( 3 ) -18 USC 1979 798

Processes for Random and Val. XXII, Dynamic memory Sequential Accessing in No. 4, Fall Mathematics Dynamic Memories (U) 1977

"Fingerprinting" Code Croups Vol. XVII, Bookbreaking by Computer (U) No. 3, Computers

Summer 1973

Revision - de novo, A (U) Vol. I, No. 3, Cryptanalysis October 1956

Matrix Business: Part 11, This Vol. 111, No. Mathematics (u) 3, July 1958

This Matrix Business (U) Vol. 111, No. Cryptanalysis 2, April 1958

This Matrix Business: Part 11 Vol. 111, No. Cryptanalysis (U) 4, December

1958

Vol. x x v , No. 4, Fall

Simulation of Cryptoprinciples Special Communications (U) Council of security

Learned Organization Issue, 1972

Community Impacts on NSA Vol. XXIII, Computers Systems (U) No. 3, Data processing

Summer 1978 Networking

I Mechanical Translation (U) Vol I, No. 1, Translation April 1956

DOCID: 3020956 9 3 9 8 5 9 8 (b)c3)-P.L. F6-36

Author I Title Reference Keyword

Zoebelein, Arthur J.

Supporting the Support Facilities (U)

I Correlation of Frequency of , Appearance of Military Unit 1 Addresses to Unit Echelon and 1 Combat Readiness Status (U)

Cepstrum Vocoder, A (U)

Vol. XVIII, Computer test No. 3, equipment Summer 1973

Vol. XVII, Military addresses No. 3. Summer 1972

Special Issue, Communications January 197 1

Crisis Management in the Vol. XXII. Crisis management National Senior Cryptologic No. 1, Winter Decision making Course (U) 1977

- - -- - -- -

DOCID: 3020956 REF ID:A398598

NSA

Technical

Journal KEYWORD

INDEX

DOCID: 3020956

NSA Technical Journal Indexed by Keyword

/

123

TOP SECHE'I' UlHRRA

Keyword

Addressing Systems

Advanced Weapons Systems

African Language

Aircraft Tracking

American Indian Language

Analog Computers

Analysis

Antenna Gain

Antennas

Reference

Vol. 11, No. 2, April 1957

Special Council of Learned Organization Issue, 1972

Vol. XI, No. 3, Summer 1966

Vol. XX, No. 1, Winter 1975

Fall 1960

Vol. VlI, No. 3, Summer 1962

Vol. XVII, No. 2, Spring 1972

Vol. XI, No. 3, Summer 1966

Vol. XXI, No. 3, Summer 1976

Vol. IV, No. 2, April 1959

Vol I., No.3, October 1956

Vol. X, No. 3, Summer 1965

Title

Assignment of Storage Space in Rapid-Access Memory Systems (U)

Computers and Advanced Weapons Systems (U)

African Language Problem a t NSA, The (U)

Asian Communist Aircraft Location Systems (U)

Phonemic Structure of Nootka, The (U)

Why Analog Computation? (U)

COMlNT Analysis and Reporting on the Developing Nations (U)

Example of Substantive Analysis, An (U)

Model 204 -The Analysts's Computer (LT)

Substantive Analysis (U)

Factors Affecting Required Antenna Gain in VHF Intercept (U)

Broadband Planar Log- Periodic Feed for the Spherical Reflector Used a t Arecibo lonospheric Laboratory (U)

Author

DOCID: 3020956

Keyword

Artificial Intelligence

Artificial Language

Astrodynamics

Astronomy

Basebands

Baudot Streams

Bayes Factors

Binary Stream

Bletchley Park

Book Review

Title Author Reference

Time Is -Time Was -Time Is Campaigne, Vol. X, No. 1, Past Computers for Howard H. Winter 1965 Intelligence (UI and

Computer and Information Science Issue

Vol. XI, No. 4, Fall 1966

Vol. XX, No. 1, Winter 1975

Vol. XIX, No. 1, Winter 1974

Vol. XXI, No. 2, Spring 1976

Vol. XXII, No. 1, Winter 1977

Vol. 11, No. 2, April 1957

Vol XII, No 1, Winter 1967

Vol. 11, No. 2, April 1957

Vol. X, No. 1, Winter 1965

Vol. VII, No. 4, Fall 1962

Vol. XXI, No.

Metalin: A Draft of a Metalanguage (U)

Geodetic Latitude and Altitude from Geocentric Coordinates (U)

Orbit Computation with the Vinti Potential and Universal Variables (U)

Orbit Fitting to Angular Data (U)

Maya Astronomical Computer, The (U)

Cornrnunications for oPeratiorj-&)

Bipolar Coding and Baseband Recovery (U)

Recurrent Events and Baudot Streams (U)

Apparent Paradox of Bayes Factors, The (U)

Distribution of the Maximum Bulge in a Flat Random Binary Stream, The (U)

Gweeks Had a Gwoupfor It, The (U) . 2, Spring

1976

Book Review: A History of Vol. IX, No. NSA General-Purpose 2, May 1964 Electronic Digital Computers (C-CCO)

Filby, P. W.

I Book Review: Basic Cryptologic Glossary (C)

Keyword

Book Review: Cloak & Lewis, Frank W. Cipher (U)

Title Author

Book Review: "Analyses of Campaigne, the Case n =3 in Algebraic Howard H. Cryptography with Involutory Key-Matrix and Known Alphabet" (Journal fur die Reine und Angewandte Mathematik) (U)

Rook Reuiew: Cryptanalysis Callimahos, of the Single Columnar Lambros D. Transposition Cipher (U)

Book Review: "IIow to Campaigne, Estimate Probabilities," Howard H. (Journal of the Institute of Mathematics a n d Its Application) ( U )

- -- --

DOCID: 3020956 REF IDzA398598 v

I

Book Review: "Involutory Campaigne, Commutants with Some Howard H . Applications to Algebraic Cryptography, I" ( Journal fiir Reine und Angewandte Mathernatik) (U)

Book Review: Lincos, Design of a Language for Cosmic Intercourse, Pa r t I (U)

Book Review: Lost Languages (L')

Book Review: Mathematical Statistics ( U )

Resolution of Linguistic 0 Book Review: Mechanical Campaigne, Howard H.

Problems (L')

Book Revlew: Military Campaigne, Cryptanalytics, P a r t I1 (U) Howard H.

125

'I'C)lJ S E C ~ U MBKA

Reference

Vol. IX, No. 3, August 1964

Vol. XI, No. 1, Winter 1966

Vol. VII, No 3, Summer 1962

Summer 1961

Vol. XII, No. 2, Spring 1967

Vol. XII, No. 1, Winter 1967

Vol. VII, No. 1, Winter 1962

Fall 1960

Vol. VII, No. 4, Fall 1962

Vol. 111, No. 4, December 1958

Vol. IV, No 4, October 1959

DOCID: 3020956

Keyword I Title Author

Book Review: Modern Probability Theory and Its Applications (U) n Book Review: Norse Medieval Cryptography in Runic Carvings ( U ) u

Reference

Fall 1960

Vol. XIII, No. 3, Summer 1968

Book Reviews. Pearl Harbor: Unknown Vol. VIII, No. Warning and Decision, reviewer 1, Winter Roberta Wohlstetter; But Not 1963 i n Shame, John Toland; The Secret War, Sanche de Gramont; CIA - T h e Inslde Story, Andrew Tully; Now It C a n Be Told, Leslie R. Groves; Thinking About the Unthinkable, Herman Kahn; Strike i n the West, James Daniel and John C. Hubbell ( U )

Book Review: Probability: An Introduction ( U )

Book Review. Recent Literature on Algebraic Cryptography ( U )

Book Review: "Some Applications of High Speed Computers to the Case n= 2 of Algebraic Cryptography," (Mathematics o f Computation), Vol. 15, No. 75

Book Review: "Some Further Campaigne, Methods in Algebraic Howard H Cryptography"; (Jaurnal o f the Mitchell Scientific Society, No. 74) (U)

Book Review: The Broken Callirnahos, Seal ( U ) Lambros D.

Book Review: TRATADO DE CRIITOCRAFIA (U)

I

Fall 1960

Vol. VII, No. 2, Spring 1962

Fall 1961

Fall 1960

Vol. XII, No. 3, Summer 1967

Vol. XI, No. 2, Spring 1966

Keyword I Title Author Reference

Bookbreaking

Buzzwords

Calligraphy

Callsign Generation

Celestial Mechanics

Book Review: "Variable Matrix Substitution in Algebraic Cryptography (U)

Bookbreaking Improvisations - Part I (U)

I Bookbreaking Improvisations - Part I1 (U)

Computer-Aided Bookbreaking of Two-Part Codes (U)

Faithful Mirror, The (U)

"Fingerprinting" Code Groups by Computer (U)

Frame versus Corpus (U)

Repagination? (U)

1 Some Problems and Techniques in Bookbreaking / IUI

Campaigne. Vol. IV, No. Howard H. 4, October

1959

-

DOCID: 3020956 - p * * 3 9 8 5 9 8 B A*

Vol. XI, No. 3, Summer 1966

Vol. XI, No. 4, Fall 1966

Vol. XVII, No. 2, Spring 1972

Vol. XIV, No 1,Winter 1969

Vol. XVII, No. 3, Summer 1972

Vol. XVII, No. 1, Winter 1972

Vol. XVIII, No. 4, Fall 1973

Vol. XI, No. 1, Winter

A 1966

Instant Expertise (U) Unknown Vol. XII, No. I , Winter 1967

Electronic Calligraphy (U) Vol. XI, No. 1, Winter 1966

"Maybe It's Related to the Phase of the Moon" (C')

Maximum Likelihood Estimation of an Orbit (U)

Vol. XVII, No. 4, Fall 1972

Fall 1961

DOCID: 3020956 -598 fb)13)-P.L. 86-36

Keyword Title

Channels (bl ( 1 ( K ( 3 - I L usc 4 J S

1 ' - l K l l ' 77P

Chi-Squares I On Comparing Two Observed Frequency Counts (U)

Channel Modeling and Code Performance Evaluation (U)

( k ( 3 - > . L . ti(-36

Chatter

Some Notes about Chi- Square (U)

Chatter Patterns: A Last Resort (U)

With Love (and Parentheses) from Peking (U)

Chinese Language

Narrow-Band Speech Security (U)

Note on Chinese Language Reform and NSA, A (U)

Cipher Equipment

Cipher Machines

Author

Wild. Norman

Reference

Vol. XXIII, No. 2, Spring 1978 and Special Mathematics and Engineering Issue, 1981- 1983

Vol. 11, No. 4, October 1957

Vol. 111, No. 2, April 1958

Vol. VIII, No. 3, Summer 1963

Vol. XXlV No. 1 Winter 1979

Vol. I, No. 2, July 1956

Vol. XII, No. 1, Winter 1967

Vol. Ill, No. 4, December 1958 and Special Linguistics Issue

Simultaneous Error Meyer, Joseph A. Vol. XIV, No. Insinuation in Electronic 1, Winter Cipher Machines (U) 1969

"TUNNY" Machine and Its Tiltman, John H., Spring 1961 Solution, The (U) Brigadier

Vol. XIII, No. Introduction t 1, Winter

1968

D o C 4 ~ & , - 3 ~ 0 & & 9 5 6 REF I D : A 3 9 8 5 9 8 9

Keyword Title Author Reference

Representative Machine Callimahos, Vol. 111, No. Cipher Systems (U) Lambros D. 1, J a n u a r y

1958

Ciphers Analytic Computer Technique fbr Anagrarnrning Columnar Transposition (U)

Attack on Blair-Huffman Encipherments, An (U)

Boer War Cipher, A (UI

Cipher Signal Phase Modulation (LT)

Cryptanalyst's Nightmare: An Oneiroic Problem and its Solution, A (U)

Callirnahos, Lambros D.

Vol. VIII, No. 2, Spring 1963

Spring 1961

Vol. X, No. 3, Summer 1965 and Vol. X, No. 4, Fall 1965

Vol. XIV, No. 2, Spring1 969

Vol. XVI, No. 4, Fall 1971

Development of the Additive, Tiltman, John H., Vol VIII, No. The (U) Brigadier 4, Fall 1963

Distribution of Letters in -1, and Vol. XIV, No. Short Messages of English, Howard H. 2, Spring1969

( T h e (U) Campaigne ib i ( 3 )

OG A New Approach to the One- Vol. XIX, NO. Time Pad, A (U) 3, Summer

1974

No, Not Again! IU) Callimahos, Vol. I, No. 1, Lambros D. April 1956

Note on a Solutionofa Vol. 1, No. 3, Polyalphabetic Dinome October 1956 System, A (U)

On Cipher (U) I I January 1960

Q.E.D.-2 Hours, 41 Minutes Callimahos, Vol. XVIII, (U) Lambros D. No. 4, Fall

Simple Homogeneity Test Vol. VIII, No. Using Log-Factors, A (U) 4, Fal l 1963

I

Tetrahedral Plugging (U) I I ~ ~ ~ ~ h N O .

DOCID: 3020956 9 9 8 ( b 8 , 3 , - i , L . 8 6 - 3 6

Keyword I Title Author Reference

Unbreakable Cipher, The (U) Campaigne, Spring 1961 Howard H.

