nsa technical 10urna l - cryptocellarcryptocellar.org/nsa/nsa_tj_1956-80.pdf · nsa . technical...
TRANSCRIPT
DOCID: 3020956
NSA TECHNICAL 10URNA L
CUMULATIVE INDEX
I ' pproved for Release by NSA on 08-1 7-2006, FOlA Case # 12848
APRIL 1956 - FALL 1980
I Dervived From: NSAICSSM 123-2
I Dated 3 Sep 91 Declassify On: Source Marked "OADR"
Date of Source: 3 Sep 91
--
DOCID: 3020956 REF ID:A398598
Note to Readers
This is the second published cumulative index of NSA Technical Journal articles. This index aims a t readability and ease of use. It is sorted three ways: by title of article, by author, and by keywords. Its purpose is twofold: to give readers a general view of the scope of subjects that appeared in the NSA Technical Journal and to provide readers with a means to locate articles they may wish to use as general information on the job or as research tools for operational projects.
We hope you find the index useful and that you will contact the publications staff of the Center for Cryptologic History if you would like copies of an article. You may reach the publications staff a t 972-2895s or 688-2338b. If you send a written request for an article, address it to Center for Cryptologic History, E322, SAB 2, Door 22. Our e-mail address is [email protected].
Barry D. Carleen Chief, Publications
DOCID: 3020956 REF IDtA398598
NSA Technical Journal
Contents
Title Index .................................................. 1
Author Index ............................................... 59
............................................. KeywordIndex 123
.... LLL
REF IDzA398598
NSA TECHNICAL JOURNAL
CUMULATIVE
INDEX
Vol. I. No. 1, April 1956
to
Vol. XXV. No. 4, Fall 1980
DOCID: 3020956
NSA Technical Journal '(b) (3)-P.L. 86-36 Indexed by Title
Title I Author Reference Keyword
ABC of Cifax, The (U) Vol. I, No. 2, Communications July 1956 Facsimile
Privacy
ABC of Ciphony, The (U)
ABNER: The ASA Computer Part 1: Design (U)
ABNER: The ASA Computer Part 2: Fabrication, Operation, and Impact (U)
About NSA (U)
Abstract Groups Defined by Generating Operators (U)
Addendum to "A Cryptologic Fairy Tale" (U)
African Language Problem at NSA,The (U)
ALRIGHT - A Map Overlay Generator (U)
Ambiguity Reduction by Markov Analysis of TEMPEST Signals (U)
Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System (U)
Analysis of a Transistor Monostable Multivibrator (U)
Vol. I, No. 2, Ciphony July 1966, Coding and Special Processing Linguistics Signals Issue
Snyder, Samuel Vol. XXV, Computers S. No. 2, Spring Cryptologic history
1980
Snyder, Samuel Vol. XXV, Computers S. No. 3, Cryptologic history
Summer 1980
Vol, IV, No. History 1, January NSA 1959
Sinkov, Abraham April 1960 Groups Operators
Tiltman, John H., Vol. XVIII, Cryptanalysis Brigadier No. 1, Winter
1973
Vol. XI, No. African language 3, Summer 1966
Vol. XI, No. Mapping 2, Spring 1966
Vol. XVI, No Signals 1, Winter TEMPEST 1971
Vol. XII, No. Signals 4. Fall 1967 TEMPEST
Vol. IV, No. Circuits 3, July 1959 Transistors
DOCID: 3020956
Title I Author Reference Keyword
Callimahos, Vol. XIV, No. Cryptanalysis Lambros D. 2, Spring Plain text
1969
Analysis of Lexical Meaning Vol. XIII, No. Communications across Cultures, An (U) 4, Fall 1968 Language
Analysis of Sorting Techniques for Multiple Signal Intercept (If)
Analysis of Thin Film Germanium Epitaxially Deposited onto Calcium Fluoride (U)
I Anglicisms in Puerto Rico (U)
Another Derivation of Binary Error Rates as a Function of Signal-to-Noise Power Ratio foe Various Modulation Schemes (U)
Antipodal Propagation (U)
APL Mechanization of Indirect Symmetry (U)
Apparent Paradox of Bayes Factors, The (U) I
Val. XII, NO. COMINT target 3, Summer identification 1967
Vol. VIII, No. Physics 2, Spring 1963
Vol. VIII, No. Ciphers 2, Spring Computer 1963
Vol. XVII, Spanish language No. 1, Winter
Vol. X, No. 3, Summer 1965
Collection Signal-to-noise ratio
Gerson, Vol. IV, No. Nathaniel C. 1, January
1959
Radio waves Transmitters
Vol. XVII, No. 3, Summer 1972
I Vol. X, No. 1, Winter 1965
Application of Cluster Analysis Vol. XXIII, and Multidimensional Scaling No. 3, to the Question of "Hands" and Summer 1978 "Languages" in the Voynich Manuscript, An (U)
Application of Fourier Special Fast Transforms to Combiners (U Fourier
Transform - Issue. Augvsl
Computer languages
Bayes factors Cryptanalysis
Cluster analysis Voynich Manuscript
Title I Author Reference Keyword
Application of Human Factors to the Specification and Design of Interactive Computer Systems
Application of Queuing Theory to Computer Systems, An (U)
D'Imperio, Mary 7;;n
Approximation of Central Limits (U)
Approximations to the Distjibution Function of Sums of Independent Identically Distributed Random Variables
Vol. XXIV, Computers No. 4, Fall Human factors 1979
Vol. XIX, No. Cr tianalysis 4. Fall 1974 F b l p r i t h m
Em25$w Manuscript 1979
APT System, The (U) I I
Vol. XIV, No. Computers 2, Spring Queuing theory 1969
Vd. XXIV, Cryptanalysis No. 3, Key generators Summer 1979
Vol. IV, No. Random variables 4, October 1959
Vol. X, No. 2, Mathematics Spring 1965
Vol. XXIII, Computers No. 3, Data processing Summer 1978
Are the Russians Gaining Salemme, Arthur Spring 1961 Russian language Wordwise? (U)
Aristocrat -An Intelligence Test for Computers (U)
Arithmetic of a Generation Principle for an Electronic Key Generator, The (U)
Arithmetic of the Addition Generation Principle for Electronic Key Generators (U)
Campaigne, Vvl. VII, No. Computers Howard H. 2, Spring Cryptanalysis
1962 I
Vol. 11, No. 1, Mathematics January 1957
I I ~ o l . 11. No. 3, Mathematics
I July 1957
DOCID: 3020956
Title
Arithmetic of the Linear Generation Principle for Electronic Key Generators, The (U)
Arithmetic of the Multiplication Generation Principle in the Koken Key Generator, The (U)
Art of Automatic Bearing Instrumentation, The (U)
Asian Communist Aircraft Location Systems (U)
Assignment Algorithm Applied to Manual Cryptosystems (U)
Assignment of Storage Space in Rapid-Access Memory Systems (U)
Association Factor in Information Retrieval, The (U)
Attack on Blair-Huffman Encipherments, An (U)
Automatic Maintenance (U)
Automa.ic Signal Identification
7
Author Referehee Keyword I Vol. 11, No. 4, Mathematics October 1957
I I
Vol. Il, No. 2, Mathematics April 1957
(b) (1) (b) ( 3 ) - 5 0 U S C
Vol. XVlII, Mathematics 4 0 3 No. 4, Fall (b) ( 3 ; - P . L . 1973 86-36
Vol. XX, No. Aircraft tracking 1, Winter 1975
Vol. XX, No. Computers 1, Winter Cryptanalysis 1975
Vol. 11, No. 2, Addressing Systems April 1957 Memory
I Winter 1961 Computers Information retrieval 1 S i n g 196 1 , Cipher
Vol. I, No. 1, Hagelin machines April 1956
Meyer, Joseph A. Vol. IX, No. Computers 1, Winter Maintenance
Special Issue, Signal identification January 1971 1 Vol. XXIV, Cryptosystem No. 2, Spring identification 1979
Bar Statistics, The (U)
Bar Statistics, The (U) (b: (1 i jt) ( > ) - ? I 1 USC 403 (b) (31-13 IJSC 748 ('K; ( - 3 ) - P . L . eG-36 L
Vol. VIII, No. Mathematics 2, Spring 1963
Vol. VIII, No. Mathematics 4, Fall 1963
DOCID: 3020956 9 8 5 9 8 (bl(3)-P.L. 86-36
Title
Bayes Marches On (U)
"Binary" System for Complex Numbers, A (U)
Bipolar Coding and Baseband Recovery (U)
Birth of ATLAS I (U)
Boer War Cipher, A (U)
Book Review: A History of NSA General-Purpose Electronic Digital Computers 7C3XTW
Book Review: Basic Crrptologic Glossary
Book Review: Cloak & Cipher (U)
Book Reuiew: Cryptanalysis of the Single Columnar Transposition Cipher (U)
Book Review: Lincos, Design of a Language for Cosmic Intercourse, Part I (U)
Book Review: Lost Languages (U)
Book Review: Mathematical Statistics (U)
I Author Reference Keyword
I Callimahos, Lambros D.
January 1960 Cryptanalysis Mathematics
Vol. X, No. 2, Mathematics Spring 1965 and Computer and Information Siences Issue
Vol. XII, No. Basebands 1, Winter Codes 1967
Vol. XVIII, Computers No. 1,Winter Cryptanalysis 1973
Vol. X, No. 3, Ciphers Summer 1965 Cryptologic history and Vol. X, No. 4, Fall 1965
Vol. IX, No. Book review 2, May 1964 Computers
Vol. XI, No. 1, Winter 1966
Vol. VII, No. 3, Summer 1962
Summer 1961
-1 Vol. VII. No. 1, Winter 1962
Fall 1960
Vol. VII, No. 4, Fall 1962
Book review Cryptology
Book review Cryptanalysis
Book review Cryptanalysis
Book review Communications Extraterrestrial
intelligence
Book review C r y ~ ~ l 0 g ~
Book review Mathematics
DOCID: 3020956
Title 1 Author Reference Keyword
Book Review: Mechanical Resolution of Linguistic Problems (UI
Campaigne, Howard. H.
Vol. 111. No. 4, December 1958
Book review Computers Language
Book Review: Military Cryptanalytics, Part I1 (U)
Campaigne, Howard H.
Vol. IV, No. 4, October 1959
Book review Cryptanalysis Military
Book Review: Modern Probability Theory and Its Applications (U) t-l Fall 1960 Book review
Probability theory
Book Review: Norse Medieval Cryptography in Runic Carvings (U)
Vol. XIII, No. 3, Summer 1968
Book review Cryptologic history
Fall 1960 Book review Probability theory
Book Review: Probability: An Introduction (U) I Book Review: Recent Literature on Algebraic Cryptography (U) u Vol. VII, No.
2, Spring 1962
Book review cr~~tof3raphy Mathematics
Book Review: The Broken Seal Callimahos, (U) I Lambros D.
Vol. XII, No. 3, Summer 1967
Book review Cryptologic history
Vol. XI, No. 2, Spring 1966
Book review Spanish cryptography
Book Review: TRATADO DE CRIPTOGRAFIA (u )
Book Review: "Analyses of the Case n = 3 in Algebraic Cryptography with Involutory Key-Matrix and Known Alphabet " (Journal fiir die Reine und Angewandte Mathemtik) (U)
Campaigne, Howard H.
Vol. IX, No. 3, August 1964
Book review Cryptanalysis
Vol. XII, No. 2, Spring 1967
Book Review: "How to Estimate Probabilities," (Journal of the Institute of Mathematics and Zts Application) (U)
Book review Mathematics
Campaigne, Howard H.
Book Review: "Involutory Cornmutants with Some Applications to Algebraic Cryptography, I" (Journal fiir Reine und Angewandte Mathemtik) (U)
Campaigne, Howard H.
Vol. XII, No. 1, Winter 1967
Book review Mathematics
DOCID: 3020956
(b) 3)-P.L. 86-36
Reference Keyword Title -
B m k Review: "Some Applications of High Speed Computers to the Case n = 2 of Algebraic Cryptography," (Mathematics of Computation,
Mathematics
Author
Vol. 15, No. 75) (U)
Book Review: "Some Further Methods in Algebraic Cryptography"; (Journul of the Mitchell Scientifi Society. No. 74) (U)
Book Review: "Variable Matrix Substitution in Algebraic Cryptography" (U)
Book Reviews: Pearl Harbor: Warning and Decision, Roberta Wohlstetter; But Not in Shume, John Toland; The Secret War, Sanche de Gramont; CIA - The Inside Story, Andrew Tully; Now I t Can Be TOM, Leslie R. Groves; Thinking About the Unthinkable, Herman Kahn; Strike in the West, James Daniel and John G. Hubbell (U)
Campaigne, Fall 1960 Book review Howard H. Mathematics
Campaigne, Vol.IV,No. Bookreview Howard H. 4, October Cryptography
1959
Unknown Vol. VIII, No. Book review reviewer 1, Winter Cryptologic history
1963
Bookbreaking Improvisations - Part I (U)
Bookbreaking Improvisations - Part I1 (U)
Borders of Cryptology, The (U)
Broadband Planar Log-Periodic Feed for the Spherical Reflector Used a t Arecibo Ionospheric Laboratory (U)
CAM I1 (U)
CAMINO (U)
Vol. XI, No. Bookbreaking 3, Summer Code 1966
Vol. XI, No. Bookbreaking 4, Fall 1966 Code
Vol. IV, No. Cryptology 4, October Electronic warfare 1959
Vol. X, No. 3, Antennas Summer 1965 Collection
Vol. IX, No. Computers 2, May 1964 Memory
Val. XII, No. Computers Virginia Jenkins 3, Summer Translation
1967
DOCID: 3020956
Title I Author Reference Keyword
Can Cryptologic History Repeat Itself? (U)
Can We Lick the Voice Problem? (U)
CANDEW: A Methodology for Evaluating HF Collection Potential (U)
CAPER Software Support System, The (U)
Capture-Jamming of SICINT Targets (U)
Categories of Cryptographic Phenomena -with a Few Examples of Effect and Cause (U)
CATNIP: Computer Analysis - Target Networks Intercept Probability (U)
Centralized Computer Support of Field Activities (U)
Cepstrum Vocoder, A (U)
Chaco: A Horrible Example (U)
Channel Modeling and Code Performance Evaluation (U)
Friedman, Vol. XMII, Cryptologic history William F. No. 3,
Summer 1973 L
1 Yol. XVII. Communications (b ) ( 1 i No. 3, (b) (3)-50 USC
Summer 197 4 0 3 (b) (3: -18 USC
Vol. XXII, HF collection 7 9 8 NO, 3, (b) (3)-P.L. Summer 1977 $6-36
I Vol. XXII, Software support No. 2, Spring Soviet 1977
Meyer, Joseph A. Vol. XII, No. Communications 2, Spring Cryptanalysis 1967
1 Vol. XII, No. Cryptography 4, Fall 1967
Vol. XVI, No. Collection 1, Winter Intercept 1971
Special Computer systems Council of Field sites Learned Organization Issue, 1972
I Special Issue, Communications January 197 1
Vol. XVIII, Translation errors No. 3, Summer 1973
i Vol. XXIII, Channels No. 2, Spring Communications 1978 and Special Mathematics and Engineering Issue, 1981- 1983
DOCID: 3020956
Keyword Title Author Reference
Russian language characteristic Features of the Russian Language of the Last Decade (U)
Chatter Patterns: A Last Resort (U)
Cipher Signal Phase Modulation (U)
Classes of Rotors without Parallels (U)
Cleaning the Augean Stables or How Much TA Can a Computer Do? (U)
Climbing Jacob's Ladder (U)
Cluster Analysis: Introduction to Models and Methods (U)
Cold-Cathode Counter Tube Study, A (U)
Chatter Traffic
Vol. XI, No. 2, Spring 1966
Vol. 11, No. 4, October 1957
Vol. XIV, No. 2, Spring 1969
Vol. X, No. 4, Fall 1965
Vol. XIII, No. 3, Summer 1968
Vol. XII, No. 3, Summer 1967
Vol. XXII, No. 2, Spring 1977
Vol. 111, No. 4, December 1958
Ciphers Modulation
Cryptanalysis Mathematics
Collected Editorials of Sydney Fairbanks (U)
Collection Management (U)
Collection of LINCOMPEX Signals (U)
Combining Functions in Key Generators (U)
COMNT Analysis and Reporting on the Developing Nations (U)
C ~ M I N T Satellites - A Space Problem (U)
Computers Traffic analysis
Fairbanks, April 1956 - Sydney July 1959
Vol. XIV, No. 1, Winter 1969
Vol. XVII, No. 2, Spring 1972
Spring 1961
Vol. XVII, No. 2, Spring 1972
Vol. IV, No. 4, October 1959
Computers Telecipher analysis
Mathematics
Pulses
Editorials
Collection management
Collection Signals
Keys Shift registers
Analysis COMINT Reporting
Communications satellite
DOCID: 3020956
Title 1 Author Reference Keyword I
COMINT Signals ~rends'('SBCQ! Vol. XXV, COMINT No. 2, Spring Signals trends
I 1980
COMINT - Hard Facts in the Cold Spring 1961 Communications War (U) Ethics
Vol. 11, No. 2, April 1957
Communications Intelligence Vol. 11, No. 2, COMINT (U) April 1957 Intercept
Communications Security and Special Computers Computers (U) Council of COMSEC
Learned Organization Issue, 1972
Communications with Extraterrestrial Intelligence (U)
Community Impacts on NSA Systems (U)
Comparison of the Efficiency of Two Methods of Estimating Certain Time Parameters, A (U)
Compiler Object Code Optimization (U)
I Callimahos, Lambros D.