Ciphony

Upgrading Selected U.S. Codes and Ciphers with a Cover and Deception Capability (U)

I ABC of Ciphony, The (U)

Circuits

Circuit Analysis

Civil War

Computer Automation of Circuit Analysis (U)

Analysis of a Transistor Monostable Multivibrator (U)

Development of Automatic Telegraph Switching Systems (U)

Hybrid Circuits (U)

Low Cost Process for Printed Circuits, A (U)

Modification of a Phantastron Generator, A (U)

I New Mode of Operations in Junction Transistors, A (U)

Note on "A Low Cost Process for Printed Circuits" (U)

Transient Response of Tunnel Diodes with Resistive Loading (U)

Transistor Phantastrons (U)

Rocheford's Cipher: A Discovery in Confederate Cryptography (U)

Vol. XXI, No. 1, Winter 1976

Vol. I, No. 2, July 1956 and Special Linguistics Issue

Vol. VII, No. 4, Fall 1962

Vol. IV, No. 3, July 1959

Vol. 11. No. 3, July 1957

Vol. 111, No. 1, January 1958

Vol. 11, No. 1, January 1957

Vol. IV, No. 4, October 1959

Vol. 11. No. 3, July 1957

Vol. 11. No. 3, July 1957

Vol. VII, No. 1, Winter 1962

Vol. IV, No. 2, April 1959

Gaddy, David W. Vol. XVIII, No. 4, Fall 1973

DOCID: 3020956

Keyword

Cluster Analysis

Coaxial Cables

Code

Code Generation

Code Groups

Codes

REF IDzA398598 9

I Title Author Reference

Application of Cluster D'Imperio, Mary Vol. XXIII, Analysis and E. No. 3, Multidimensional Scaling to Summer 1978 the Question of "Hands" and "Languages" in the Voynich Manuscript. An (U)

Transient Analysis of Coaxial Cables Considering Skin Effect (U)

Bookbreaking Improvisations - Part I (U)

Bookbreaking Improvisations - Part 11 (U)

Generating Random Characters on a Computer (U)

"Typewriter" Key and the Stereotype, The (U)

Bipolar Coding and Baseband Recovery (ti)

Vol. I, No. 2, July 1956

Vol. XI, No. 3, Summer 1966 and Vol. XI, No. 4, Fall 1966

Vol. XI, No. 3, Summer 1966 and Vol. XI, No. 4, Fall 1966

Vol. XII, No. 1, Winter 1967

Vol. IV, No. 4, October 1959

Vol. XII, No. I , Winter 1967

Computers -The Wailing Meyer, Joseph A. Vol. I, No. 3, Wall (U) October 1956

Don't Be Too Smart (U) El January 1960

I How the Germans Broke a Fall 1960 1 U.S. Code (U)

"It Is Obvious Tha t . . .": A Lewis, F. W. Vol. 111, No. Painless Approach to 2, April 1958 Cryptanalytic Diagnosis (U)

I Multilingual Codes (U) Vol. X, No. 4, Fall 1965

Report on the Keyword Kullback, Vol. IV, No. System, A (U) Solomon, and F. 3, July 1959

W. Lewis

DOCID: 3020956 -98

(33 ( 3 ) - P . L . 36-36

Coding

Collection

Keyword Title

Use of Production Methods in Reading Transposed Letter Codes (U)

Utilization of Code Limitations in Solving Bust Messages (U)

With Love (and Parentheses) from Peking (U)

ABC of Ciphorly, The (U)

Another Derivation of Binary Error Rates as a Function of Signal-to-Noise Power Ratio for Various Modulation Schemes (U)

Broadband Planar Log- Periodic Feed for the Spherical Reflector Used a t Arecibo Ionospheric Laboratory (U)

CATNIP: Computer Analysis - Target Networks Intercept Probability (U)

Collection of LINCOMPEX Signals (U)

Cost-Effectiveness Study of Spectrum Surveillance Systems, A (U)

Digitizer Queuing Model for FROSTING (U)

Author

u

Reference

Vol 11, No. 1, January 1957 and Special Linguistics Issue

January 1960 and Special Linguistics Issue

Vol. XII, No. 1, Winter 1967

Vol. I, No. 2, July 1956 and Special Linguistics Issue

Vol. X, No. 3, Summer 1965

Vol. X, No. 3, Summer 1965

Val. XVI, No. 1, Winter 1971

V O ~ . XVH, No. 2, Spring 1972

Vol. XIV, No. 3, Summer 1969

Vol. XIV, No.

Experimental Approach to an

4, Fall 1969

Vol. VIII, No. Environment Study in the 4, Fall 1963 H F Band (U)

DOCID: 3020956 REF IDzA398598 9

Keyword Title Author Reference a

Vol. XX, No 2, Spring

~1%- 1975

Minimizing Noise Effects in Vol. 11, No. 2, PCM (U) April 1957

On Milking the Sacred Cow Vol. XVII, (U) No. 2, Spring

1972

Potential of Tropospheric Vol. XX, NO Ducting a s a Collection 1, Winter Technique, The ( C ) 1975

RAKE System for V O ~ . X, NO. 4, Tropospheric Scatter, A (U) Fall 1965

RF Interference Phenomenon Vol XXIIE, and Intelligence Applications No. 4, Fall (u) 1978

Security Architecture in Meyer, Joseph A., Vol. XX, No. SICINT Collection and J r . 1, Winter Processing (U) 1975

Statistical Description of the Vol. X, No. 4, Noise and Emitter Fall 1965 Environment, A (U)

Collection Management Collection Management (U) Vol. XIV, No. 1, Winter 1969

COMINT COMINT Analysis and vol. XVH, Reporting on the Developing No. 2, Spring Nations (L') 1972

COMINT Signals Trends- vof. x x v , e€w No. 2, Spring

1980

Communications Intelligence Anonymous Vol. 11, No. 2, (u) April 1957

Future Problems of Intercept Gerson, Vol. VIII, No. (u) Nathaniel C. 1, Winter

1963

Language and the C ~ M I N T Vol. XIX, No. Production Process (U) 3, Summer

1974

DOCID: 3020956 lb) ( 3 1 - P . L . 8 6 - 3 6

Keyword I Title Author Reference --

Language Files: A Basic Salemme, Arthur Vol. IV, No. 2 COMINT Aid (U) J . April 1959

COMINT Target Identification

Analysis of Sorting Techniques for Multiple Signal Intercept (U)

Communications I ABC of Cifax, The (U)

Analysis of Lexical Meaning across Cultures, An (U)

Book Review: Lincos, Design of a Language for Cosmic Intercourse, P a r t I (U)

Can We Lick the Voice Problem? f U )

Vol. XII, No. 3, Summer 1967

Vol. I, No. 2, J u l y 1956

Vol. XIU, No. 4, Fall 1968

Vol. VII, No. 1, Winter 1962

Vol. XVII, No. 3, Summer 1972

I Capture-Jammingof SICINT Meyer, Joseph A. Vol. XII, No. Targets (U) 2, Spring

1967

Cepstrum Vocoder, A (U) I Channel Modeling and Code Performance Evaluation (U)

Special Issue, January 1971

Vol. XXIII, NO. 2, Spring 1978 and Special Mathematics and Engineering Issue, 1981- 1983

COMINT - Hard Facts in the Meyer, Joseph A. Spring 1961 Cold War (U)

Communications for Vol. [I, No. 2, Operation]-: j h April 1957

Communications with Callimahos, Vol. XI, No. Extraterrestrial Intelligence Lambros D. 1, Winter (u) 1966

h 4

Computer Simulation of the Vol. XXV, Vulnerability of Frequency No. 4, Fall Hopping Communications 1980

I - - -

Systems to a Follower Jammer (U)

DOCID: 3020956 REF ID:A398598

ibl (31-P.L. 86-36 7

Keyword Title Author Reference

Cover and Deception (U)

Creation of an Artificial Ionosphere to Extend the Radio Horizon for Frequencies Below 100 MC, The (U)

Curiosa Scriptorum Serihorum: To Write But Not to Communicate (U)

Developments in the Automatic Acquisition and Translation of Hand-Keyed Morse Code ( C )

Extraterrestrial Intelligence Campaigne, Howard H.

How Can the Communications Sciences Contribute to the Study of Natural Systems? (U) I Intercept System Analysis (U)

Introduction to Magnetic Tape Recording and Its Use in Intercept Activities, An (U)

Introduction to Psycholinguistics, Paralinguistics, and Kinesics, An, (U) u Ionospheric Propagation (U) Gerson.

mand Key to the Extraterrestrial Campaigne, Messages (U) Howard H.

Vol. IV, No. 3 July 1959

Vol. XI, No. 2. Spring 1966

Vol. XVI, No. 3, Summer 1971

Vol. XXIV, No. 1, Winter 1979

Vol. XI, No. 2, Spring 1966

Vol. VIII, No. 3, Summer 1963

Vol. XI, No. 2, Spring 1966

I

Vol. I, No. 3, October 1956

Vol. XII, No 2, Spring

Vol. 111, No. 4, December 1958

Vol. XIV, No. 1, Winter 1969

135

TOP -A

DOCID: 3020956 REF IDgA398598 T-

(5) ( 3 ) -J. I , . 36-36

Keyword I Title Author Reference

! C ) (1) :k) (3)-% WSC 103 ,k) (>)-I8 :JSf: i9H (b) i . 3 ) - P . I , . 86-36

Linguistic Canonical Forms: Tools for Analytic Progress

Markov Models for Phonetic Text (U)

Noise Communication Technique for Speech (U)

1 operat ion VANGUARD

Preamble for Push-to-Tal k Ciphony, A (U)

Range Dependence on System Temperatures (U)

Role of Carrier (VCh) Telephony in Soviet World War 11 Strategic Communications (U)

Soviet Communications Journals a s Sources of Intelligence (U)

Systems Approach to Training Radiotelephone Technicians, The (U)

Wireline Modem with Harmonic Distortion Equalization, A (U)

Vol. XIII, No. 1, Winter 1968 and Special Linguistics Issue 11

Vol. XVIII, No. 1,Winter 1973

Vol. VII, No. 4, Fall 1962

Vol. I, No. 2, Ju ly 1956

Vol. XII, No. 2, Spring 1967

Vol. IV, No. 1, January 1959

Vol. XIX, No. 3, Summer 1974

Vol. IX, No. 3, August 1964

Vol. XXV No. 4.Fall 1980

Vol. XVIII, No. 1 ,Winter 1973

Vol. x x v , No. 2, Spring 1980 and Special Mathematics and Engineering Issue, 1981- 1983

DOCID: 3020956 REF IDzA398598 P

(b) : 3 ) - P . L . 86-26

Keyword Title Author Reference

Comfiunications COMINT Satellites - A Space Val. IV, No. Satellites Problem (L') 4, October

1959

Communications Simulation of Special Security Cryptoprinciples (LT) Council of

Learned Organization Issue, 1972

Communist China Red China's Drive for Vol. XVI, No. Literacy (U) 2, Spring

1971

Compilers Compiler Object Code Vol. XVII, Optimization No. 1, Winter

1972

Computer Analytic Computer Vol. VIII, No. Technique for Anagramming 2, Spring Columnar Transposition (U) 1963

FIR: A CDC 1604 Program Vol. X, No. 1, for Solution of Systems of Winter 1965 Linear Equations (U)

Insolvable Problem, An (U) Jacobs, Walter Vol. VIII, NO. W. 3, Summer

1963

Computer Cryptanalysis Solving a Playfair Cipher by Vol. XIV, No. Computer (U) 4, Fall 1969

Computer Diagnostics Reliability and Checking in Vol. 11, No. 4, Computing Systems (U) October 1957

Computer Graphics Example of Computer Vol. XXII, Graphics as Applied to Key No. 1, Winter Analysis, An (U) 1977

Inexpensive Device for January 1960

Computer Language

Pictorial Input and Output, An (U)

Some Graphical Display Techniques for Fourier Analysis (U)

APL Mechanization of Indirect Symmetry (U)

pecial Issue, anuary 1971 U 01. 0. 3, XVII,

DOCID: 3020956 REF ID:A398598 9

Keyword

Computer Operating Systems

Computer Processing

Computer Programming

Computer Security

Computer Systems

Title Author Reference -

SPECOL: A New AND. OR, NOT Language for Use with Computers (U)

OVERLORD, the Programmer's Friend: An Extension of the -

Vol. XII, No. 1, Winter 1967

Vol. XXII. No. 2, Spring

IDASYS Operating System (U) 1977

~ 1 ~ 1 ~ T C o r n p u t e r Processing Phillips, Cecil Voi. XXII, in the 1980s (U1 No. 2, Spring

Computer Graphics in an Vol. XVII, Engineering Simulation No. 2, Spring Program (U)

Help Stamp Out

0 1::: Jacobs, Walter Vol. XIV, No.

Programming (U) W. 3, Summer 1969

Introduction to Programming Vol. 11, No. 3, of a Digital Computer (U) July 1957

Programmatic Control of Vol. XVII, Parallel Processes (U) No. 2, Spring

1972

Reading a Depth by Jacobs, Walter Vol. X, No. 2, Computer (U) W. Spring 1965

RYE, an Extended Capacity Remote Access System (U)

Scaling Matrix for the Analog Computer (U)

Thoughts about Systems and Program Design (U)

Designing Secure Reliable Software - A Methodology (U)

Centralized Computer Support of Field Activities

Vol. IX, No. 2, May 1964

Vol. VII, No. 1, Winter 1962

Vol. XVIII. No. 2, Spring 1973

Vol. XXI, No. 4, Fall 1976

Special Council of

(U) Learned Organization Issue, 1972

DOCID: 3020956 -A398598

Keyward I Title Author Reference

Computer Test Equipment

Scheduling Function in a Time-Sharing Environment, The (U)

Supporting the Support Facilities (U)

Computer Working Aids

Computer Use

Computers

Report of the Second Computer Study Croup (U)

Reverse Sort Machine Listings (U)

ABNER: The ASA Computer Part 1: Design (U)

ABNER: The ASA Computer Part 2: Fabrication, Operation, and Impact (U)

Vol. XVI, No. 2, Spring 1971

Various Vol. XIX, No. 1, Winter 1974

Vol. XVIII. No. 1,Winter 1973

Snyder, Samuel Vol. XXV, S. No. 2, Spring

1980

Snyder, Samuel Vol. XXV, S. No. 3,

Summer 1980

Application of Human Factors to the Specification and Design of Interactive Computer Systems (U)

Application of Queuing Theory to Computer Systems, An (U)

APT System, The (U)

Aristocrat - An Intelligance Test for Computers (U)

Assignment Algorithm Applied to Manual Cryptosystems (U)

Association Factor in Information Retrieval, The (U)

Vol. XVIII, No. 3, Summer 1973

Vol. XXIV, No. 4, Fall 1979

Vol. XIV, No. 2, Spring 1969

Vol. XXIII, No. 3, Summer 1978

Campaigne, Vol. VII, No. Howard 2, Spring

1962

Val. XX, No. 1, Winter 1975

Winter 1961

Automatic Maintenance (U) Meyer, Joseph A. Vol. IX, No. 1, Winter 1964

DOCID: 3020956

(b) ( 3 ; - P . L . 86-36

Keyword I Title Author Reference

Birth of ATLAS I (U)

Book Review: A History of NSA General-Purpose Electronic Digital Computers

Book Review: Mechanical Resolution oTLinguistic Problems (U)

CAM I1 (U)

CAMINO (U)

Vol. XVIII, No. 1,Winter 1973

Vol. IX, No. 2, May 1964

Campaigne, Vol. 111, Howard H. No. 4.

December 1958

r l Vol. IX, No. 2, May 1964

Cleaning the Augean Stables or How Much TA Can a Computer Do? (U)

Climbing Jacob's Ladder (U)

Communications Security and Computers (U)

Community Impacts on NSA Systems (U)

Computer-Aided Bookbreaking of Two-Part Codes (U)

Computer Applications: The Insatiable Appetite of the Analyst (U)

Computer Automation of Circuit Analysis ( U )

Vol. XIII, No. 3, Summer 1968

Vol. XII, No. 3, Summer 1967

Special Council of Learned Organization Issue, 1972

Vol. XXIII, No. 3, Summer 1978

Vol. XVII, No. 2, Spring 1972

Vol. XIX, No. 4, Fall 1974

Vol. VII, No. 4, Fall 1962

DOCID: 3020956 REF IDzA398598 P

(k) i ' , - P L. 86-36

Keyword

ib) (1) i h ) (3)-50 IJSC 403 (b) (3)-P.L. 86-36

Title

Computer Processing of Natural Languages (U)

Com~ute r Processing of l~e lemet ry (U)

Computer Program Debugging: A New Era (U)

Computer Scripting (U)

Computer Sorting (E)

Author Reference

Special Council of Learned Organization Issue, 1972

Vol XIII, No. 3, Summer 1968

Vol. X111, No. 2, Spring 1968 and Special Computer and Information Sciences Issue

Vol. XXIV, No. 1 Winter 1979

Vol. XIII, No. 3, Summer 1968

Computer, There Is Thy Salemme, Arthur Vol. XVI, No. Sting! (U) J. 4, Fall 1971

Computer Transcription of Manual Morse (U)

Computerized Depth Reading (U)

Computers and Advanced Weapons Systems (U)

Computers and Linguists Do Mix (U)

Computers and Queues (U)

Vol. 111, No. 3, July 1958

Vol. XVII, No. 1, Winter 1972

Special Council of Learned Organization Issue, 1972

Vol. XVI, No. 3, Summer 1971

January 1960

DOCID: 3020956

Keyword I Title

Memories (U)

Convolutions, Cube Roots, I and Computer Cryptography (U) I Cryptanalytic Use of High- Speed Digital Computing Machines (U)

Data Management Challenge, The (U) I

Author Reference

Vol. IX, No. 1, Winter 1964

Vol. XVIII, No. 3, Summer 1973

Vol. X, No. 1, Winter 1965

Vol. IX, No. 3, August 1964

Vol. XVI, No. 2, Spring 197 1

Data Structures and Their D'Imperio, Mary Vol. IX, No. Representation in Storage. 3, August Pa r t I (U) 1964

Data Structures and Their D'Imperio, Mary Vol. IX, No. Representation in Storage: 4, Fall 1964 Par t I1 (U)

Debugging Made EasierlU) Vol. 111, No. 4, December 1958

Dialect: A Data Type fo r t he Vol. XXII, Person-Machine Interface No. 2, Spring (U) 1977

Earliest Applications of the Snyder, Samuel Vol. XVIII, Computer a t NSA (U) S. No. 1,Winter

1973

Extensible Model of a Hand Vol. XXiII, Cryptosystem, An (U) No. 1, Winter

1978

Famous First Facts, NSA, Snyder, Samuel Vol. XVII, Pa r t I: Pre-Computer ' S. No. 4, Fall Machine Cryptanalysis (U) 1972

"Fingerprinting" Code Groups by Computer (U)

I

Vol. XVII, No. 3. Summer 1972

DOCID: 3020956 TOP -98598

Keyword Title Author Reference

Foreign VS. U.S. Computers. An Appraisal (U)

Frame versus Corpus (U)

Generating Random Characters on a Computer ( C )

Special Council of Learned Organization Issue, 1972

Vol. XVII, No. 1, Winter

Vol. XII, No. 1, Winter 1967

Graceful Degradation I ( Vol XXIII, through Distributed No. 3,

Summer 1978

Growing up at NSA(U)

with Computers Eachus Joseph, Special

L 2 Council of Learned Organization

Jacobs, E. Dale Issue, 1972 Marston, Charles J. Schierlmann, Samuel S. Snyder; Moderator, Howard H. Campaigne

Human-Machine Interfaces for NSA Computer Systems (LT)

Information Theory Applied to Computer Data Compression (U)

Introduction to APL, An (U)

Introduction to Computer Binary Arithmetic, An (C)

D'Imperio, Mary E .

Vol. XXIV No. 4 Fall 1979

Vol. XXIII, No. 4, Fall 1978 and Special Mathematics and Engineering Issue, 1981- 1983

Vol. XVI, No. 4, Fall 1971

Vol. 111, No. 2, April 1958

DOCID: 3020956 REF IDzA398598 : ( b ~ ( 3 ; - P . ! . 86-36

Keyword Title Author Reference

- Introduction to the Fast Special Issue, Fourier Transform, An (U) January 1971

LIGHTNING (U) Campaigne, Vol. IV, No. Howard H. 3, July 1959

LIGHTNING Program, The Vol. VIII, No. 1, Winter 1963

Magnetic Core Memories (U) Vol. 11, No. 1, January 1957

Mathematics and Computers Special in Cryptanalysis (U) Council of

Learned Organization Issue, 1972

i b ) (1) (b) ( 3 ) - P . L . 56-36 V O ~ . XXIv,

No. 4, Fall 1979

Model 204 -The Analyst's Vol XXI, No. Computer (U) 3, Summer

1976

MP-14: Unlimited Random Vol. XVII, Source (U) No. 3,

Summer 1972 8

On Operatorless Computers Vol. I., No. 1, (u) April 1956

Operation Babel (U) Vol. IV, No. 3, July 1959

Optimum Use of Log Weights Vol. IX, No. (U) 3, August

1964

Potential of Interactive Vol. XXV No. Computer Programs in the 3, Summer Decryption Process of SIGINT, 1980 T h e - W H B F

Program for Correcting Vol. IV, No. Spelling Errors, A (U) 4, October

1959

DOCID: 3020956 9 9 8 5 9 8

Key word I Title Author Reference

Restraining Barrier as Applied to the Biased Binary Counter (U)

Rationale for and Preliminary Implementation of HYPERCAN (High - Performance Cryptanalysis) (U)

Redundancy Exploitation in the Computer Solution of Double-Crostics (U)

Repagination? (Li)

Special Purpose Cryptanalytic Computers: State of the Art (U)

Vol. 111, No. 2, April 1958

Vol. XXIII, No. 4, Fall 1978

Vol. VII, No. 2, Spring 1962

Vol. XVIII, No. 4, Fall 1973

Vol. XXIII, No. I , Winter 1978

Status of Optical Logic Vol. VIII, No. Elements for Nanosecond 3, Summer Computer Systems (U) I I 1963

Study of Character-Handling D'Imperio, Mary Vol. XIV, No. by Computer at NSA, A (U) E. 2, Spring

1969

"Take Care of Your Pennies. Vol. 111, No. . . (U)" 1, January

Technology of Future Vol. XXV, Powerful Personal No. 3, Computers, The (U) Summer 1980

TEMAC (Text Macro D'Imperio, Mary Vol. X, No. 3, Compiler): A Machine Summer 1965 Language for Processing and Text (U) Computer

and Information Science Issue

DOCID: 3020956

Keyword

Computing

COMSEC

Cribbing Techniques

REF ID:A398598 9

I Title Author Reference

Time Is -Time Was -Time Is Campaigne. Vol. X, No. 1, Past Computers for Howard H. Winter 1965 Intelligence (U) and

Computer and Information Science Issue

Tunnel Diode Characteristic Function Generator (U)

Tunnel Diode Dynamic Logic Module, A (U)

Under-Developed Languages, Under-Utilized Computers (u) I "Word Spotter, A" (U) I Introduction to Log-Linear Models in Cryptanalysis (Ul

New Concept in Computing, A (U)

Communications Security and Computers (U)

COMSEC a t RID S i t e s R Gerson, Nathaniel C.

TEMPEST Considerations in Automatic Data Processing n Equipment Installations (U)

Weather or Not - Encrypted? I

Vol. VIII, No. 1, Winter 1963

Summer 1961

Vol. XX, No. 1, Winter 1975

Vol. IV, No. 4, October

Vol. x x v , No. 2, Spring 1980

Vol. 111, No. 4, December 1958

Special Council of Learned Organization Issue, 1972

Vol. VII, No. 4, Fall 1962

Vol. XIV, No. 1, Winter 1969

Vol. XII, No. 4, Fall 1967

Some Cribbing Techniques Vol. XXIII, (U) No. 1, Winter ( 1978

DOCID: 3020956 REF IDrA398598 w

Telecommunications from the Torn-Tape to the

.,Computer (L!)

I

Special Council of Learned Organization Issue, 1972

Keyword Title Author Reference

I Analysis of Digital Plaintext Autokey Systems. The (U)

Cryptanalysis

Apparent Paradox of Bayes Factors, The (L')

Crisis Management

Addendum to "A Cryptologic Tiltman, John H. , Vol. XVIII, Fairy Tale" (U) Brigadier No. 1, Winter

1973

Callimahos, Lambros D.

.Crisis Management in the Zoebelein, Vol. XXII, National Senior Cryptologic Arthur J. No. 1. Winter Course (U) 1977

Vol. XIV, No. 2, Spring 1969

Vol. X, No. 1, Winter 1965

Vol. XIX, No. 4. Fall 1974

Vol. XXIV, No. 3, Summer 1979

Aristocrat - An Intelligence Test for Computers (L')

Assignment Algorithm Applied to Manual Cryptosystems (U)

Bayes Marches On (L)

Birth of ATLAS I (LT)

Carnpaigne, H. Vol. VIl, No. 2, Spring

1 1962

Vol. XX, No. 1 , Winter 1975

January 1960

Vol. XVIII, No. 1,Winter 1973

(b) (11 (b) ( 3 ) - 5 0 USC 4 0 3 (b) ( 3 ) - P . L . 8 6 - 3 6

DOCID: 3020956

Keyword Title Author

Book Review: "Analyses of Campaigne, the Case n = 3 in Algebraic Howard H. Cryptography with Involutory Key-Matrix and Known Alphabet" (Journal fur die Reine und Angewandte Mathematik) (U)

Book Reuiew: Cloak & Lewis, Frank W Cipher (U)

Book Review: Cryptanalysis Callimahos, of the Single Columnar Lambros D. Transposition Cipher (U)

Book Review: Military Campaigne, Cryptanalytics, Part I1 (U) Howard H.

Capture-Jamming of SIGINT Meyer, Joseph A. Targets (U)

Reference

Vol. IX, No. 3, August 1964

Vol. VII, No. 3, Summer 1962

Summer 1961

Vol. IV, No. 4, October 1959

Vol. XII, No. 2, Spring

Classes of Rotors without Parallels (U)

Computer Generation of Unrelated Latin Squares (U)

Computerized Depth Reading (U)

Computers -The Wailing Wall (U)

Val. X, No. 4, Fall 1965

Vol. X, No. 3, Summer 1965

Vol. XVII, No. 1, Winter 1972

Meyer, Joseph A. Vol. I, No. 3, October 1956

Cryptanalysis in the German Air Force (U)

Conjugate Codebooks (U)

Coupon Collecting and Cryptology (U)

Vol. IV, No. 2, April 1959

Vol. XXII, No. 3, Summer 1977

Vol. XI, No. 4, Fall 1966

I I

Cryptanalysts Nightmare: Callimahos, Vol. XVI, No. , An Oneiroic Problem and Its Lambros D 4, ~ ~ ~ ( g $ % i -At3 usc Solution, A (U) (bi ( 3 ) - P . L . E

DOCID: 3020956 -398598

Keyword 1 Title Author Reference

Cryptanalytic Applications of Sequential Analysis (U)

Cryptanalytic Use of High- Speed Digital Computing Machines (U) I CXCO Story, The (U)

Cybernetics and Problems of Diagnostics: the Parallels between Medicine and Cryptanalysis (U)

Callimahos, Lambros D.

Vol. IX, No. 3, August 1964

Vol. IX, No. 3, August 1964

Vol. XVI, No. 4, Fall 1971

Vol. XIV, No. 1 ,Winter 1969

Double Transposition - A Tiltman, John H., Vol. XVII, Special Case (U) Brigadier No. 4, Fall

1972

I Education in Diagnosis ILJ)

Euclidean Algorithm and Distances between Wheel Settings, The (U)

Extensible Model of a Hand Cryptosystem, An (U)

Extreme Values in Cryptanalysis (U)

Vol. XIV, No. 1, Winter 1969

Vol. VIII, No. 1, Winter 1963

Vol. XXIII, No. 1, Winter 1978

Vol. IV, No. 4, October 1959

Fallacy of the One-Time-Pad Lewis, Frank W. Excuse, The (U)

Fourier iVIodulus Method of Cage Identification (u) n - Garden Paths 1 Have Lewis, Frank W. Followed (U)

GEE WHIZZER (U) Unknown

Vol. XIV, No. 3, Summer 1969

April 1960

Vol. IX, No. 3, August 1964

Vol. VIII, No. 1, Winter 1963

DOCID: 3020956

Keyword Title

German Tires and Black Cats: Estimation of Population Size (U)

Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Scaling, The (U)

I How to Choose a Good Crib (U)

International or Cross- Country Depths (U)

Introduction to APL, An (U)

Introduction to Diagnosis (U) 3

Author Reference

Vol. XIX, No. 3, Summer 1974

Vol. XXI, No. 4, Fall 1976

Vol. X, No. 4, Fall 1965

Vol. I, No. 3, October 1956

Vol. XVI, No. 4, Fall 1971

I Introduction to IBM Methods Callimahos, Vol. 11, No. 3, in Cryptanalysis. An (U) Lambros D. July 1957

Introduction to Log-Linear Models in Cryptanalysis (U)

Logarithmic Scoring and Preliminary Testing (U)

Long and Short of Single Transpositions, The (U)

Magic Digraphs (U)

I Mechanical Treatment of Fibonacci Sequences, A (U)

Method of Recovery of Fibonacci Key, A (U)

1 Mickle-Muckle Principle in Hagelin ~ r y ~ t a n a l ~ s i s , The I (LI

Vol. x x v , No. 2, Spring 1980

Vol. 11, No. 1, January 1957

Vol. XXI, No. 2, Spring 1976

Vol. XII, No. 1, Winter 1967

Vol. 11, No. 4, October 1957

Vol. I, No. 3, October 1956

Vol. IX, No. 4. Fall 1964

I Modified Normal Curves (U) Spring 1961

DOCID: 3 0 2 0 9 5 6 98598

Keyword Title Author Reference

MP-14: Unlimited Random Vol. XVII, Source (U) No. 3,

Summer 1972

Notes on Chi-square in Vol. 11. No. 3, Cryptanalysis (U) July 1957

Number of Components in Vol. IV, No. Random Linear Graph, The 2, April 1959 (U)

On Cryptanalysis and Vol. IV, No. , Redundancy (U) July 1959

On Key Analysis (U) Callimahos, Vol. XIX, No. Lambros D. 4, Fall 1974

On Tests of Sequences (U) Kullback, Vol. VII, No. Solomon, and 1, Winter

1962

On the Expected Number of Val. VIII, No. Random Stops Corresponding 1, Winter to a Given Menu (U) 1963

On the Maximization of X.AX Vol. VIII, No. over the Vertices of the Cube 1, Winter (u) 1963

Optical Data Processing - A Vol. XX, No. Cryptanalytic Perspective 3, Summer (u) 1975

Penney-Ante (U) Vol. XII, No 1, Winter 1967

Potential of Interactive Vol. XXV No. Computer Programs in the 3, Summer Decryption Process of SIGINT, 1980 The TFT3Wj

Randomization Made to Special Order: "Random Numbers Council of Are Too Important to be Left Learned to Chance" (U) Organization

Issue, 1972

DOCID: 3020956

Keyword I Title

Rationale for and Preliminary Implementation of HYPERCAN {High Performance ~ r ~ i t a n a l y s i s ) / (U) Recognition of Latin Square Equivalence Classes (U)

Recovering the Structure of a Linear Shift Register (U) I

I Revision - de novo, A (U)

Sliding Strips, Additive, Subtractive, and Minuend (U)

Solution of Additive- Minuend Busts (U)

Solution of a Fractionated Monome-Dinome System (U)

Solution of a Polyalphabetic Monome-Dinome System (U)

Author Reference

Vol. XXIII, No. 4, Fall 1978

Vol. XVI, No. 3, Summer 1971

Vol. XIV, No. 4, Fall 1969

Wray, W. D.