Composition of Boolean Functions I (U) I Composition of Boolean Functions I1 (U)
Computer Applications: The Insatiable Appetite of the Analyst (U) 1
Vol. XI, No. Communications 1, Winter Extraterrestrial 1966 Intelligence
Vol. XXIII, Computers No. 3, Data processing Summer 1978 Networking
Vol. IX, No. Mathematics 2, May 1964
Vol. XVII, Compilers No. 1, Winter FORTRAN 1972
Special Fast Mathematics Fourier Issue, August 1973
Special Fast Mathematics Fourier Issue, August 1973
Vol. XIX, No. Computers 4, Fall 1974
Computer Automation of Circuit u Vol. VII, No. Circuit analysis Analysis (U) 4, Fall 1962 Computers
I DOCID: 3020956
Title I Author Reference Keyword
Computer Generation of Unrelated Latin Squares (U)
Computer Graphics in an Engineering Simulation Program (U)
Computer Processing of Natural Languages (U)
Computer Processing of Soviet Telemetry (U)
Computer Program Debugging: A New Era (U)
Computer Scripting (U)
Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer
Computer Sorting (U) I
Computer Transcription of Manual Morse (U) I Computer, There Is Thy Sting! (U)
Computer-Aided Bookbreaking of Two-Part Codes (U)
Vol. X. No. 3, Summer 1965
Vol. XVII, No. 2, Spring 1972
Special Council of Learned Organization Issue, 1972
Vol. XIII, No. 3, Summer 1968
Vol. XIII, No. 2, Spring 1968 and Special Computer and Information Sciences Issue
Vol. XXIV, No.1, Winter 1979
Vol. x x v , No. 4, Fall 1980
Cryptanalysis Latin squares
Computer programming
Computers Language processing
Computers Soviet telemetry
Computers Debugging
Computers Language Working aids
Communications Frequency hopping Jamming
Vol. XIII, No. Computers 3, Summer 1968
Vol. 111, No. Computers 3, July 1958 Manual morse
Transcription
Salemme, Arthur Vol. XVI, No. Computers J. 4, Fall 1971 Russian
Translation
Vol. XVII, Bookbreaking No. 2, Spring Computers 1972
DOCID: 3020956
Title
Computerized Depth Reading (U)
Computers and Advanced Weapons Systems (U)
Computers and Linguists Do Mix (U)
Computers and Queues (U)
Computers -The Wailing Wall (U)
COMSEC at WD S i t e s w
Conjugate Codebooks (U)
Content - Addressed Memaries (v)
Contextual Testing in Establishing Minimum Working Level Language Proficiency (U)
Continued Fractions and Mills' Algorithm (U)
Convergence Techniques for Finding Linear Approximations (U)
Convolutions, Cube Roots, and Computer Cryptography (U)
Cooley-Tukey Fast Fourier Transform for Base 4 and Base 4+ 2 (U)
Author Reference Keyword
Vol. XVII, Computers No. 1, Winter Cryptanalysis
Special Advanced weapons Council of systems Learned Computers Organization Issue, 1972
Vol. XVI, No. Computers 3, Summer Linguists 1971
January 1960 Computers Processes Queues
Meyer, Joseph A. Vol. I, No. 3, Codes October 1956 Cryptanalysis
Vol. VII, No. COMSEC Nathaniel C. 4, Fall 1962
Vol. XXII, Cryptanalysis No. 3, Summer 1977
Vol. IX, No. Computers 1, Winter Memory 1964
Vol. XXV, Language proficiency No. 1, Winter Testing 1980
Vol. XXV, Mathematics No. 3, Summer 1980
Special Fast Mathematics Fourier Issue, August 1973
Vol. XVIII, Computers No. 3, CryptotZra~h~ Summer 1973
Vol. XVII, Mathematics No. 4, Fall 1972
Author Reference Keyword
Vol. XIV, No. Signals analysis
Title -- -
Correlation and Power Spectra of Randomly Sampled and Held Signals (U)
2, Spring 1969
Vol. XVII, Military addresses No. 3, Summer 1972
Correlation of Frequency of Appearance of Military Unit Addresses to Unit Echelon and Combat Readiness Status (U)
Cost-Effectiveness Study of Spectrum Surveillance Systems, A (U)
Vol. XIV, No. Collection 3, Summer 1969
Vol. XVI, No. 4, Fall 1971
Mathematics Cosymmetric ~pproximations to Combining Functions (U)
Coupon Collecting and Cryptology (U) I Vol. XI, No.
4, Fall 1966 Cryptanalysis Mathematics
Cover and Deception (U) I Vol. IV, No. 3, July 1959
Communications Deception
Cranks, Nuts, and Screwballs (U)
Vol. XI, No. 1, Winter 1966
Security
Vol. XI, No. 2, W i n g 1966
Creation of an Artificial Ionosphere to Extend the Radio Horizon for Frequencies below 100 MC, The (U)
Communications
I Zoebelein, Vol. XXII, Arthur J. No. 1, Winter
1977
Vol. X, No. 1, Winter 1965
Crisis Management in the National Senior Cryptologic Course (U)
Crisis management Decision making
Computers On-line processing
Cryptanalysis German air force
Cryptanalysis in the German Air Force (U)
Vol. IV, No. 2, April 1959
Callimahos, Vol. XVI, No. Lambros D. 4, Fall 1971
Ciphers Cryptanalysis
Cryptanalyst's Nightmare: An Oneiric Problem and Its Solution, A (U)
Vol. IX, No. 3, August 1964
Cryptanalytic Applications of Sequential Analysis (U)
Cryptanalysis Mathematics
Vol. IX, No. 3, August 1964
Computers Cryptanalysis
Cryptanalytic Use of High- Speed Digital Computing Machines (U)
DOCID: 3020956 9 (h) ( 3 ) - k . I . 8 h - ? G
Title
Cryptologic Fairy Tale, A (U)
Cryptologist: Can He Exist?, The (U)
Curiosa Scriptorum Sericorum: To Write But Not to Communicate (U)
cxco Story, The (U)
CY-600 View of Language, A (U)
Author Reference Keyword
Tiltman, John H., Vol. VII, No. Cryptologic history Brigadier 2, Spring Germany
1962
Vol. 11, No. 3, Cryptologists July 1957
Vol. XVI, No. Communications 3, Summer Writing 1971
Vol. XVI, No. Cryptanalysis 4, Fall 1971 Cryptologic history
Vol. XVIII, Language
I No. 3, Linguists Summer 1973
Cybernetics and Problems of Diagnostics: the Parallels between Medicine and Cryptanalysis (U)
Cycles from Nonlinear Shift Registers (U)
Darlington Compound Transistor as a Current Controlled Voltage Source, A (U)
Data Management Challenge. The (U)
Data Standardization and the Trace Factor (U)
Callimahos, Vol. XIV, No. Cryptanalysis Lambros D. 1 ,Winter Information analysi
1969
Special Shift registers Mathematics and Engineering Issue, 1981- 1983
Vol. IX, No. Electricity 4, Fall 1964
Vol. XVI, No. Computers 2, Spring Data management 1971
Vol. XVI, No. Data standards 2, Spring Information 1971 management
Data Standards for SICINT Vol. XVI, No. Data standardizatia Activities - Some Conflicting 1, Winter Objectives (U) 1971
Data Structures and Their D'Imperio, Mary Voi. IX, No. Computers Representation in Storage: Part 3, August Memory I (U) 1964
DOCID: 3020956
Reference Keyword
11 (U)
Data Transmission over Vol. IV, No. Digital data Telephone Circuits (U)
Database Services (U)
De Profundis; or the ABC of Vol. 11, No. 1, Cryptography Depth Reading (U) January 1957 Monoalphabetic
substitution
Debugging Made Easier (U) Vol. 111, No. Computers 4, December Debugging
Degrees of Freedom in an N-b Vol. I, No. I , Frequency Frequency Distribution (U) April 1956 Distribution
Deposited Films -Magnetic Vol. I, No. 3, Films Elements for the Memory oft October 1956 Storage Future (U)
Der Fall WICHER: German Meyer, Joseph A. Vol. XX, No. Cryptologic history Knowledge of Polish Success 2, Spring ENIGMA ENIGMA (U)