Solution of VEJX-0, or the Uses of Delta (U)

Some Applications of the Chi- Square Test in Cryptanalysis (U)

Some Observations on Computer Aids to indicator Recovery (U)

Lutwiniak, William

Vol. I, No. 3, October 1956

Vol. XI, No. 2, Spring 1966

Vol. 111, No. I , January 1958

Vol. 11, No. 2, April 1957

Vol. I, No. 3, October 1956

Lutwiniak, Vol. XVIII, William No. 2,Spring

1973

Callimahos, Vol. XIV, No. Lambros D. 4, Fall 1969

Vol. XVII, No. 4, Fall 1972

Some Reminiscences (U) Tiltman, John H., Vol. XI, No. Brigadier 3, Summer

1966

Something'May Rub Off! (u) Lewis, F. W. Vol. X, No. 1, Winter 1965

Text Recognition Procedure for Cryptanalysis, A (U)

Vol. XI, No. 3, Summer 1966

W E T UMBRA

DOCID: 3020956 ~n - -398598 $ b ) (31-P.I . 86-36

Key word I Title Author ReferenCe

Theory and Applications of Three-Way Multidimensional Scaling

Cry ptanalytic Personnel

Cryptographic Security

Cryptography

This Matrix Business: Part I1 (U)

Unbreakable Cipher, The (U) Campaigne, Howard H.

Use of Bayes Factors with a Composite Hypothesis (U)

What Next, Dr. Trithemiu~? Lewis, Frank W. (U)

Will the Real 53 Stand Up? (U)

Z-Flags in Hagelin Fairbanks, Cryptanalysis (U) Sydney

On the Selection of Cryptanalysts -Part I1 (U)

On the Selection of Personnel for Cryptanalysis (U)

Some Principles of Tiltman, John Cryptographic Security (U) H., Brigadier

Book Review: Recent Literature on Algebraic Cryptography (U)

Vol. XXI, No. 2, Spring 1976

Vol. XIII, No. 3, Summer 1968

Vol. 111, No. 2, April 1958

Vol. 111, No. 4, December 1958

Spring 1961

Vol. IX , No. 4, Fall 1964

Vol. XI, No. 4, Fall 1966

Vol. XIX, No. 1, Winter 1974

Vol. IX, No. 1, Winter 1964

April 1960

January 1960

Vol. XIX, No. 3, Summer 1974

Vol. VII, No. 2, Spring 1962

Book Review: "Variable Campaigne, Vol. IV, No. Matrix Substitution in Howard H. 4, October Algebraic Cryptography" (U) 1959

DOCID: 3020956

Title Author Reference

Categories of Cryptographic Lewis, Frank W. Vol. XII, No. Phenomena - With a Few 4, Fall 1967 Examples of Effect and Cause (U)

Convolutions, Cube Roots, and Computer Cryptography (UI

Vol. XVIII, No. 3, Summer 1973

De Profundis; or the ABC of Callimahos, Vol. 11, No. 1, Depth Reading (U) Lambros D. January 1957

I Generation of Permutations

Cryptologic History

(U)

Intuitive Exposition of Zierler's Method for Finding Linear Recursions, An (U)

On the Distribution of n- Digit Groups by the Sum of Their Digits (U)

Philosophy of U.S. Cryptography and Cryptographic Usage, A (U)

Recollections Concerning the Birth of One-Time Tape and u Printing-Telegraph Machine Cryptography (U)

ABNER: The ASA Computer Part 1: Design (U)

ABNER: The ASA Cbmputer Part 2: Fabrication, Operation, and Impact (U)

About NSA (U)

Boer War Cipher, A (U)

Book Review: Norse Medieval Cryptography in Runic Carvings (U)

Vol. IX. No. 2, May 1964

Vol. XIII, No. 1, Winter 1968

Vol. I, No. 2, July 1956

Vol. XII, No. 3, Summer 1967

Vol. I, No. 2, July 1956

Snyder, Samuel Vol. XXV, S. No. 2, Spring

1980

Snyder, Samuel Vol. XXV, S. No. 3,

Summer 1980

Vol. IV, No. 1, January 1959

Vol. X, No. 3, Summer 1965 and Vol: X, No. 4, Fall 1965

Vol. XIII, No. 3, Summer

Keyword I Title Author Reference

Book Reviews: Pearl Harbor: Warning and Decision, Roberta Wohlstetter; But Not in Shame, John Toland; The Secret War, Sanche de Cramont; CIA - The lnside Story, Andrew Tully; Now It Can Be Told, Leslie R. Groves; Thinking A bout the Unthinkable, Herman Kahn; Strike in the West, James Daniel and John G. Hubbell (U)

Unknown Vol. VIII, No. reviewer 1, Winter

1963

Book Review: The Broken Seal (L')

Can Cryptologic History Repeat Itself? (U)

Callimahos, Yol. XII, No. Lambros D. 3, Summer

1967

Friedman, Vol. XVIII, William F. NO. 3,

Summer 1973

I Cryptologic Fairy Tale, A

Der Fall WICHER: German Knowledge of Polish Success on ENIG~IA (L!)

Drama in Cryptologic Life (U)

Experiences 1920-1939 (U)

GEE System - I, The (U1

GEE System - 11, The (U)

GEE System - 111, The (U)

-- --

- ----- - - - -

DOCID: 3 0 2 0 9 5 6 1COE-98598

Tiltman, John H., Vol. VII, No. Brigadier 2, Spring

1962

Vol. XVI, No. 4, Fall 1971

Meyer, Joseph A. Vol. XX, No. 2, Spring 1975

Callimahos, Vol. XIX, No. Lambros D. 1, Winter

1974

Tiltman, John H., Vol. XVII, Brigadier No. 3,

Summer 1972

Unknown Fall 1961

Unknown Vol. VII, No. 1, Winter 1962

Unknown Vol. VII, N o . 2, Spring 1962

155

TOP Sh-

DOCID: 3020956

'(b) ('1-t . 1 . 86-?6

Keyword

-598

I Title Author Reference

1 GEE System - IV, The (U) Unknown

GEE System - V, The (U)

German Agent Systems of Lewis, Frank W. World War I I W

German Radio Intelligence I iui

Gweeks Had a Gwoup for It, Filby, P. W. The (U)

How the Japanese Army Water Transport Code 2468 Was Broken (U)

Introduction to Cryptology - Friedman, I, An (U) William F.

Introduction to Cryptology - Friedman, 11, An (U) William F.

Introduction to Cryptology - Friedman, 111, An (U) William F.

Introduction to Cryptology - Friedman, IV, An, (U) William F.

Introduction to Cryptology - Friedman, V, An, (L') William F.

Introduction to Cryptology - VI, An, (U)

John Dee: Consultant to Queen Elizabeth I (U)

Maya Astronomical Computer, The (U)

Midway and Yamamoto: Properly Revisited (U)

Friedman, William F.

Vol. v11, No, 3, Summer 1962

Vol. VII, No. 4, Fall 1962

Vol. VII. No. 3, Summer 1962

Vol. x x v , No. 4, Fall 1980

Vol. XXI, No. 2, Spring 1976

Vol. XVIII, No. 4, Fall 1973

Vol. IV, No. 4, October 1959

April 1960

Fall 1960

Winter 1961

Summer 1961

Fall 1961

Vol. XII, No. 4, Fall 1967

Vol. XXII, No. 1, Winter 1977

Vol. XIII, No. 3, Summer 1968

DOCID: 3020956 9 8 5 9 8 i

Keyword I Title Author Reference

Personal Contribution to the Vol. XX, No. Bombe Story, A (U) 4, Fall 1975

Precursor of Modern Vol. 111, No. Communications Intelligence 3, July 1958 (U)

Preliminary Historical Unknown Vol. 1X. No. Report on the Solution of the 2, May 1964 "B" Machine (U)

Project EXPLORER (U) Vol. XVI. No. 2, Spring 1971

Reading TUNNY (U) Campaigne, Vo!. VII, No. Howard H. 4, Fall 1962

Ib) (31-P.I. 86-36

Rocheford's Cipher: A Discovery in Confederate Cryptography (U)

Rosetta Stone and Its Decipherment, The (U)

SIGINTing with SACO: Experiences with the Rice Paddy Navy (U1

Gaddy, David W. Vol. XVIII, No. 4, Fall 1973

Callimahos, Vol. XVI, No. Lambros D. 1, Winter

1971

Vol. XXI, No. 1, Winter 1976

Vol. XXI, No. 1, Winter 1976

Solution of the Japanese Friedman, Val. XIX, No. "PURPLE" Machine, The (U) William F. 1, Winter

1974

Room 40 Compromise, The Meyer, Joseph A. Vol. XXV, (U) No. 1, Winter

1980

Cryptologist: Can He Exist?, The (Ul n Book Review: Basic Cryptologic Glossary

Book Review: Lost Languages (u) U

Vo!. 11, No. 3, July 1957

Vol. XI, No. 1, Winter 1966

DOCID: 3020956 9

Keyword Title Author Reference

Borders of Cryptology, The Vol. IV, No. (U) 4, October

1959

Elements of Shift Register Vol. XVI, No. Cryptology (U) 2, Spring I

1971

Flattening Effect, The (U) Kullback, S.

Insolvable Problem, An (U) Jacobs, Walter W.

Null Hypothesis, The (U) Campaigne, Howard H.

Probabilities of Hypotheses and Kullback-Leibler Information-Statistics in Multinomial Samples (U)

Science and Cryptology (U) Engstrom, Howard T.

Turing's Contributions to Cryptology (U)

Cryptomathematics Enumeration of the Square Permutations of the

( = (1) Symmetric Group (U)

( - (3)-13 USC 7 ~ 8

Multiple Hypothesis Testing and the Bayes factor (U)

Survey of the Distance Problem, A (U)

Vol. X, No. 1, Winter 1965

Vol. VIII, No. 3, Summer 1963

Vol. I, No. 2, J u l y 1956

Vol. I, No. 3, October 1956

Vol. 111, No. 3, July 1958

Vol. VIII, No. 3, Summer 1963

Vol. XVIII, No. 4, Fall 1973

Vol. XIX, No. 4, Fall 1974

Vol. XVI, No. 3, Summer 1971

Vol. XXIV, No. 3. Summer 1979

Vol. XVIII, No. 2,Spring 1973

DOCID: 3020956 9 3 9 8 5 9 8 ( b ) l ? ) -P.L. 86-36

Currents

Cybernetics

Author Reference

Cryptosecurity Matter Transmission (U)

Cryptosystem identification

Cryptosysterns No. 1 Winter

Cryptovariables

Thin Film Shifting Matrix, A

Communications Sciences Contribute to the Study of Natural Systems? (U)

Data Compression Information Theory Applied Vol. XXIII, to Computer Data No. 4, Fall Compression (U) 1978 and

Special Mathematics and Engineering Issue, 1981- 1983

Data Management Data Management Vol. XVI, No. Challenge, The (U) 2, Spring

1971

Data Processing AR System, The (U) Vol. XXIII, No. 3, Summer 1978

Community Impacts on NSA Vol. XXIII, Systems (U) No. 3,

Summer 1978

( b ) (1) (b) (3)-50 USC 403 (b) (3)-P.L. 86-36

DOCID: 3020956 REF ID:A398598 TFP~~~""RA

Keyword Title Author Reference

Integrated and Guided Wave Vol. XXIV, Optics and Device No. 2, Spring Applications (U) 1979 and

Special Mathematics and Engineering Issue, 1981- 1983

Optical Data Processing - A Vol. XX, No. Cryptanalytic Perspective 3, Summer (u) 1975

REDMAN Program, The (U) Vol. IX, No. 1, Winter 1964

Data Representation Representing Data in Vol. 111, No. Computers (U) 1, January

1958

Data Standardization Data Standards for SICINT Vol, XM, No. Activities - Some Conflicting 1, Winter Objectives (U) 1971

Data Standards Data Standardization and Vol. XVI, No. the Trace Factor (U) 2, Spring

1971

Databases Database Services (U) Vol. XII, No. 1, Winter 1967

Debugging Computer Program Vol XILI, No. Debugging: A New Era (U) 2, Spring

1968 and Special Computer and Information Sciences Issue

Debugging Made Easier (U) Vol. 111, No. 4, December 1958

Cover and Deception (U) Vol. IV, No. 3 July 1959

Deception

DOCID: 3020956 REF IDzA398598 --BRA

Keyword

Decision Making

Degaussing

Dictionaries

Dictionary References

Digital Circuits

Digital Data

Digital Recordings

Digital Signals Analysis

Direction finding

Distribution

Document Destruction

I Title Author

Upgrading Selected U.S. Codes and Ciphers with a Cover and Deception Capability (U)

Crisis Management in the Zoebelein, National Senior Cryptologic Arthur J. Course (LT)

Measurement of Insecurity for Imperfect Erasure, A (U)

Look a t It This Way (C )

Fast Look-up in a Threaded Dictionary (U)

Fundamentals of Majority Logic ( U )

Data Transmission Over Telephone Circuits (U)

Electrical and Magnetic Properties of Computer Tape (U)

WARSAN I1 -An Implementation of the FFT and Other Tools for Digital Signals Analysis (U)

Errors in High Frequency Direction Finding (U)

U. S. Program in Direction Finding, A (U)

Degrees of Freedom in an N- bit Frequency Distribution (U)

Emergency Destruction of Documents (U)

Reference

Vol. XXI, No 1, Winter 1976

Vol. XXII, No. 1, Winter 1977

Vol. XXII, No. 1, Winter 1977

Vol. XVIII, No. 1,Winter 1973

Vol. XVI, No. 1, Winter 1971

Vol. IV, No 4, October 1959

Vol. IV, No. 1, January 1959

Vol. IX, No. 1, Winter 1964

Specia 1 Issue, January 197 1

Vol. IV, No. I , January 1959

Gerson, Vol. X, No. 2, Nathaniel C. Spring 1965

Vol. I, No. 1, April 1956

Shinn, L. E. Vol. I, No. 1, April 1956

DOCID :

Keyword

Document Storage

Dynamic Memory

Earth Satellites

Editing

Editorials

Electricity

Electromagnetics

Electronic Warfare

Electronics

ELINT

Title

Threaded File Retrieval System (U)

Processes for Random and Sequential Accessing in Dynamic Memories (U)

Determination of Missile and Earth Satellite Trajectories from Radar Observations (U)

Operation VANGUARD

Textual Criticism and NSA (U)

Collected Editorials of Sydney Fairbanks (U)

Author Reference

Vol. XII, No. 2, Spring 1967

Vol. XXII, No. 4, Fall 1977

April 1960

Vol. I, No. 2, July 1956

Vol. XIV, No. 3, Summer 1969

Fairbanks, April 1956 - Sydney July 1959

Darlington Compound Vol. IX, No. Transistor a s a Current 4, Fall 1964 Controlled Voltage Source, A (U)

Intercept and Gerson, Vol. XX. No. Electromagnetics (U) Nathaniel C. 2, Spring

1975

Thermal Noise (U)

Intercept of USSR Missile Transmissions (U)

Borders of Cryptology, The (U)

Introduction to Semiconductor Physics and Diode Theory (U)

Gerson,

Vol. VII, No. 3, Summer 1962

Vol. IV, No. 3, July 1959

Vol. IV. No 4, October 1959

Vol. 11, No. 2, April 1957

Drawing to a Straight Flush Vol. XXI, No. - A Study in Technical 3, Summer Intelligence (U) 1976

DOCID: 3 0 2 0 9 5 6 9 9 8 5 9 8 ; ( b ) (3)-E.L. 86-36

( u ) (1) (b) (jj-53 USC 403 ( 5 : ( 3 ) - P . L . 16-36

Keyword I Title Author Reference

ELINT Collection

Encipherment

Encryption

Engineering

ENIGMA

Equipment Emanations

Future Problems of Intercept Gerson. Nathan iel C.