Design and Implementation o Vol. XXIII, Morse Digital Demodulator for Use No. 2, Spring Signals against On-Off Keyed Signals, The (UI
Designing Secure Reliable Vol. XXI, No. Computer security Software - A Methodology (U) 4, Fall 1976 Software
Determination of Missile and April 1960 Earth satellites Earth Satellite Trajectories Orbits from Radar Observations (U)
Determining Intercept Vol. XII, No. Intercept Assignments (U)
Development of Automatic Vol. 11. No. 3, Circuits Telegraph Switching Systems July 1957 Switching systems (U) u
DOCID: 3020956 I
I (31-P.L. 86-36 I
ib) (1) (b) (3'-50 USC 403 (b) (3) -18 USC
Reference 798
(b) (3)-P.L. 86-36
April 1956 translators
Vol. XXIV, Communications No. 1, Winter Morse code
Dialect: A Data Type for the Vol. XXII, Computers Person-Machine Interface (U)
Did Alexander Popov Invent January 1960 Radio Radio? (U)
Digitizer Queuing Model for Vol. XIV, No. Collection FROSTING (U) 4, Fall 1969 Queuing theory
Distribution of Letters in Shor Vol. XIV, No. Ciphers Messages of English, The (U)
Distribution of the Maximum Vol. VII, No. Binary stream Bulge in a Flat Random Binary 4, Fall 1962 Probability Stream, The (U)
Distribution of C b4 (u, f), The Special Fast Mathematics (U)
Don't Be Too Smart (U) January 1960 Codes Japanese military
Double Transposition - A Special Case (U)
Tiltman, John H., Vol. XVII, Cryptanalysis Brigadier No. 4, Fall
1972
Drama in Cryptologic Life (U) Callimahos, Vol. XIX, No. Cryptologic history Lambros D. b 1, Winter
1974
Drawing to a Straight Flush - A Vol. XXI, No. ELINT
Study in Technical Intelligence 3, Summer Technical intelligence (u) 1976
Earliest Applications of the Computer a t NSA (U)
Snyder, Samuel Vol. XVIII, Computers S. No. 1,Winter
1973
DOCID: 3020956 -398598
Title
Education in Diagnosis (U)
Ekctrical and Magnetic Projpertb~ of Comput@r Ta* (u) Electrical Design of Random Sequence Generators (U)
Electron Beam Recording for Wideband Analog Signals (U)
Electronic Calligraphy (U)
Author Reference Key word - . . -
1, Winter 1969
Vol. IX, Nu. Digital r e c o r d i n ~ I, Wintrr IBM 198$
Val. IX, No. Encryption 3, August 1964
Vol. XIV. No. Recording 3, Summer Signals 1969
Vol. XI, No. Calligraphy 1, Winter 1966
Elements of Shift Register Cryptology (U)
Emergency Destruction of Documents (U)
Vol. XVI, No. Cryptology 2, Spring Mathematics 1971
Vol. I, No. 1, Document April 1956 destruction
Employment of Military Linguists (U)
Entropy of German, The (U)
Enumeration of the Square Permutations of the Symmetric Group (U)
Error Formula for Iterative Prefiltering Frequency Estimates, An (U)
Error in a Capacitor-Type
Gurin, Jacob Vol. XIII, No. Military linguists 4, Fall 1968 and Special Linguistics Issue, 11
Vol. I, No. 2, Frequency July 1956 Probability
Vol. XVIII, Cryptomathematics No. 4, Fall 1973
Vol. XXII, Frequency No. 3, Linear prediction Summer 1977
Vol. 111, No. Pulses Totalizer (U) 4, December Waves
1958
Errors in High Frequency Vol. IV, No. Direction finding Direction Finding (U) 1, January
1959
DOCID: 3020956 98 iti(3I-P.L. 8 6 - 3 6
Title I Author Refe~ence Key word
Estimating the Number of Solutions in [GF (2)P of a System of Equations over the Integers (U)
Euclidean Algorithm and Distances between Wheel Settings, The (U)
Evaluating Intercept Systems (U)
Evaluating Intercept Techniques (U)
Exact Markoff Probabilities from Oriented Linear Graphs (U)
Example of Computer Graphics as Applied to Key Analysis, An (U)
Example of Substantive Analysis, An (U)
Experiences 1920-1939 (U)
Experimental Approach to an 'Environment Study in the HF Band (U)
Extending the Radio Horizon for Intercept Purposes by Using the Moon as a Reflector (U)
Extensible Model of a Hand Cryptosystem, An (U)
Extraterrestrial Intelligence (Ul
Extreme Values in Cryptanalysis (U)
Tiltman, John H., Val. XVII, Brigadier 1 No. 3,
Summer 1972
Vol. VIII, No. 4, Fall 1963
I Vol. X, No. 2, Spring 1965
Vol. XXIII, No. 1, Winter 1) 1978
Campaigne, Vol. XI, No. Howard H. 2, Spring
I 1966
Vol. IV, No. 4, October 1959
Mathematics
Cryptanalysis Mathematics
Signals
Intercept evaluation
Mathematics
Computer graphics
Analysis Soviet
Cryptologic history
Collection Signals
Intercept Signals
Computers Cryptanalysis
Communications Extraterrestrial
Intelligence
Cryptanalysis
DOCID: 3020956 e l 4 3 9 8 5 9 8 n
Title
Factors Affecting Required Antenna Gain in VHF Intercept (U)
Faithful Mirror. The (U)
"False Friends" of the Translator in the English and Russian Languages: A Translation from the Russian of V. V. Akulenko (U)
Fallacy of the One-Time-Pad Excuse, The (U)
Author Reference Keyword
Vol I., No.3, Antenna gain October 1956 VHF intercept
Vol. XIV, No. Bookbreaking 1, Winter 1969
Vol. XVI, No. Russian translation 4, Fall 1971
Vol. XIV, No. Cryptanalysis 3, Surntner 1969
Fallacy of the Systems Meyer, Joseph A. Vol. VII, No. Engineering Approach, The (U) 3, Summer
1962
Famous First Facts, NSA, Part Vol. XVII, Computers I: Pre-Computer Machine No. 4, Fall Cryptanalysis (U) 1972
Fast Dynamic Programming Vol. XXI, No. Mathematics Algorithm and Its Mathematical 1, Winter Basis, A (U) 1976
Fast Look-up in a Threaded Vol. XVI, No. Dictionary references Dictionary (U) 1, Winter
1971
FDM Activity Detection (U) Vol, XXI, No. FDM signals 1, Winter 1976
Few Tricks of the Trade for the Vol. XI, No. Russian language Translator of Russian, A (U) 4, Fall 1966 Translation
Finding the Best-Scoring Vol. XIV, No. Mathematics Permutation (U) 4, Fall 1969
"Fingerprinting" Code Croups Vol. XVII, Bookbreaking by Computer (U) No. 3, Computers
Summer 1972
FIR: A CDC 1604 Program for Vol. X, No. 1, Computers Solution of Systems of Linear Winter 1965 Mathematics Equations (U)
Title
Flattening Effect, The (U)
"Food for Thought" in LVHF Reception (U)
Foreign vs. U.S. Computers: An Appraisal (U)
Fourier Analysis on Finite Abelian Groups (U)
Fourier Coefficients and Function Decomposition (U)
Fourier Modulus Method of Cage Identification (U)
DOCID: 3020956 9 9 8 {b (31-P.T. 96-36
Author Reference Keyword
Kullback, Val. X, No. 1, Cryptology
20
-- - - -- -
Solomon
i
Winter 1965 Mathematics
Vol. XX, No. LVHF collection 4, Fall 1975
Special Computers Council of Learned Organization Issue, 1972
Vol. XXI, No. Mathematics 3, Summer 1976
Special Fast Mathematics Fourier Issue, August 1973
April 1960 Cryptanalysis
Vol. XVII, Bookbreaking No. 1, Winter Computers 1972
Vol. XXI, No. Translation 3, Summer 1976
Vol. XVI, No. Signals analysis 1, Winter 1971
Vol. IV, No. Digital circuits 4, October Logic 1959
Vol. VIII, No. COMINT
Frame Versus Corpus (U)
Freedom in Translation (U)
Frequency Analysis of a Set of Harmonically Related Tones (U)
Fundamentals of Majority Logic (U)
Future Problems of Intercept (U) Gerson.