SELLNOW - A Man-Machine Communication System for ELINT Data (U)

Real-Time Raster (U)

Offsets of Differences: Summation and Difference Methods (U)

Solution of Hill's Basic Algebraic Methods for Enciphering Polygraphs (UI

Time-Element Scramble (U)

Vol. VIII, No. 1, Winter

Vol. IX, No. 2, May 1964 I li3 Vol. VIII, No. 4, Fall 1963

Vol. XXIV, No. 1, Winter 1979

Vol. 11, No. 4, October 1957

Vol. I, No. 2, July 1956

Vol. VII, No. 4, Fall 1962

Meyer. Joseph A. Vol. VII, No. Approach, The (U) 3, Summer

1962

Electrical Design of Random Sequence Generators (U)

Der Fall WICHER: German Meyer, Joseph A Knowledge of Polish Success on ENIGMA (Li)

Vol. IX, No. 3, August 1964

Vol. XXIV, No. 4, Fall 1979

Personal Contribution to the Bombe Story, A (U)

Standard for Evaluating the Intelligence Content of Equipment Emanations (U)

Esperanto I Language Problem a t NSA, The (U)

Vol. XX, No. 2, Spring 1975

Vol. XX, No. 4, Fall 1975

Vol. IX, No. 3, August 1964

Vol. I, No. 1, April 1956

DOCID: 3020956

Author Reference Keyword

Ethics

Title

Extraterrestrial Intelligence

Facsimile

FDM Signals

Field Sites

File Storage

Films

Filters

COMINT - Hard Facts in the Cold War (U)

Book Reuiew: Lincos, Design of a Language for Cosmic Intercourse, Part 1 (U)

Communications with Extraterrestrial Intelligence (U)

Extraterrestrial Intelligence (U)

Key to the Extraterrestrial Messages (U)

ABC of Cifax, The (U)

FDM Activity Detection (U)

Centralized Computer Support of Field Activities (U)

Minimizing Wasted Space in Information Files (U)

Deposited Films - Magnetic Elements for the Memory of the Future (U)

Parabolic "Mock" Design for an FFT - Implemented Filter Scheme (U)

Realization and Optimization of the Audio Frequency Microminiature Thin Film Band-Pass Filters (U)

Meyer. Joseph A. Spring 1961

Vol. VII, No. 1, Winter 1962

Callimahos, Vol. XI, No. Lambros D. 1, Winter

1966

Campaigne, Vol. XI, No. Howard H. 2, Spring

1966

Campaigne, Vol. XIV, No. Howard H. 1, Winter

1966

Vol. I, No. 2, July 1956

Vol. XXI, No. 1, Winter 1976

Special Council of Learned Organization Issue, 1972

Vol. XIV, No. 4, Fall 1969

Vol. I, No. 3, October 1956

Special Issue, January 1971

Vol. XIII, No. 4, Fall 1968 Special Mathematics and Engineering Issue, 1981- 1983

REF IDzA398598 DOCID: 3020956

Keyword I Title Author

Frequency

Foreign Languages

FORTRAN

Entropy of German, The (U)

Look a t It This Way (U)

Compiler Object Code Optimization (U)

Writing Efficient FORTRAN (U)

Degrees of Freedom in an N- bit Frequency Distribution (U)

Error Formula for Iterative Prefiltering Frequency Estimates, An (U)

I Mathematical Analysis of (

Frequency Hopping

Games

Garbles

Jitter in a Digital Frequency Source (U)

Realization and Optimization of the Audio Frequency Microminiature Thin Film Band-Pass Filters (U)

Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer (U)

Hoopscotch (U)

Quick Check for Transposal Garbles, A (U)

I

Reference

Vol. XVIII, No. 1,Winter 1973

Vol. XVII. No. 1, Winter 1972

Vol. XVII, No. 2, Spring 1972

Vol. I, No. 1, April 1956

Vol. I, No. 2, July 1956

Vol. XXII, No. 3, Summer 1977

Vol. VIII, No. 2, Spring 1963

Vol. XIII, No. 4, Fall 1968 Special Mathematics and Engineering Issue, 1981- 1983

Vol. x x v , No. 4, Fall 1980

Vol. XII, No. 2, Spring 1967

Vol. IV, No. 2, April 1959 and Special Linguistics Issue

DOCID: 3020956 REF 1 ~ ~ ~ 3 9 8 5 9 8 [b):?)-F.L. 66-36 6

German Code

Keyword

German Air Force

Special Felix System, The (U) Kullback, Solomon

Title Author Reference

Germans I How the Germans Broke a U.S. Code (U)

r

Cryptanalysis in the German Air Force (U)

German COMINT

Germany

Vol. IV, No. 2, April 1959

German Radio Intelligence (U)

(0) :I) (b) (13)-50 USC 4C3 (h) [ . ? ) - I 5 iJS(: l ? F

[:,-E.L,. [?6-:6>

Cryptologic Fairy Tale, A Tiltman, John H., (Ul Brigadier

I GEE System - I, The (U1 Unknown

GEE System - 11, The (U) Unknown

GEE System - 111, The (U) Unknown

GEE System - IV, The (U) Unknown

Vol. IV, No. 2, April 1959

Vol. x x v , No. 4, Fall 1980

Fall 1960

GEE System - V, The (U) I - German Agent Systems of Lewis, Frank W. World War I ITSf '

Reading TUNNY (U) Campaigne, Howard H.

Groups

Vol. VII, No. 2, Spring 1962

Fall 1961

Vol. VII, No. 1, Winter 1962

Vol. VII, No. 2, Spring 1962

Vol. VII, No. 3, Summer 1962

Vol. VII, No. 4, Fall 1962

Vol. VII, No. 3, Summer 1962

Vol. VII, No. 4, Fall 1962

"TUNNY" Machine and Its Tiltman, John H., Spring 1961 Solution, The (U) Brigadier

Vol. XVI, No. 4, Fall 1971

Abstract Groups Defined by Sinkov, Abraham April 1960 Generating Operators (U)

DOCID: 3020956

Keyword

Hagelin Machines

HF Collection

History

Human Factors

IBM

IFF

Information Analysis

Information Management

Information Retrieval

I Title Author Reference J.

Automatic Crib-Dragging Device for Hagelin Machines, An (U)

Mickle-Muckle Principle in Hagelin Cryptanalysis, The (U)

CANDEW: A Methodology for Evaluating H F Collection Potential (U)

About NSA (U)

Application of Human Factors to the Specification and Design of Interactive Computer Systems (U)

Electrical and Magnetic Properties of Computer Tape (U)

Vol. I, No. 1, April 1956

Vol. IX, No. 4, Fall 1964

Vol. XXII, No. 3, Summer 1977

Vol.lv, No. 1, January 1959

Vol. XXIV, No. 4, Fall 1979

Vol. IX, No. 1, Winter 1964

IFF: A New Branch of 1 I Vol.11, No. 4. Cryptology (U) October 1957

Cybernetics and Problems of Callimahos, Diagnostics: the Parallels Lambros D. between Medicine and Cryptanalysis ( U )

Data Standardization and the Trace Factor (U) r Scientific a n d Engineering Information Management in the Department of Defense (L')

Association Factor in Information Retrieval, The ( U )

Information Storage and Retrieval (U)

Vol. XIV, No. 1,Winter 1969

Vol. XVI, No. 2, Spring 1971

Vol. X, No. 2, Spring 1965

Winter 1961

Vol. VIII, x o . 4, Fall 1963

Use of the B-Coefficient in I Vol. XIII, No. Information Retrieval, The 4, Fall 1968 (U)

DOCID: 3020956

Key word - -

Information Storage

Information Systems

Information Theory

Information Transmission

Intercept

Title

VIDEOFILE: A New Information Storage System

Six Characteristics of Information Handling Systems (U)

I

Information Theory and the Packing of Spheres (U)

Author Reference

Vol. XIII, No. 2, Spring

Vol. XIV, No. 1 I

3, Summer I

1969

Vol. IV, No. 2, April 1959

Some Applications of Kullback. Vol. I, No. 1 Information Theory (U) Solomon April 1956

Some Notes on Information 7 1 Theory (U) I Some Properties of the Two- State First-Order Mslrkov Chain (U)

CATNIP: Computer Analysis - Target Networks Intercept Probability (U) u

Communications Intelligence (U)

Determining Intercept Assignments (U)

Extending the Radio Horizon for Intercept Purposes by Using the Moon as a Reflector ( C )

Intercept System Analysis (U) I

Anonymous

Vol. IV, No. 1,January 1959

Vol. IX, No. 4, Fall 1964

Vol. XVI, No. 1, Winter 1971

Vol. 11, No. 2, April 1957

Vol. XII, No. 2, Spring 1967

Vol. X, No. 2, Spring 1965

Vol. XI, No. 2, Spring 1966

Interference and Intercept Gerson, Vol. XVI, No. (U) Nathaniel C. 1, Winter

1971 - Recording Techniques Vol. IX, No. Affecting Total Intercept= 1, Winter

Six Point Program for

I ( 1964

Cerson, Vol. VII, No. Improved Intercept (Part I) Nathaniel C. 3, Summer (u) 1962

DOCID: 3020956 -398598 - (b) ( 3 ) - P . L . 86-36

Keywords Title Author Reference

intercept Evaluation

Intercept Sites

Interpolation

Inventions

Ionosphere

JACQUARD Machine

Jamming

Japan

Japanese Language

Japanese Military

Key

Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer (U)

Verified Intercept Predictions (U)

Wideband and the SlClNT System (U)

Evaluating Intercept Techniques (U)

Time Coordination of SIGINT Sites (U)

Note on Univariant Interpolation (U)

Patent Matters and the Technical Employee (U)

How the Japanese Army Water Transport Code 2468 Was Broken (U)

Vol. XII, No. 1, Winter 1967

Vol. VIII, No. 4, Fall 1963

Vol. XI. No. 2, Spring 1966

Vol. X u , NO. 2, Spring 1967

Vol. 111, No. 4, December 1958

Vol. X, No. 3, Summer 1965

Study ofJapanese Nominalization, A (U)

Ionospheric Propagation (U) Cerson, Vol. 111, No. Nathaniel C., and 4, December -1 1958

Polar Ionosphere, The (U) Gerson, Summer 1961 Nathaniel C.

JACQUARD -A Yates Special Fast Algorithm Machine (U) Fourier Issue,

August 1973

( Don't Be Too Smart (U)

Tetrahedral Plugging (U)

Vol. x x v , No. 4, Fall 1980

Vol. XVIII, No. 4, Fall 1973

Vol. XXIII, No. 2, Spring 1978

January 1960

Vol. VIII, No. 2, Spring 1963

DOCID: 3020956 c8 ( b l ibi (11 131-50 USC 403 , , , . (b) ( 3 ) -ie USC 798 (b) :3)-P.L. 86-36

Keywords 1 Title Author Reference I

Key Generators

~ m b i n i n g Functions in Key I Generators (U)

Keywords

Vol. XXIV, No. 3, Summer 1979

Spring 1961

Keyword Recognition

Korean War

Whole New World of Speech, u Vol. XXI, No. A; Or, Maybe 1984 Will Be a 4, Fall 1976 Good Year After All! (U)

Language

Possible Applications of Gurin, Jacob Vol. XXII, Keyword Recognition in No. 1, Winter Voice Intercept (U) 1977

Report on the Keyword Kullback, Vol. IV, No. System, A (U) Solomon, and F. 3, Ju ly 1959

W. Lewis

na ysis o exlca eaning E n Across Cultures, An (U) u Book Review: Mechanical Campaigne, Resolution of Linguistic Ifoward H. Problems (U)

Computer Scripting (U)

Language and the COMlNT Production Process (U)

Language as a Bulk Commodity (U)

Language Levels and Cryptologic Jobs (U)

Vol. XXIV No. 1 Winter 1979

Vol. XIII, No. 4, Fall 1968

Vol. 111, No. 4, December 1958

Vol. XXIV, No. 1 Winter 1979

Vol. XVIII, No. 3, Summer 1973

Vol. XIX, No. 3, Summer 1974

Vol. XX, No. 3, Summer

1 1975

Vol. XV[II, No. 3, Summer 1973

DOCID: 3020956 REF ID:A398598 9

'(b) (3)-P.L. 86-36

Keywords Title Author Reference I , . . r

Language Problem a t NSA, u Vol. I, No. 1, The (U) April 1956

Language Acquisition

Language Aids

Language Dictionaries

Language Identification

Language Modeling

Lay man's Guide to the Gurin, Jacob Vol. XXIII, Mysteries of Linguistics, A No. 1, Winter (u) 1978

Linguistic Canonical Forms: n Vol. XIII, No. Tools for Analytic Progress 1, Winter IUI 1968 and

I I 1 Special u Linguistics Issue I1

Multilingual Codes (U) Vol. X, No. 4, Fall 1965

Nest of Dragons, A: The Curin, Jacob Voice Problem (U)

Under-Developed Languages, Under-Utilized Computers (Ul

Words and the Intelligence Gurin, Jacob Value of Conversations (U)