FUZZY: An Evolutionary Model for Data Structures (U)
Garden Paths I Have Followed
Nathaniel C. 1, Winter ELINT 1963
Vol. XXIV, Programming No. 3, Software Summer 1979
Vol. IX, No. Cryptanalysis
(U) 3, August 1964
GEE System - I, The (U) Unknown t- Fall 1961
Cryptologic history Germany
DOCID: 3020956 9 9 8 5 9 8
Title I Author Reference Keyword
GEE System - 11, The (U)
GEE System - 111, The (U)
GEE System - IV, The (U)
GEE System - V, The (U)
GEE WHIZZER (U)
Generalizations of "Maximum- Entropy" (Pattern) Analysis (U)
Generating Function Approach to GRETAG, A (U)
Generating Random Characters on a Computer (U)
Generation of Permutations (U)
Genesis of Mobile Magoo, The tU)
Geodetic Latitude and Altitude from Geocentric Coordinates (LJ)
Geometric Approach to Waveform Recognition, A (U)
German Agent Systems of World War II*
German Radio Intelligence (U)
Unknown Vol. VII, No. Cryptologic history 1, Winter Germany 1962
Unknown Vol. VII, No. Cryptologic history 2, Spring Germany 1962
1 unknown Vol. VII, No. Cryptologic history 3, Summer Germany 1-1 1962 ( 9 ) ( 3 1 - P . L . 66-36
I b Vol. VII, No. Cryptologic history I 1 4, Fall 1962 Germany
I
Unknown Vol. VIII, No. Cryptanalysis 1, Winter 1963
Vol. XXIV, No. 2, Spring 1979
Vol. XXII, No. 1, Winter 1977
Vol. XII, No. 1, Winter 1967
Vol. IX, No. 2, May 1964
Vol. XX, No. 3, Summer 1975
Vol. XX, No. 1, Winter 1975
Vol. VIII, No. 2, Spring 1963
Vol. VII, No. 3, Summer 1962
Vol. x x v , No. 4, Fall 1980
Signal theory
Mathematics
Code generation Computers
Telemetry processing
Astrodynamics Mathematics
Mathematics
Cryptologic history Germany South America
Cryptologic history German COMINT
DOCID: 3 0 2 0 9 5 6
Title
German Tiresand Black Cats: Estimation of Population Size (U)
Graceful Degradation through Distributed Intelligence (U)
Author Reference Keyword
Growing up with Computers a t NSA EU)
Graph Theory (U)
Gweeks Had a Gwoup for It, The (U)
I
Handle with Care: Russian Transliteration (U)
Help Stamp Out Programming (U)
Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Saling, The (U)
High-Speed Automatic Scanning of Speech Bandwidth Channels (U)
Hill Climbing (U)
--
Vol. XIX, No. Cryptanalysis 3, Summer 1974
Vol. XXIII, Computers No. 3. Summer 1978
Vol. XII, No. Mathematics 3, Summer 1967
Eachus, Joseph, Special Computers 1 Council of
Organization I Learned Jacobs, E. Dale Issue, 1972 Marston, Charles J. Schierlmann, Samuel S. Snyder; Moderator, Howard H. Campaigne
Filby. P. W. Vol. XXI, No. Bletchley Park 2, Spring Cryptologic history 1976
Salemme, Arthur Vol. XII, No. Russian 4, Fall 1967 transliteration
Jacobs, Walter Vol. XIV, No. Computer 1". , t g ~ r n e r programming
Vol. XXI, No. Cryptanalysis 4, Fall 1976
Vol. XX, No. Speech scanning 4, Fall 1975
Vol. X, No. 4, Mathematics Fall 1965
DOCID: 3020956 -A398598 A
How Can the Communications Sciences Contribute to the Study of Natural Systems? (U)
Title
Hoopscotch (U)
How the Germans Broke a U.S. Code (U)
Author Reference Keyword
Vol. XII, No. Games 2, Spring 1967
How the Japanese Army Water Transport Code 2468 Was Broken (U)
How to Choose a Cood Crib (U)
How to Visualize a Matrix (U)
Human-Machine Interfaces for NSA Computer Systems (U)
Hybrid Circuits (U)
IFF: A New Branch of Cryptology (U)
In General t h n t e r a t i o n
Inexpensive Device for Pictorial Input and Output, An (U)
Informa tion Storage and Retrieval (U)
Information Theory and the Packing of Spheres (U)
( D'Imperio, Mary
Vol. XX, No. Collection 2, Spring 1975
Vol. VIII, No.. 3, Summer 1963
Fall 1960
Vol. XVIII, No. 4, Fall 1973
Vol. X, No. 4, Fall 1965
Vol. MII, No. 3, Summer 1963
Vol. XXIV No. 4, Fall 1979
Communications Cybernetics
Codes Germans
Cryptologic history Japan
Cryptanalysis
Mathematics
Computers SOLIS
Vol. 111, No. Circuits 1, January 1958
Vol. 11, No. 4, IFF October 1957 Planes
Vol. XII, No. Mathematics 1, Winter 1967
I
January 1960 Computer graphics
1 Vol. VIII, No. Information retrieval
I 1 4, Fall 1963
Vol. IV, No. Information theory 2, April 1959
-
DOCID: 3020956 -98 ibi(3 -P.L. 86-36
Title Author
Information Theory Applied to Computer Data Compression (U)
Insolvable Problem, An (U)
Reference Keyword
Vol. XXIII, Computers No. 4, Fall Data compression 1978 and Special Mathematics and Engineering Issue, 1981- 1983
Vol. VIII, No. Computers 3, Summer Cryptology 1963 Turing machine
Instant Expertise (U) Unknown Vol. XII, No. Buzzwords 1, Winter 1967
Integrated and Guided Wave Optics and Device Applications (U) r Vol. XXIV, Optics
No. 2, Spring Signals processing 1979 and Special Mathematics and Engineering Issue, 1981- 1983
Intercept and Electtomagnetics Gerson, Vol. XX, No. (U) Nathaniel C. 2, Spring
1975
Intercept of USSR Missile Gerson, Vol. IV, No. Transmissions (U) Nathaniel C. b 3, July 1959
Intercept System Analysis (U) Vol. XI, No. 2, Spring 1966
Interference and Intercept (U) Gerson, Vol. XVI, No. Nathaniel C. 1, Winter
1971
International or Cross-Country r l Vol. I, No. 3, Depths (U) October 1956
Introduction To APL, An (U) n Vol. XVI, No. 4, Fall 1971
Introduction to Computer Vol. 111, No. Binary Arithmetic, An (U) 2, April 1958
Electricity Optics
E lectrornagne tics Missile radiation
Communications Intercept
Intercept Noise
Cryptanalysis
Computers Cryptanalysis
Computers Mathematics
DOCID :
Title I Author Reference Keyword
Introduction to Cryptology - 11, An (U)
Introduction to Cryptology - I , An (U)
Introduction to Cryptology - 111, An (U)
Friedman, Vol. IV, No. Cryptologic history William F. 4, October
1959
Friedman, April 1960 Cryptologic history William F.
Friedman, Fall 1960 Cryptologic history William F.
Introduction to Cryptology - IV, Friedman, I Winter 1961 Cryptologic history An, (U) William F.
Introduction to Cryptology - V, An, (U)
Friedman, Summer 1961 Cryptologic history William F.
Introduction to Cryptology - VI, Friedman, Fall 1961 Cryptologic history An, (U) 1 William F.
Introduction to Diagnosis (U)
Introduction to Electronic Phase-Lock Oscillators, An (U)
Introduction to IBM Methods in Cryptanalysis, An (U)
Introduction to Log-Linear Models in Cryptanalysis (U)
Introduction to Magnetic Tape Recording and Its Use in Intercept Activities, An (U)
Introduction to Programming of a Digital Computer (U)
Introduction to Psycholinguistics, Paralinguistics, and Kinesics, An, (U)
Introduction to Semiconductor Physics and Diode Theory (U)
Vol. XIII, No. Cryptanalysis 3, Summer 1968 I !i?~i No. phase-lock
ascillators
Callimahos, Vol.II,No.3, Cryptanalysis (b)(3)-P.L. 86-36 Lambros D. July 1957
Vol. XXV, Computing No. 2, Spring Cryptanalysis 1 I980
Vol. I, No, 3, Communications October 1956 Recording
I Val. 11, No. 3, Computer programming July 1957
I 1 Vol. XII. No. Communications
U 2, Spring 1967
Vol. 11, No. 2, Electronics April 1957
DOCID: 3020956 ) -50 USC 1 0 3 (b) (31-18 USC 798
Title
Introduction to Statistical Pattern Recognition (U)
Author Reference Keyword
Vol. XXII, Pattern No. 3, recognition Summer 1977 and Special Mathematics and Engineering Issue, 1981-
Introduction to the Fast Fourier Transform, An (U)
Special Issue, Computers January 1971 Mathematics
Introduction to the Methods of I I Summer 1961 Thin film analysis Thin Film Analysis, An (U)
Introduction to the Special Issue (U)
Introduction to Traffic Analysis (U)
Introduction to "Hairpin" Registers (U)
Intuitive Exposition of Zierler's Method for Finding Linear Recursions, An (U)
Investigation of Nonrandom Features in the Optical Fourier Transform of Shift Register Sequences and Binary Key, An (U)
Investigation of Techni ues for the Analysis ofthe-[ T I (u)
SpecialFast Mathematics Fourier Issue, August 1973
Callimahos, Lambros D.
Vol. 111, No. Traffic analysis 2, April 1958
Vol. XX, No. Cryptovariables 1, Winter 1975
Vol. XIII, No. Cryptography 1, Winter Linear recursions 1968
Vol. XIX, No. Cryptomathematics 4, Fall 1974
Vol. XX, No. Signals 4, Fall 1975 Soviet
Investigations into Adult Vol. XXIV, Language acquisition Language No. 3, Learning/Acquisitions (U) Summer 1979
Ionospheric Propagation (U) Gerson, Vol. 111, No. Communications Nathaniel C. and 4, December Ionosphere
1958
"It Is Obvious That . . .": A Vol. 111, No. Codes Painless Approach to 2, April 1958 Messages Cryptanalytic Diagnosis (U)
Title
JACQUARD - A Yates Algorithm Machine (U)
John Dee: Consultant to Queen Elizabeth I (U)
Author Reference Keyword
JACQUARD machine Fourier Issue, Mathematics August 1973
I Vol. XII, No. Cryptologic history 4, Fall 1967
Vol. XXIV Chinese communists No. 1 Winter Korean War _] 1979
Key to the Extraterrestrial Campaigne, Vol. XIV, No. Communications Messages (U) Howard H. 1, Winter I , 1969
Extraterrestrial intelligence
Labeled Oriented Graphs Which are Onto (u) I I Vol. X, No. 1, Mathematics
Winter 1965
Language and the COMINT Vol, XIX, No. COMINT Production Process (U) 3, Summer Language
1974
Language as a Bulk Commodity Vol. XX, No. Language (U) 3, Summer
1975
Language Files: A Basic COMINT Aid (U)
Language Levels and Cryptologic Jobs (U)
Salemme, Arthur Vol. IV, No. COMINT J. 2, Russian language
April 1959
Tetrault, Emery Vol. XVIII, Language W. No. 3, Qualification standards
Summer 1973
Language Problem at NSA, The -1 Vol. I, No. 1, Esperanto (u) 1 April 1956 Language
Layman's Guide to the Gurin, Jacob Vol. XXIII, Language Mysteries of Linguistics, A (U) No. 1, Winter Linguistics
1978
Learn with BOOK (U)
Learning Machines (U)
Learning Machines - Part I1 (U)
Vol. XI, No. Light reading 3, Summer I-' 1966
Jacobs, Walter Vol. 111, No. Learning machines 3, July 1958
Jacobs, Walter Vol. IV, No. Learning machines 2, April 1959
DOCID: 3020956 9 9 8 ( b ) ( 3 ) - P . L . 86-36
Title 1 Author Reference Keyword
Least Squares Analysis of a Vol. IV, No. Mathematics Probability Matrix, The (U) I Library and the User, The (U) I LIGHTNING (U)
~ G H T N I N G Program, hew
Linear and Quadratic Electro- Optic Effects (Pockels and Kerr Effects) (U)
Linear Approximation Attack on a n Irregularly Stepping Key Generator, A (U)
Linear Approximations and the Degree of the Function (U)
Linear Approximations Using Continuous Functions (U)
Linearly Induced Nonlinear Cycles (U)
Linguistic Canonical Forms: Tools for Analytic Progress (U)
List of Properties of Bayes- Turing Factors, A (U)
Logarithmic Scoring and Preliminary Testing (U)
Long and Short of Single Transpositions, The (U)
1, January 1 1959
Vol. XIII, No. Library 2, Spring Research 1968
I Campaigne, Vol. IV, No. Computers Howard H. 3, July 1959
Vol. VIII, No. Computers 1, Winter 1963
Vol. IX, No. Optics 4, Fall 1964
Special Fast Mathematics Fourier Issue, August 1973
Special Fast Mathematics Fourier Issue, August 1973
Special Fast Mathematics Fourier Issue, August 1973
Vol. XXII, Mathematics No. 4, Fall 1977
Vol. XIII, No. Communications 1, Winter Language 1968 and Special Linguistics Issue, I1
I Vol. X, No. 2, Mathematics Spring 1965
Vol. 11, No. 1, Cryptanalysis January 1957
Vol. XXI, No. Cryptanalysis Mathematics
DOCID: 3020956
Title Author
Law Cost Process for Printed Circuits, A (U)
Low Weight Linear Recursions in Key (U) I LVHF Propagation and Collection Techniques (U)
Machine Translation (U)
Machine-Aided Translation - Wild, Norman Where Is I t Today?(U)
Magic Digraphs (U) rn Magnetic Core Memories (U)
Management of Magnetic Tape (U) I Maps and the Conversion of Gauss-Kriiger Grid Coordinates I Markov Chain - The Models with the Short Memories (U)
Markov Models for Phonetic Text (U)
Reference Keyword
Vol. XVIII, Dictionaries No. 1,Winter Foreign languages 1973
Vol. 11, No. 1, Circuits January 1957
Vol. VIII, No. Mathematics 1, Winter 1963
Vol. XVI, No. LVHF collection 4, Fall 1971
Vol. XII, No. Machine translation 2, Spring 1967
Vol. XVIII, No. 2, Spring 1973 and Special Linguistics Issue, I1
Vol. XII, No. 1, Winter 1967
Vol. 11, No. 1, January 1957
Vol. X, No. 4, Fall 1965
Vol. 111, No. 1, January 1958
Vol. XVII, No. 1, Winter 1972
Vol. XVIII, No. 1,Winter 1973
Machine translation
Cryptanalysis
Computers Memory
Tape management
Mapping
Mathematics
Communications Speech
, - , , - ,
(b) (3)-P.L. 86-36 (b) ( 3 ) - P . L . 8 6 - 3 6 ( b i (31-7.1,. 86-36