Investigations into Adult Language LearningIAcquisitions (U)

"Trots" in Foreign Language Study (U)

Problems of Meaning in Interlingual Dictionaries (U)

Note on the English VCCCC Pat tern or Maximum Post- Vocalic Consonant Clustering in Monosyllabic English Words, A (U)

Two New Language Models (U)

I

Vol. XXI, No. 1, Winter 1976

Vol. XX, No. 1, Winter 1975

Vol. XXIII, No. 2, Spring 1978

Vol. XXIV, No. 3, Summer 1979

Vol. 11, No. 1, January 1957 and Special Linguistics Issue

Vol. 111, No. 1, January 1958

Vol. XVII, No. 1, Winter 1972

Vol. XXIV, No. 3, Summer 1979

DOCID: 3020956

Keywords

Language Processing

Language Proficiency

Language Training

Latin Squares

Learning Machines

Library

Light Reading

Linear Prediction

Linear Recursions

Linguistics

1 Title Author Reference

Natural Languages (U)

Multichannel Language Processing as a System (U)

Contextual Testing in Establishing Minimum Working Level Language Proficiency (U)

Worldwide Language Problems a t NSA (U)

Special Council of Learned Organization Issue, 1972

Vol. XVII, No. 4, Fall 1972

Vol. x x v , No. 1, Winter 1980

Vol. XIII, No. 4, Fall 1968

Computer Generation of u Vol. X, No. 3, Unrelated Latin Squares (U) Summer 1965

Learning Machines (U) Jacobs, Walter Vol. 111, No. W. 3, July 1958

Learning Machines - Part I1 Jacobs, W. W. Vol. IV, No. (U) 2, April 1959

Library and the User, The Vol. XIII, No. (U) 2, Spring

1968

Learn with BOOK (U) Vol. XI, No. 3. Summer

Error Formula for Iterative Prefiltering Frequency Estimates, An (U)

Vol. XXII, No. 3, Summer 1977

Intuitive Exposition of Vol. XIII, No. Zierler's Method for Finding 1, Winter Linear Recursions, An (U)

Layman's Guide to the

I 1 1968 Gurin, Jacob Vol. XXIII,

Mysteries of Linguistics, A No. 1, Winter (u) 1978

Theoret lcal Linguistics and Language Universals (U)

I

Vol. XXII, No. 2, Spring 1977

REF ID:A398598 DOCID: 3020956

Keywords

Linguists

Literature

Logic

LVHF Collection

Machine Language

Machine Translation

Title Author Reference

Computers and Linguists Do Mix (U)

CY-600 View of Language, A (U)

Translation of a Classic: A Gurin, Jacob Vol. XI, No. Matter of Ethics, The (U) 2, Spring

1966

Vol. XVI, No. 3, Summer 1971

Vol. XVIII, No. 3, Summer 1973

Fundamentals of Majority Logic (U)

Tunnel Diode Dynamic Logic Module, A (U)

"Food for Thought" in LVHF Reception (U)

LVHF Propagation and Collection Techniques (U)

Vol. IV, No. 4, October 1959

Summer 1961

Vol. XX, No. 4, Fall 1975

Vol. XVI, No. 4, Fall 1971

TEMAC (Text Macro D'lmperio, Mary Vol. X, No. 3, Compiler): A Machine Summer 1965 Language for Processing and Text (U) Computer

and

Machine-Aided Translation - Where Is It Today?(U)

Machine Translation (U)

Information Science Issue

Vol. XVIII, No. 2, Spring 1973 and Special Linguistics Issue, I t

Vol. XII, No. 2, Spring 1967

Some Problems in the Field Salemme, Arthur Fall 1960 of Machine Translation J. orThe Case of the Volatile Mouses (U)

DOCID: 3020956

Keywords

Maintenance

Management

Manual Morse

Mapping

Mathematicians

Mathematics

I Title Author

Automatic Maintenance (U) Meyer, Joseph A.

Mechanization Systems and a New Look a t Management and Organization (U)

Operations Research in NSA (U)

Computer Transcription of Manual Morse (U)

ALRIGHT - A Map Overlay Generator (U)

Maps and the Conversion of Gauss-Kriiger Grid Coordinates (U)

Transverse Mercator Projection, The (U)

I Some of My Best Friends Are Lewis, Frank W. Mathematicians (U)

Application of Fourier Transforms to Combiners (U)

Approximations to the Distribution Function of Sums of Independent Identically Distributed Random Variables (U)

Art of Automatic Bearing Instrumentation, The (U)

Arithmetic of a Generation Principle for an Electronic Key Generator, The (U)

Arithmetic of the Addition Generation Principle for Electronic Key Generators (U

Reference

Vol. IX, No. 1, Winter 1964

Vol. VII, No. 2, Spring 1962

Vol. X, No. 1, Winter 1965

Vol. 111, No. 3, July 1958

Vol. XI, No. 2, Spring 1966

Vol. 111, No. 1, January 1958

Vol. XXIV, No. 4, Fall 1979

Vol. IV, No. 2,April 1959

Special Fast Fourier Transform Issue, August 1973

Vol. X, No. 2, Spring 1965

Vol. XVIII, No. 4, Fall 1973

Vol. 11, No. 1. January 1957

Vol. 11. No. 3, July 1957

DOCID: 3020956 -98598

;h)13)-P.L. 86-36

Keywords I Title

Arithmetic of the Linear Generation Principle for Electronic Key Generators, The (U)

Arithmetic of the Multiplication Generation Principle in the Koken Key Generator, The (U)

( Bar Statistics, The (U1

Bar Statistics, The (U)

Bayes Marches On (U)

"Binary" System for Complex Numbers, A (U)

Book Review: "How to Estimate Probabilities," (Journal of the Institute of Mathemat~cs and its Application) (U)

Author

Campaigne, Howard H.

Book Review: "Involutory Commutants with some Applications to Algebraic Cryptography, I" (Journal fur Reine und Angewande

Campaigne, Howard H.

Reference

Vol. 11, No. 4, October 1957

Vol. 11, No. 2, April 1957

Vol. VIII, No. 2, Spring 1963

Vol. VIII, No. 4, Fall 1963

January 1960

Vol. X, No. 2, Spring 1965 and Computer and Information

lences Sc ' Issue

Vol. XII, No. 2, Spring 1967

Vol. XII, No. 1, Winter 1967

Mathematik) (U)

Book Review: Mathematical n Vol. VII, No. Statistics (ti) 4, Fall 1962

Book Review: Recent Vol. VII, No. Literature on Algebraic Cryptography (U)

175

TOP Sk--

DOCID: 3020956

Keywords I Title Author Reference

Book Review: "Some Fall 1961 Applications of High Speed Computers to the Case n= 2 of Algebraic Cryptography," (Mathematics of Computation), Vol. 15, No. 75 (U)

Book Review: "Some Further Campaigne, Fall 1960 Methods in Algebraic Howard H. Cryptography"; (Journal of the Mitchell Scientific Society. No. 74) (U)

Classes of Rotors without

. n Vol. X, No. 4, Parallels ( U ) Fall 1965

Cluster Analysis: Introduction to Models and Methods (U)

Comparison of the Efficiency of Two Methods of Estimating Certain Time Parameters, A (U)

Composition of Boolean Functions I ( U )

Composition of Boolean Functions I1 ( U )

Continued Fractions and Mills' Algorithm ( U )

Convergence Techniques for Finding Linear Approximations (U)

Cooley-Tukey Fast Fourier Transform for Base 4 and Base 4 + 2 ( U )

Cosymmetric Approximations to Combining Functions (U)

Vol. XXII, No. 2, Spring 1977

Vol. IX, No. 2, May 1964

Special Fast Fourier Issue, August 1973

Special Fast Fourier Issue, August 1973

Vol. xxv, No. 3, Summer 1980

Special Fast Fourier Issue, August 1973

Vol. XVII, No. 4, Fall 1972

Vol. XVI, No. 4, Fall 1971

I Coupon Collecting and u Vol. XI, No. Cryptology ( U ) 4, Fall 1966

DOCID: 3020956

(b)l3)-P.L. 86-36

Keywords Title Author Reference

Cryptanalytic Applications of Sequential Analysis (ti)

Distribution of C bJ (u, 13, The (c')

Elements of Shift Register Cryptology (U)

Estimating the Number of Solutions in LCF (2)lnof a System of Equations over the Integers (U)

Euclidean Algorithm and Distances between Wheel Settings, The (U)

Exact Markoff Probabilities from Oriented Linear Graphs (U)

Fast Dynamic Programming Algorithm and Its Mathematical Basis, A (U)

Vol. IX, NO. 3, August 1964

Special Fas t Fourier Issue, August 1973

Vol. XVI, NO. 2, Spring 1971

Vol. VIII, No. 3, Summer 1963

Vol. VIII, NO. 1, Winter 1963

Vol. 11. NO. 3, J u l y 1957

Vol. XXI, No. 1, Winter 1976

Finding the Best-Scoring Jacobs. Walter Vol XIV, NO. Permutation (U) W. 4, Fall 1969

FIR: A CDC 1604 Program Vol. X, No. 1, for Solution of Systems of Winter 1965 Linear Equations (U)

Flattening Effect, The (U) Kullback, Vol. X, NO. 1, Solomon Winter 1965

Fourier Analysis on Finite Vol. XXI, No. Abelian Groups (U) 3, Summer

1976

Fourier Coefficients and Special Fas t Function Decomposition (U) Fourier Issue,

August 1973

Generating Function Vol. XXII, Approach to CRETAG, A (ti) NO. 1, Winter

1977

DOCID: 3020956 REF ID:A398598 9

Keywords I Title Author Reference

Geodetic Latitude and Altitude from Geoceatric Coordinates (U)

Geometric Approach to Waveform Recognition, A (U)

Graph Theory (U)

Hill Climbing (U)

How to Visualize a Matrix (U)

In ~ e n e r a l & { - x Converges

introduction to Computer Binary Arithmetic, An (U)

I Introduction to the Fast Fourier Transform, An (U)

Introduction to the Special Issue (U)

I JACQUARD - A Yates Algorithm Machine (U)

Labeled Oriented Graphs Which Are Onto (U)

Least Squares Analysis of a Probability Matrix, The (U)

Linear Approximation Attack on an Irregularly Stepping Key Generator, A (U)

Linear Approximations and the Degree of the Function (U)

Vol. XX, No. 1, Winter 1975

Vol. VIII, No. 2, Spring 1963

Vol. XII, No. 3, Summer 1967

I Vol. X, No. 4, Fall 1965

Vol. VIII, No. 3, Summer 1963

Vol. XII, No. 1, Winter 1967

I Vol. 111, No. 2, April 1958

Special Issue, January 1971

I Special Fast Fourier Issue, August 1973

Special Fast Fourier Issue, August 1973

I Vol. X, No. 1, Winter 1965

Vol. IV, No. 1, January 1959

Special Fast Fourier Issue, August 1973

( Special Fast Fourier Issue, August 1973

DOCID: 3020956 REF ID:A398598

Keywords Title

I Linearly Induced Nonlinear ( Cycles $1

I List of Properties of Bayes- Turing Factors, A (U)

Long and Short of Single Transpositions, The (U)

Low Weight Linear Recursions in Key (U)

I Product Sequences I1 (U) I Markov Chain -The Models with the Short Memories (U)

Mathematics and Computers in Cryptanalysis (U)

Matric Recursions (U)

Matrix Business: Part 11, This (U)

Modified Normal Curves (U)

Note on Curve Fitting, A (U)

Note on "Logarithmic Scoring and Preliminary Testing" (U) I

Author Reference

ourier Issue, ugust 1973

Vol. XXII, No. 4, Fall

Vol. X, No. 2, Spring 1965

Vol. XXI, No. 2, Spring 1976

Vol. VIII, No. 1, Winter 1963

Vol. XX, No. 4, Fall 1975

Vol. XVII, No. 1, Winter 1972

Special Council of Learned Organization Issue, 1972

I Vol. XXII, No. 3, Summer 1977

Vol. 111, No. 3, July 1958

Spring 1961

I Vol. XIII, No. 4, Fa11 1968

I Vol. 11, No. 4, October 1957

DOCID: 3020956

Keywords Title

Note on Product Sequences, A (U)

On an Algorithm for Approximate Polybit Raring Using Fourier Transforms (U)

On the Minimization of Integer Quadratic Forms over Nonzero Integer Vectors (U)

On Understanding the Null Hypotheses of Test Statistics (U)

Optical Fourier Transform and Periodic Phenomena (U)

Order Statistics for Cell Counts (U)

Parity a s an Operation Checking Code (U)

Processes for Random and Sequential Accessing in Dynamic Memories (U)

Random and Algebraic Coverings of Binary Vectors (U)

Remarks concerning Substantialization (U)

Roughness of Visitations in a Markov Chain, The (U)

Author Reference

Vol. XVI, No. 2, Spring 1971

Special Fast Fourier Issue, August 1973

Vol. XXV, No. 1, Winter 1980

Vol. VIII, No. 4, Fall 1963

Vol. XVIII, No. 3, Summer 1973

Vol. XXIII, No. 4, Fall 1978

Vol. VIII, No. 3, Summer 1963

Vol. XXII, No. 4, Fall 1977

Vol. XXIII, No. 3, Summer 1978 and Special Mathematics and Engineering Issue, 1981- 1983

Vol. IX, No. 4, Fall 1964

Vol. VIII, No. 2, Spring 1963

DOCID: 3020956 ' P n P g 8 5 9 8

l~l(3)-l.L. 46-36

Keywords Title Author Reference

Scoring Function and Its Vol. XIII, No. Distribution, A (U) 4, Fall1 968

Sequential Least Squares Vol. XII. No. Estimates (U) 2, Spring

1967

Setwise Transitive Groups Vol. X, No. 2, (U) Spring 1965

Simple Test for Slide or Kick, Vol. VIII, No. A (UI 4, Fall 1963

Slow Look a t Fast Special Fast Transforms, A (U) Fourier Issue,

August 1973

Some Formulas concerning Special Fast Bulges of Combining Fourier Issue, Functions (U) August 1973

Some Properties of Sample Special Fast Bulges (U) Fourier Issue,

August 1973

Spectral Analysis and the Vol. XIV, No. Fast Fourier Transform (U) 1, Winter

1969

Strategy for Program Vol. XXII, Decomposition for a No. 4, Fall Distributed Pipeline, A (U) 1977

Strength of the Bayes Score, Vol. XVII, The (U) No. 1, Winter

1972

Survey of Bent Functions, A Special Fast (U) Fourier Issue,

August 1973

Survey of Multinomial Vol. XX, No. Estimation for Code 3, Summer Weighting, A (U) 1975

Symmetric Approximations Vol. XIX, No. to Boolean Functions (U) 3, Summer

1974

Tail Probabilities for the Vol. VIII, No. Binomial Ilistribution (U) 3, Summer

1963

DOCID: 3020956

Memory

Keywords

Tutiog's Contributions to Cryptology (ti)

Messages

Midway

Military

Variable-Length Output ~ t r i n d - ] ~ m w

Variance of the Number of Ones in a Derived Stream of Zeros and Ones (U)

Way the Ball Bounces,The : An Experiment in Deconvolutipn Filtering (U)

Assignment of Storage Space in Rapid-Access Memory Systems (U)

I CAM 11 (U)

Content - Addressed Memories (U)

Author

- Data Structures and Their D'Imperio, Mary Representation in Storage: Part I (U)

Reference 1 I

Vol. VIII, No. 3, Summer 1963

Vol. XXI, No. 4, Fall 1976

Vol. XII. No. 2, Spring 1967

Special Issue, January 1971

Vol. 11, No. 2, 1 April 1957

Vol. IX, No. 1, Winter 1 1964

Vol. IX, No. 3, August 1964

Data Structures and Their D'lmperio, Mary Vol. IX, No. Representation in Storage: 4, Fall 1964 Part I1 (U)

Magnetic Core Memories (U) Vol. 11, No. 1, ElJ anuary 1957 "It Is Obvious That . . .": A Lewis, F. W. Vol. 111, No. Painless Approach to 2, April 1958 Cryptanalytic Diagnosis (U)

Midway and Yamamoto: Properly Revisited (U)

Vol. XIII, No. 3, Summer 1968

Book Reuiew: Military Campaigne, Vol. IV, No. Cryptanalytics, Part I1 (U) Howard H. 4, October

1959

DOCID: 3020956

Keywords

Military Addresses

Military Linguists

Missile Radiation

Missile Trajectory

Modems

Modulation

Monoalphabetic Substitution

Morse

I Titte Author Reference

Correlation of Frequency of Vol. XVII, Appearance of Military Unit No. 3, Addresses to Unit Echelon Summer 1972 and Combat Readiness Status (U)

Employment of Military Gurin, Jacob Vol. XIII, No. Linguists (U) 4, Fall 1968

and Special Linguistics Issue, I1

I Intercept of USSR Missile Gerson, Vol. IV, No. Transmissions (U) Nathaniel C. 3, July 1959

Missile Trajectories (U) Vol. 11, No. 1, January 1957

Notes on Missile Terminal Ballistics (Soviet) (U)

Vol. IX, No. 1, Winter 1964

Wireline Modem with Harmonic Distortion Equalization, A (U)

Cipher Signal Phase Modulation (U)

Target in Space, A (L')

De Profundis; or the ABC of Callimahos, Depth Reading (U) Lambros D.

Vol. xxv, No. 2, Spring 1980 and Special Mathematics and Engineering Issue, 1981- 1983

Vol. XIV, No. 2, Spring1969

Special Council of Learned Organization Issue, 1972

Design and Implementation of a Digital Demodulator for Use against On-Off Keyed Signals, The (U)

Vol. 11, No. 1, January 1957

Vol. XXIII, No. 2, Spring 1978

( b ) (1) lb) (3)-50 USC 103 1b)(33-18 USC 798 (b) (3)-P.L. 86-36

DOCID: 3020956 T a -98 OGA (b) ( 3 )

Keywords

Morse Code

Morse Translators

Networking

Noise

North Vietnam

NSA

Oceanography

On-Line Processing

On-Line Systems

One-Time Pads

Operating Systems

Operations

I Title

Automatic Acquisition and Translation of Hand-Keyed Morse Code (U)

Development of High Speed Automatic Morse Translators, The (U)

Community Impacts on NSA Systems (U)

Author Reference &

Val. XXIV, No. 1, Winter 1979

Vol. I, No. 1, April 1956

Vol. XXIII, No. 3, Summer 1978

Interference and Intercept Gerson, (U) Nathaniel C

Noisy Pluggings (U)

Weather or Not - Encrypted? (U) 1

Vol. XVI, No. 1, Winter 1971

Vol. 111, No. 2, April 1958

Vol. XII, No. 4, Fall 1967

About NSA (U) Vol. IV, No. I , January 1959

Report of the Second Various Vol. XIX, No. Computer Study Group (U) 1, Winter

1974

SlGlNT Implications of Meyer, Joseph A. Vol. XI[, No. Military Oceanography (U) 4, Fall 1967

CRISP1 (U) n Vol. X, No. 1, Winter 1965

Problem Solving with On- u Special line Systems (U) Council of

Learned Organization Issue, 1972

New Approach to the One- Vol. XIX, No. Time Pad, A (U) 3, Summer

Privacy and Protection in

1971

Vol. XVIII, Operating Systems (U) No. 2, Spring

Operations Research in NSA i (U)

Vol. X, No. 1, Winter 1965

DOCID: 3020956

Keywords

Operators

Optical Receiver

Optics

Orbits

Patents

Pattern Recognition

Personnel

Phase-lock oscillators

Pattern Recognition (U1 Jacobs, Walter W.

Rotation Problem in Pattern Recognition, The (U)

Title Author Reference

Abstract Groups Defined by Sinkov, Abraham April 1960 Generating Operators (U)

Optical Receiver, The (U)

El Vol. XIII, No. 2, Spring 1968

Integrated and Guided Wave Special Optics andDevice Mathematics Applications (U) and

Engineering Issue, 1981- 1983

Intercept and Gerson, Vol. XX, No. Electromagnetics (U) Nathaniel C. 2, Spring

1975

Selection and Placement of Cryptanalytic Personnel (U) I

Linear and Quadratic Electro-Optic Effects (Pockels and Kerr Effects) (U)

Determination of Missile and Earth Satellite Trajectories from Radar Observations (U)

Patent Matters and the Technical Employee (U)

Introduction to Statistical Pattern Recognition (U)

Introduction to Electronic Phase-Lock Oscillators, An (U)

Vol. IX, No. 4, Fall 1964

April 1960

Vol. X, No. 3, Summer 1965

Vol. XXII, No. 3, Summer 1977

Winter 1961

and Special Mathematics and Engineering Issue, 1981- 1983

Vol. VII, No. 1, Winter 1962

1 Fall 1960

Vol. VIII, No. 2, Spring 1963

DOCID: 3020956

I Polar Ionosphere, The (U) Gerson, Nathaniel C.

Thin Film Thermocouple (LT)

Use of OpticaI Density Measurements of Thin Films to Determine Vapor Distributions, The (U) n

Key words

Physics

Summer 1961

Vol. VII, No. 4, Fall 1962

Title Author Reference

Vol. VIII, No. 3, Summer 1963

Analysis of Thin Film Germanium Epitaxially Deposited onto Calcium

Plain Text

Vol. VIII, No. 2, Spring 1963

Planes

PRC

Fluoride (U)

Privacy

Probability

Probability Theory

Analysis of Digital Plaintext Callimahos, Vol. XIV, No. Autokey Systems, The (U) Lambros D. 2, Spring

1969

Distribution of Letters in Vol. XIV, No. Short Messages of English, 2, Spring1969 The (U) Campaigne

Optimum Use of Log Weights (U)

IFF: A New Branch of Cryptology (U)

"Maybe It's Related to the Phase of the Moon" (U)

ABC of Cifax, The (U)

Privacy and Protection in Operating Systems (U)

Entropy of German, The (U)

Distribution of the Maximum Bulge in a Flat Random Binary Stream, The (U)

Book Reuiew: Modern Probability Theory and Its Applications (U)

Vol. IX, No. 3, August 1964

Vol. 11, No. 4, October 1957

Vol. XVII, No. 4, Fall 1972

Vol. I, No. 2, July 1956

Vol. XVIII, No. 2, Spring 1973

Vol. I, No. 2, Ju ly 1956

Vol. VII, No. 4, Fall 1962

, Fall 1960

PURPLE Machine

, b ~ ( 3 - 4 . L . 86-3h

(b) ( 3 ) - F ' . L . 86-3b

Keywords

Problem Solving

Processing

Programming

Pulses

Title Author Reference

Bsok Review: Probability: An Introduction (U)

Problem Solving with On- line Systems (U)

ABC of Ciphony, The (U)

FUZZY: An Evolutionary Model for Data Structures (U)

Programming Concepts for Verification and Security (U)

Fall 1960

Special Council of Learned Organization Issue, 1972

Vol. I, No. 2, July 1956 and Special Linguistics Issue

vol. XXIV, No. 3, Summer 1979

Vol. XXII, No. 4, Fall 1977

Application O ~ O t h s e r i o , Mary Vol XXIV, Voynich Manuscr~p , An ( No. 2, Spring

1979

Cold-Cathode Counter Tube Studv, A (U)

Error in a Capacitor-Type Totalizer (U)

Subnanosecond Instrumentation (U)

Vol. XXIV, No. 3, Summer 1979

Vol. XIX, No. 4, Fall 1974

Vol. 111, No. 4, December 1958

Vol. 111, No. 4, December 1958

Vol. IX, No. 1, Winter 1964

Solution of the Japanese Friedman, Vol. XIX, No. "PURPLE" Machine, The (U) William F. 1, Winter

1974

Keywords I Title Author Reference

Qualification Standards

Queues

Queuing Theory

Radio

Radio Intercept

Radio Waves

Randomization

Random Variables

Receivers

Reciprocal Alphabets

Recording

Language Levels and Cryptologic Jobs (U)

Computers and Queues (U)

Application of Queuing Theory to Camputer Systems An (U)

Digitizer Queuing Model for FROSTING (L')

Did Alexander Popov Invent Radio? (U) I I One Model for an Artificial Ionosphere (U)

Antipodal Propagation [U) Gerson, Nathaniel C.

Randomization Made to Order: "Random Numbers Are Too Important to be Lefi to Chance" (U)

Approximation of Central Limits

Receiving System Analysis (U)

Reciprocal Alphabets and Kullback, Friedman Squares (U) Solomon

Electron Beam Recording for Wideband Analog Signals (U)

Introduction to Magnetic Tape Recording and Its Use in Intercept Activities, An (U)

Vol. XVIII, No. 3, Summer 1973

January 1960

Vol. XIV, No. 2, Spring 1969

Vol. XIV, No. 4, Fall 1969

Vol. XI, No. 2, Spring 1966

Vol. IV, No. 1, January 1959

Special Council of Learned Organization Issue, 1972

Vol. IV, No. 4, October 1959

Vol. X, No. 1, Winter 1965

Vol. 111, No. 1, January 1958

Vol. XIV, No. 3, Summer 1969

Vol. I, No. 3, October 1956

DOCID: 3020956

Rocket Motion I Rocket Motion and Newton's Fall 1960 Second Law (U)

Keywords

Rosetta Stone Rosetta Stone and Its Callimahos, Vol. XVI, No. Decipherment, The (U) Lambros D. 1, Winter

1971

Title Author Reference

Russian

Recording Techniques Affecting Total Intercept

This Is a Recording? (t')

Reporting

Research

Russian Grammar

Russian Language

Vol. IX, NO. 1, Winter 1964

Vol. XVIII, No. 2,Spring 1973

COMINT Analysis and Reporting 17 Vol. XVII, on the Developing Nations (U) No. 2, Spring

1972 (b) (1, (b) (3) -50 USC

Library and the User, The (U) Vol. XIII, No. 4 0 3 2, Spring (b) ( 3 , -18 usc 1968 7 9 8

(b) ( 3 ) - P . L . Research a t NSA (U) Campaigne, Val. XIII, No. 6-36

Howard H. 2, Spring 1968

Can We Lick the Voice Problem. n Vol. XVII, (U) No. 3,

Summer 1972

Computer, There Is Thy Sting! Salemme, Arthur Vol. XVI, No. (u1 J . 4, Fall 1971

Tour of Same Russian Salemme, Arthur Vol. XIV, No Translation Traps, A (U) J. 4, Fall 1969

7 The Case for Bad Grammar I Vol. IX, No. (u) 2, May 1964

and Special Linguistics Issue

I Are the Russir~ns Gaining Salemme, Arthur Spring 1961 Wordwise? IC )

--

DOCID: 3020956

Title

Characteristic Features of the Russian Language of the Last Decade (U)

Few Tricks of the Trade for the Translator of Russian, A (U)

Russian Navy Codes

Russian Translation

Russian Transliteration

Sampling

Satellite Tracking

Satellite Trajectory

Science

Science and Technology

Security

I Language Files; A Basic COMINT Aid (U)

Author Reference

Salemme, Vol. XI, No. Arthur. J. 4, Fall 1966

Salemme, Arthur Vol. IV, No. 2 J. April 1959

Spoken Russian: The Other Girvan, William Vol. XIV, No. Grammar (U) H. 3, Summer

1969

Russian Diamond, A (U) Vol. XII, No. 2, Spring 1967

PPM Telemetry Simulator (U) Fall 1960

"False Friends" of the Vol. XVI, No. Translator in the English and 4, Fall 1971 Russian Languages: A Translation from the Russian of V. V. Akulenko (U)

Handle With Care: Russian Salemme, Arthur Vol. XII, No. Transliteration (U) J. 4, Fall 1967

Random Walks with l-l Vol. 111, No. Restraining Barrier as Applied 2, April 1958 to the Biased Binary Counter (U)

Times of Shadow Passage for u Vol. VIII, No. Earth Satellites (U) 3, Summer

1963

Maximum Likelihood Vol. XIII, No. Estimation of a Trajectory and 1, Winter Its Variance (U) 1968

Science and Cryptology (U) Engstrom, Vol. 111, No. Howard T. 3, July 1958

Soviet Science and Technology Sinkov, Abraham Vol. IV, No. Present Levels and Future 1, January Prospects (U) 1959

Vol. XI, No. 1, Winter 1966

DOCID: 3 0 2 0 9 5 6 3 9 8 5 9 8

Shift Registers

Keywords

SIGINT Collection and Processing

SIGINT Productivity

Title Author Reference

Security Architecture in SIGINT Collection and Processing (U)

Narrow-Band Speech Security (U)

Combining Functions in Key Generators (U1

Cycles from Nonlinear Shift Registers (U)

Vol. 111, No. 4, December 1958 and

Perpetuation of Bias in Shift Register Devices (U)

Special Linguistics Issue

I Need for System Approach, The

Meyer, Joseph A,. Vol. XX, No. Jr . 1, Winter

1975

Spring 1961

Special Mathematics and Engineering Issue, 1981- 1983

Vol. XIV, No. 4, Fall 1969

Vol. VII, No. 2, Spring 1962

Vol. XXV No. 3, Summer 1980

Meyer, Joseph A. Vol. XI, NO. 1, Winter 1966

Selected SlClNT Intelligence Tordella, Louis Vol. XIX, No. Highlights (U) W 4, Fall 1974

1 SrCINT System Logic (u) Unknown

Trade-off Approach to Quality Intercept versus Quantity Intercept, A (U)

Third Revolution: Prospects for Continued SIGINT Productivity, The (U)