Title I Author Reference Keyword
Mathematical Analysis of Jitter in a Digital Frequency Source (U)
Mathematical Modeling of TEMPEST Channels (U)
Mathematics and Computers in Cryptanalysis (U)
Matric Recursions (U)
Matrix Business: Part 11, This (U)
Matter Transmission (U)
Maximum Likelihood Estimation of a Trajectory and Its Variance (U)
Maximum Likelihood Estimation of an Orbit (U)
Maya Astronomical Computer, The (U)
"Maybe It's Related to the Phase of the Moon" (U)
Measurement of Insecurity for Imperfect Erasure, A (U)
Mechanical Translation (U)
Vol. VIII, No. Frequency 2, Spring 1963
Vol. XVI, No. Signals 3, Summer TEMPEST 1971
Special Computers Council of Mathematics Learned Organization Issue, 1972
Vol. XXII, Mathematics No. 3, Summer 1977
Vol. 111, No. Mathematics 3, July 1958
Vol. XXIV, Computers No. 4, Fall Encryption 1979
Vol. VIII, No. Cryptosecurity 1, Winter 1963
Vol. XIII, No, Satellite trajectory 1, Winter 1968
Fall 1961 Celestial mechanics
Vol. XXII, Astronomy No. 1, Winter Cryptologic history 1977
Vol. XVII, I I No. 4. Fall PRC
Vol. XXII, Degaussing No. 1, Winter Tape storage 1 1977 Vol I, No. 1, Translation April 1956
DOCID: 3020956
Title - -
Mechanical Treatment of Fibonacci Sequences, A (U)
Mechanization Systems and a New Look a t Management and Organization (U)
Metalin: A Draft of a Metalanguage (U)
Method of Recovery of Fibonacci Key, A (U)
Mickle-Muckle Principle in Hagelin Cryptanalysis, The (U)
MICROCOMPUTER: General- Purpose Signal Process, The (U)
Midway and Yarnamoto: Properly Revisited (U)
Minimizing Noise Effects in PCM (U)
Minimizing Wasted Space in Information Files (U)
Missile Trajectories (U)
Model 204 -The Analyst's Computer (U)
Modification of a Phantastmn Generator, A (U)
Modified Normal Curves (U)
Mokusatsu: One Word, Two Lessons (U)
MP-14: Unlimited Random Source (U)
I Author Reference Keyword I I 1 Vol. 11, No. 4, Cryptanalysis
I Vol. VII, No. Management 2, Spring
I Vol. Xi, No. Artificial language 4, Fall 1966
Vol. 1, No. 3, Cryptanalysis October 1956
Vol. IX, No. Cryptanalysis 4, Fall 1964 Hagelin machine
I Vol. XXII, Signal processing No. 2, Spring
Vol. XIII, No. 3, Summer 1968
I Vol. 11, No. 2, April 1957
Vol. XIV, No. 4, Fall 1969
Vol. 11, No. 1, January 1957
Vol. XXI, No. 3, Summer 1976
Vol. IV, No. 4, October 1959
Cryptologic history Midway
Collection
File storage
Missile trajectory
Analysis Computers
Circuits
Spring 1961 Cryptanalysis Mathematics
Vol. XIII, No. Translation 4, Fall 1968 and Special Linguistics Issue, I1
Vol. XVII, Computers No. 3, Cryptanalysis Summer 1972
DOCID: 3020956
Title I Author
"MUFFLER" BANDAID (LVHF and HF Communications Aid) (U)
Multichannel Language Processing As a System (U)
Multilingual Codes (U)
Multipath Differential Doppler Data (U)
Multiple Hypothesis Testing and the Bayes Factor (U)
Narrow-Band Speech S (U)
Need for System Approach, The (U)
Nest of Dragons, A: The Voice Problem (U)
Gurin, Jacob
Net Reconstruction - A Basic Step in Traffic Analysis (U)
New Approach to the One-Time Pad, A (U)
New Concept in Computing, A 1
Reference Keyword
Vol. XX, No. 3, Summer
Vol. XVII, Language processing No. 4, Fall 1972
Vol. X, No. 4, Codes Fall 1965 Language
Vol. XXI, No. Signals 3, Summer 1976
Vol. XVI, No. Cryptomathematics 3, Summer 1971
Vol. 111, Cipher equipment No. 4, Security December 1958 and Special Linguistics Issue (bi 13)
3GA
Vol. VII, No. SIGINT 2, Spring 1962
Vol. XXI, No. Language 1, Winter Voice problem 1976
Vol. 111, No. Traffic analysis 3, July 1958
Vol. XIX, No. Ciphers 3, Summer One-time pads 1974
Vol. 111, No. Computing 4, December 1958
New Mode of Operations in Vol. 11. No. 3, Circuits Junction Transistors, A (U) July 1957
No, Not Again! (U) Callimahos, Vol. I, No. 1, Ciphers Lambros D. April 1956
DOCID: 3020956
Title
Noise Communicatioa Technique for Speech (U)
Noisy Pluggings (U)
Note on a Solution of a Polyalphabetic Dinome System, A (U)
Note on Chinese Language Reform and NSA, A (U)
Note on Curve Fitting, A (U)
Note on Product Sequences, A (U)
Note on the English VCCCC Pattern or Maximum Post- Vocalic Consonant Clustering in Monosyllabic English Words, A (U)
Note on Univariant Interpolation (U)
Note on "A Low Cost Process for Printed Circuits" (U)
Note on "Logarithmic Scoring and Preliminary Testing" (U)
Notes on Chi-Square in Cryptanalysis (U)
Notes on Missile Terminal Ballistics (Soviet) (U)
Null Hypothesis, The (U)
Number of Components in a Random Linear Graph, The (U)
Offsets of Differences: Summation and Difference Methods (U)
Author Reference Keyword
7 Vol. VII. No. Communications 1 4, Fall 1962
I Vol. 111, No. Noise 2, April 1958
I Vol. I, No. 3, Ciphers October 1956
I
Wild, Norman Vol. I, No. 2, Chinese language July 1956
Vol. XIII, No. Mathematics 4, Fall 1968
Vol. XVI, No. Mathematics 2, Spring 1971
I Vol. XVII. Language identification I No. 1, Winter
Vol. 111, No. Interpolation 4, December 1958
Vol. 11, No. 3, Circuits July 1957
I Vol. 11, No. 4, Mathematics October 1957
I Vol. 11. No. 3, Cryptanalysis July 1957
Vol. IX, No. Missile trajectory , 1 ;".ter
Campaigne, Vol. I, No. 2, Cryptology Howard H. July 1956
Vol. IV, No. Cryptanalysis 2, April 1959
Vol. 11, No. 4, Encipherment October 1957
DOCID: 3020956
Title
On an Algorithm for Approximate Polybit Scoring Using Fourier Transforms (U)
Author Reference Keyword
1 Special Fast Mathematics (b)
Fourier Issue. August 1973
On Cipher (U) I I January1960 Ciphem
On Comparing Two Observed I I Vol. 111, No. Chi-squares Frequency Counts (U) 2, April 1958
On Cryptanalysis and u Vol. IV, No. Cryptanalysis Redundancy (U) 3, July 1959
On Key Analysis (U)
On Milking the Sacred Cow (U)
On Operatorless Computers (U)
On Tests of Sequences (U)
On the Distribution of n-Digit Groups by the Sum of Their Digits (U)
On the Expected Number of Random Stops Corresponding to a Given Menu (U)
On the Maximization of X'AX over the Vertices of the Cube (U)
On the Minimization of Integer Quadratic Forms over Nonzero Integer Vectors (U)
On the Selection of Cryptanalysts - Part I1 (U)
On the Selection of Personnel for Cryptanalysis (U)
On Understanding the Null Hypotheses of Test Statistics (U)
Callimahos, Lambros D.