Vol. X, No. 2, Spring 1965

Vol. XXIII, No. 1, Winter 1978

Vol. XIII, No. 3, Summer 1968

REF IDzA398598

Keywords Title Author Reference

SIGINT Reporting Trends, Developments, and Oliver, Donald B. Vol. XXI, No. Pressures in SICINT Reporting 1, Winter Today (U) 1976

UTIL of English: A Study of the Vol. XVII, Quality of SICINT Product (U) No. 4, Fall

1972

Signal Analysis Vol. IX, No. 2, May 1964

i

Signal Identification Automatic Signal Identification Special Issue, January 1971

Use of Special Identification Vol. XII, No. Techniques (SIT) in the SQlution 4, Fall 1967 of Specific SICINT Problems, The (U)

Signal Processing MICROCOMPUTER: General- Vol XXII, Purpose Signal Process, The (U) No. 2, Spring

1977

UNNA - An Introspective Signal Vol. XX, No. Processor (U) 2, Spring

1975

Signal Theory Generalizations of "Maximum- Vol. XXIV, Entropy" (Pattern) Analysis (C) No. 2, Spring

1979

Signal-to-Noise Ratio Another Derivation of Binary Vol. X, No. 3, Error Rates as a Function of Summer 1965 Signal-to-Noise Power Ratio for Various Modulation Schemes (U)

ARC of Ciphony, The (U) Vol. I, No. 2, July 1956 and Special Linguistics issue

Ambiguity Reduction by Vol. XVI, No. Markov Analysis of TEMPEST 1, Winter Signals (U) 1971

Signals

DOCID: 3020956 REF ID:A398598

Keywords Title -

Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System (U)

Collection of LlNCOMPEX Signals (U)

Design and Implementation of a Digital Demodulator for Use against On-Off Keyed Signals, The (U)

Electron Beam Recording for Wideband Analog Signals (U)

Evaluating Intercept Systems (U)

Experimental Approach to a n Environment Study in the HF Band (U)

Extending the Radio Horizon for Intercept Purposes by Using the Moon a s a Reflector (U)

Investigation of Techniques for the Analysis of the M-803-3 Vocoder (L')

Mathematical Modeling of TEMPEST Channels (U)

Multipath Differential Doppler Data (U)

Recovery of Pre-Detection Signals in the Optical Receiver (U)

Representation of Signals on Orthonormal Bases, The (U)

Response of a Non-Linear Device to an Emitter Environment in the High Frequency Spectrum, The (U)

Author Reference

'01. x l l , s o . , Fall 1967

'01. XVII, lo. 2, Spring 972

701. XXIII, lo. 2, Spring 978

101 XIV, No. , Summer 969

701 IX, No. ., Fall 1964

'01. VIII, No. , Fall 1963

rol. X, NO. 2, $ring 1965

701. XX, No. , Fall 1975

701. XVI, No. , Summer 97 1

101. XXI, No. , Summer 976

Tot. XIII, No. ., Fall 1968

'01. IX, No. , Winter 964

101 VIII, No. 1, Winter 1963

DOCID: 3020956

Keywords

Signals Analysis

Signals Processing

Title Author - - -

Spread Spectrum System Jamming Response (U)

Study of Hourly Correlation of Trans-Horizon VHF-UH F Signals and Meteorological

I Conditions (U)

Correlation and Power Spectra of Randomly Sampled and Held Signals (U)

Frequency Analysis of a Set of HarmonicaIIy Related Tones (U)

Reference Patternsfor Nearest Neighbor Rule (U)

Integrated and Guided Wave Optics and Device Applications (U)

Teletype Processing in the FROSTING System (U)

Software I Designing Secure Reliable Software - A Methodology (U)

Signals Trends

FUZZY: An Evolutionary Model for Data Structures (U)

COMINT Signals Trends 7SX%(iM

Programming Concepts for Verification and Security (U)

Reference

Vol. XXII, No. 3. Summer 1977

Vol. XIV, No. 2, Spring 1969

Vol. XIV, No. 2, Spring 1969

Vol. XVI, No. 1, Winter 1971

Vol. XXII, No. 1, Winter 1977

Special Mathematics and Engineering Issue, 1981- 1983

Vol. XVIII, No. 2, Spring 1973

Vol. x x v , No. 2, Spring 1980

Vol. XXI, No. 1, Winter 1976

Vol. XXI, No. 4, Fall 1976

Vol. XXIV, No. 3, Summer 1979

Vol. XXII, No, 4, Fall 1977

DOCID: 3020956 'P -598

Keywords I Title

Software Maintenance Software Maintenance -The I Other Side of Acquisition (U)

Software Acquisition Work Breakdown Structure: A Better Implementation to Manage Software Overruns (U)

Software Support

Software Engineering

South America

Program Complexity Measure, A (U)

Soviet

( i s (11 (h; ;3) -5-1 lJ:;(: 41-13 (hj (-:)-I? U6C 73U

CAPER Software Support System, The (U)

Author Reference

Vol. xxv, No. 4, Fall 1980

Vol. XXIII, No. 3, Summer 1978

Vol. XXI, No. 4, Fall 1976

I

Vol. XXII, No. 2, Spring 1977

Human-Machine Interfaces for D'Imperio, Mary Vol. XXIV NSA Computer Systems (U) E. No. 4 Fall

1979

I German Agent Systems of Lewis, Frank W. World War II-CG)

CAPER Software Support System, The (U)

Database Services (U)

I Example of Substantive Analysis, An (U)

Investigation of Techni ues for lhTYz9, Soviet Communications Journals as Sources of Intelligence (u) U

Vol. VII, No. 3, Summer 1962

Vol. XXII, No. 2, Spring 1977

Vol. XII, No. 1, Winter 1967

Vol. XI, No. 3, Summer 1966

Vol. XX, No. 4, Fall 1975

Vol. IX, No. 3, August 1964

Soviet Science and Technology; Sinkov, Abraham Vol. IV, No. Present Levels and Future 1, January

1959

Soviet Leadership Vol. XXV No. 4.Fall 1980

Soviet Navy Soviet Navyod 1 Vol. XVI, No. A COMSEC 4, Fall 1971

'I'urnlng Polnt (U

DOCID: 3020956

Keywords I Title Author Reference

Soviet Telemetry Computer Processing of Soviet Telemetry (U)

Soviets

Space Flights

Spanish Cryptography

Spanish Language

10)(3)-50 USC 403 lb) (3)-18 USC 798 ib)(3)-P.L. 86-36

Role of Carrier (VCh) Telephony in Soviet World War I1 Strategic Communications (U)

Spacecraft Passenger Television from Laika to Gagarin (U)

Book Review: TRATADO DE CRrPToCRAFIA (U)

I Anglicisms in Puerto Rico (U) I

Vol. XIX, No. 3, Summer 1974

Vol. XXI, No. 2, Spring 1976

Vol. XI, No. 2, Spring 1966

Speaker Identification

Speech

Speech Privacy

Speech Scanning

Spread Spectrum

Sputnik

Stirling Numbers

Vol. XIII, s o . 1, Winter 1968

Vol. XIV, No 4, Fall 1969

Vol. XVIII, No. 1,Winter 1973

Vol. VII, No. 4, Fall 1962

Vol. XX, No. 4, Fall 1975

Vol. XXV No. 1 Winter 1980

Vol. XXII , No. 3, Summer 1977

Vol. 111, No. 2, April 1958

Vol. 111, No. 1, January 1958

DOCID: 3020956 REF ID:A398598

Keywords

Storage

Strategic Warning

Switching Systems

Tape Management

Tape Storage

Technical Intelligence

Telecipher Analysis

Telemetry Processing

Teleprinter Cipher Analysis

TEMPEST

Reference

Vol. I, No. 3, October 1956

Vol. I., No. 1, April 1956

Vol. XVIII, No. 3, Summer 1973

Vol. 11. No. 3, July 1957

Vol. X, No. 4, Fall 1965

Vol. XXII, No. 1, Winter 1977

Vol. XXI, No. 3, Summer 1976

Vol XII, No. 3, Summer 1967

Vol XX, No. 3. Summer 1975

Vol. I, No. 1, April 1956

Vol. XVI, No. 1, Winter 197 1

Vol. XII, No. 4, Fall 1967

Vol. XVI, No. 3, Summer 1971

Vol. XIV, No. 1, Winter 1969

Title

Deposited Films - Magnetic Elements for the Memory of the Future (U)

On Operatorless Computers (U)

Strategic Warning. An Intelligence Gap that NSA Might Fill (U)

Development of Automatic Telegraph Switching Systems (U)

Management of Magnetic Tape 7f3-

Measurement of Insecurity for Imperfect Erasure, A (U)

Drawing to a Straight Flush - A Study in Technical Intelligence (u)

Climbing Jacob's Ladder (U)

Genesis of Mobile Magoo, The (U)

Simplified Exposition of a New Cycle Search Technique (L')

Ambiguity Reduction by Markov Analysis of TEMPEST Signals (U)

Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System (U)

Mathematical Modeling of TEMPEST Channels (U)

TEMPEST Considerations in Automatic Data Processing Equipment Installations (U)

Author

DOCID: 3020956

Keywords I Title

Testing Contextual Testing in Establishing Minimum Working Level Language Proficiency (U)

Thin Film Analysis Introduction to the Methods of Thin Film Analysis, An (U)

Traffic

Traffic Analysis

Training

Transcription

Transistors

Translation

I Introduction to Traffic Analysis (U)

Net Reconstruction - A Basic Step in Traffic Analysis (U)

Some Thoughts concerning Traffic Analysis Mechanization (U1

Traffic Analysis on Soviet Data Transmission (U)

I What is Good Traffic Analysis?

Systems Approach to Training Radiotelephone Technicians, The (U)

Computer Transcription of Manual Morse (U)

Analysis of a Transistor Monostable Multivibrator (U)

CAMINO (U)

Computer, There Is Thy Sting! I (U) I Few Tricks of the Trade for the Translator of Russian, A (U)

Author

Chatter Patterns: A Last Resort (U)

Cleaning the Augean Stables or How Much TA Can a Computer Do? (U)

Reference

Vol. xxv, No. 1, Winter 1980

Summer 1961

Vol. 11, No. 4, October 1957

Vol. XIII, No. 3, Summer 1968

Callimahos, Vol. 111, No. Lambros D. 2, April 1958

n Vol. 111, No. 3, Ju ly 1958

Vol. XI, No. 3, Summer 1966

Vol. XIII, No. 1, Winter 1968

Vol. XXIV, No. 4, Fall 1979

Vol. XVIII, No. 1,Winter 1973

Vol. 111, No. 3, July 1958

Vol. IV, No. 3, July 1959

Vol. XII, No. 3, Summer 1967

Salemme, Arthur Vol. XVI, No. J. 4, Fall 1971

Salemme, Arthur Vol. XI, No. J . 4, Fall 1966

DOCID: 3020956 REF ID:A398598

Keywords

Translation Errors

Transmission

Transmitters

Turing Machine

VHF Intercept

Video

Viet Minh Cover Terms

Title

Freedom in Translation (U) I

Mechanical Translation (U)

Mokusatsu: One Word, Two Lessons (U)

Some Contributions towards a Course in COMINT Translation t U)

Author Reference - -

Vol. XXI, No. 3, Summer 1976

Vol1, No. 1, April 1956

Vol. XIII, No. 4, Fall 1968 and Special Linguistics Issue, I1

Vol. XVI, No. 3, Summer 197 1

Tour of Some Russian Salemme, Arthur Vol. XIV, No. Translation Traps, A (U) J . 4, Fall 1969

Translation of a Classic: A Matter of Ethics, The (U)

Chaco: A Horrible Example (U)

Data Transmission over Telephone Circuits (U)

Gurin, Jacob Vol. XI, No. 2, Spring 1966

Vol. XVIII, No. 3, Summer 1973

Vol. IV, No. 1, January 1959

Antipodal Propagation (U) Gerson, Vol. IV, No. Nathaniel C. I, January

1959

Insolvable Problem, An (U)

Factors Affecting Required Antenna Gain in VHF Intercept (U)

VIDEOFILE: A New Information Storage System (U)

Jacobs, Walter W.

Vol. VIII, No. 3, Summer 1963

Vol I., No.3, October 1956

Vol. XIII, No. 2, Spring 1968

Viet Minh Cover Terms and Caddy, David W. Vol. IV, No. Their Solution (U) 3, July 1959

and Special Linguistics Isssue

DOCID: 3020956

Ib) ( 3 ) - F . L . 86-56

Keywords I Title

Vocabulary

Vocoders

Vietnam

Thrusts and Boggles of Outrageous Escalation, The: A V O C A B U U R Y SURVEY ATTHE NATIONAL WARCOLLEGE (U)

Project EXPLORER (U)

Some Recent Vocoder Studies a t the National Security Agency

Voice Intercept

Voice Problem

Voynich Manuscript

Waveform Recognition

Author Reference

Vol. XVI, No. 2, Spring 1971

! Vol. XIII, No. 2, Spring 1968

Vol. XIII, No. 2, Spring 1968

Vol. XII, No. 4, Fall 1967

1 Learned Organization Issue, 1972

Possible Applications of Gurin, Jacob Vol. XXII, Keyword Recognition in Voice No. 1, Winter Intercept (U) 1977

Nest of Dragons, A: The Voice Gurin, Jacob Problem (U)

Application of Cluster Analysis D'lmperio, Mary and Multidimensional Scaling E. to the Question of "Hands" and "Languages'yn the Voynich Manuscript, An (U)

Application o ( l o the D'Imperio, Mary Voynich Manuscript, An (U) E.

Voynich Manuscript Revisited, The (U)

Voynich Manuscript, The: "The Tiltman,.John H. Most Mysterious Manuscript in Jr . , Brigadier the World" (U)

So You Want to Correlate (U)

Vol. XXI, No. 1 , Winter 1976

Vol. XXIII, No. 3, Summer 1978

Vol. XXIV, No. 2, Spring 1979

Vol. XXI, No. 3, Summer 1976

Vol. XII, No. 3, Summer 1967 and Special Linguistics Issue I1

Vol. X, No. 2, Spring 1965

DOCID: 3020956 -8598

Keywords

Waves

Weather

Working Aids

Writing

Wullenweber Systems

Title Author Reference - -

Error in a Capacitor-Type rotalizer (U)

Weather: Its Role in Communications Intelligence [U)

Computer Scripting (U)

Curiosa Scriptorum Sericorum: To Write But Not to Communicate (U)

U. S. Program in Direction Finding, A (U)

Gerson, Nathaniel C

Vol. 111, No. 4, December 1958

Vol. 111, No. 3, July 1958

Vol. XXIV, No. 1 Winter 1979

Vol. XVI, No. 3, Summer 197 1

Vol. X, No. 2, Spring 1965

(b) ( 3 ) - P . L . 0 6 - 3 6