Vol. XIX, No. Cryptanalysis 4, Fall 1974
Vol. XVII, Collection No. 2, Spring 1972
Vol. I.,, No. 1, Computers April 1956 Storage
Kullback. Vol. VII, No, Cryptanalysis
01. I, No. 2, Cryptography uly 1956 F 01. VIII, No. Cryptanalysis
01. VIII, No. Cryptanalysis , Winter 6%.
Mathematics o. 1, Winter
pril1960 Cryptanalytic personnel
anuary 1960 Cryptanalytic personnel
01. VIII, No. Mathematics , Fall 1963
Title Author
One Model for an Artificial Ionosphere (U) r Operation Babel (U)
Operation VANGUARD (U) I I O~erations Research in NSA 1
Optical Data Processing - A Cryptanalytic Perspective (U)
Optical Fourier Transform and Periodic Phenomena (U)
Optical Receiver, The (U)
Optimum Use of h g Weights (U)
Orbit Computation with the Vinti Potential and Universal Variables (U)
Orbit Fitting ta Angular Data (U)
Order Statistics for Cell Counts I OVERLORD, the Programmer's Friend: An Extension of the ~DASYS Operating System (U)
Parabolic "Mock" Design for an FFT - Implemented Filter Scheme (U)
Reference Keyword (bj 131-P L. 86-36
Vol. XI, No. Radio intercept 2. Spring 1966
Vol. IV, No. Computers 3, July 1959
Vol. I, No. 2, Communications July 1956 Earth satellites
Vol. X, No. 1, Management Winter 1965 Operations
Vol. XX, No. Cryptanalysis 3, Summer Data processing 1975
Vol. XVIII, Mathematics No. 3, Summer 1973
Vol. XXV, Spread spectrum No. 1, Winter 1980
Vol. XIII, No. Optical receiver 2, Spring 1968
Vol. IX, No. Computers 3, August Plain text 1964
Vol. XIX, No. Astrodynamics 1, Winter 1974
Vol. XXI, No. Astrodynamics 2, Spring 1976
Vol. XXIII, Mathematics No. 4, Fall 1978
Vol. XXII, Computer operating No. 2, Spring systems 1977
Special Issue, Filters January 1971
(DOCID: 3020956 i b ) (3)-50 USC 403
0 9 8 (b) 1 3 ) - P . 1 , . 86-36
Patent Matters and the Technical Employee (U)
Pattern Recognition (U)
Title
Penney-Ante (U) r
Author Reference Keyword
Perpetuation of Bias in Shift Register Devices (U)
Personal Contribution to the Bombe Story, A (U)
Parity as an Operation Checking Code (U)
Philosophy of U.S. Cryptography and Cryptographic Usage, A (U) I
Vol. VIII, No. Mathematics 3, Summer 1963
Phonemic Structure of Nootka, The (U)
Polar Ionosphere, The (U)
Possible Applications of Keyword Recognition in Voice Intercept (U)
Potential of Interactive Computer Programs in the Decryption Process of SIGINT, The (F43WW
Potential of Tropospheric Ducting as a Collection Technique, The (U)
PPM Telemetry Simulator (U)
Preamble for Push-to-Talk Ciphony, A (U)
Gerson, Nathaniel C. C Gurin, Jacob
Vol. X, No. 3, Inventions Summer 1965 Patents
Winter 1961 Pattern recognition
Vol. XII, No. Cryptanalysis 1, Winter 1967
Vol. XIV, No. Shift registers 4, Fall 1969
Vol. XX, No. Cryptologic history 4, Fall 1975 ENIGMA
Vol. XII, No. Cryptography 3, Summer 1967
Fall 1960 American Indian language
VO~. IX, NO. ELINT 2, May 1964 Signal analysis
Summer 1961 Ionosphere Physics
Vol. XXII, Keywords No. 1, Winter Voice intercept 1977
Vol. XXV No. Computers 3, Summer Cryptanalysis 1980 SIGINT
Vol. XX, No. Collection 1, Winter 1975
Fa11 1960 -]telemetry
Vol. XII, No. Communications 2, Spring 1967
DOCID: 3020956 REF ID:A398598 -ib) (3)-P.;. 86-36
Title I Author Reference
Communications Intelligence (U)
Preliminary Historical Report Unknown
h Vol. IX, No.
on the Solution of the "B" 2, May 1964 Machine (U)
Privacy and Protection in Vol. XVIII, Operating Systems (U) No. 2, Spring
1973
Probabilities of Hypotheses and Kullback-Leibler Information- Statistics in Multinomial Samples (U)
PROBE DATA (U)
Problem Solving with On-line Systems (U)
Problems of Meaning in Interlingual Dictionaries (U)
Processes for Random and Sequential Accessing in Dynamic Memories (U)
Vol. I, No. 3, October 1956
Meyer, Joseph A. Vol. XI, No. 1, Winter 1966
Product Sequences I1 (U)
Program Complexity Measure, A (U)
Program for Correcting Spelling Errors, A (U)
Programmatic Control of Parallel Processes (U)
Programming Concepts for Verification and Security (U)
Special Council of Learned Organization Issue, 1972
Vol. 111, No. 1, January 1958
Vol. XXII, No. 4, Fall 1977
Key word
Cryptologic history
Cryptologic history
Operating systems Privacy
Vol. XX, No. 4, Fall 1975
Vol. XXI, No. 4, Fall 1976
Vol. IV, No. 4, October 1959
Vol. XVII, No. 2, Spring 1972
Vol. XXII, No. 4, Fall
I 1977
On-line systems Problem solving
Language dictionaries
Dynamic memory Mathematics
Mathematics
Software engineering
Computers
Computer programming
Programming Software
'%da~~z793 02 0 956 REF IDzA398598 b)i3)-P.,. Ha-3C L
"(b) 1 2 ) - P . L . 86-36
Title I Author Reference Keyword -
Project EXPLORER (U)
Project TENNIS and External Influences on NSA Systems Development (U)
I Public Key Cryptosystems (U)
Vol. XVI, No. Cryptologic history 2, Spring Vietnam 1971
~ o l t e , ~ i l l i a m VOI. XXIII, 7 1 M. No. 2, Spring
1978 I
Vol. XXIV, ,Crwtjmathematics No. 3, Summer 1979
I Vol. XXIV, Cryptosystems No. 1, Winter
Q.E.D.- 2 Hours, 41 Minutes (U)
Quick Check for Transposal Garbles, A (U)
m ~ h e Case for Bad Grammar (U)
RAKE System for.Tropospheric Scatter, A (U)
I Callimahos, Vol. XVIII, Lambros D. No. 4, Fall
01. IV, No. , April 1959 nd Special inguistics
01. IX, No. , May 1964 d Special
inguistics
(b) (1) Ciphers !b) ( 3 ) -50 USC
403 (b) ( 3 ) - 1 8 USC 7 9 8 (b) (3)-P.L.
Russian grammar
01. X, No. 4, Collection
Random and Algebraic 01. XXIII, Mathematics Coverings of Binary Vectors (U) 0.3,
ummer 1978
Mathematics
Engineering Issue, 1981-
Random Walks with Restraining Barrier as Applied to the Biased Binary Counter
Vol. 111, No. Computers 2, April 1958 Sampling
DOCID: 3020956
Title Author Reference Key word i 3)-P.L. 86-36
Randomization Made to Order: Special ~ r y p t a n l y s i s )
"Random Numbers Are Too Council of Randamization Important to be Left to Chance" Learned (U) Organization
Issue, 1972
Range Dependence on System Vol. IV, No. Communications Temperatures (U) 1, January
1959
Rationale for and Preliminary Vol. XXIII, Computers Implementation of HYPERCAN No. 4, Fall Cryptanalysis (High Performance 1978 Cryptanalysis) (U)
Readinga Depth By Computer Jacobs, Walter Vol. X, No. 2, Computer (U) W. Spring 1965 programming
Reading TUNNY (U) Campaigne, Vol. VII, No. Cryptologic history Howard H. 4, Fall 1962 Germany
Real-Time Raster (U) Vol. XXf V, ELlNT collection No. 1, Winter 1979
Realization and Optimization of Vol. XIII, No. Filters the Audio Frequency 4, Fall 1968 Frequency Microminiature Thin Film Special Band-Pass Filters (U) Mathematics
and Engineering Issue, 1981- 1983
Receiving System Analysis (U) Vol. X, No. 1, Receivers Winter 1965
Reciprocal Alphabets and Friedman Squares (U)
Recognition of Latin Square Equivalence Classes (U)
Recollections Concerning the Birth of One-Time Tape and Printing-Telegraph Machine Cryptography (U)
Kullback, Vol. 111, No. Reciprocal Solomon 1, January alphabets
1958
Vol. XVI, No. Cryptanalysis 3, Summer 1971
Vol. I, No. 2, Cryptography July 1956
DOCID: 3020956
Title
Recording T e c v Affecting Total Intercept
Recovering the Structure of a Linear Shift Register (U)
Recovery of Pre-Detection Signals in the Optical Receiver (U)
Recurrent Events and Baudot Streams (U)
Red China's Drive for Literacy (U)
REDMAN Program, The (U)
Redundancy Exploitation in the Computer Solution of Double- Crostics (U)
Reference Patterns for Nearest Neighbor Rule (U)
Reliability and Checking in Computing Systems (U)
Remarks Concerning Substantialization (U)
Repagination? (U)
Report of the Second Computer Study Group (U)
Report on the Keyword System, A (U)
Author Reference Keyword
Vol. IX, No. Intercept 1, Winter Recording 1964
Vol. XIV, No. Cryptanalysis 4, Fall 1969
Vol. XIII, No. Signals 4, Fall 1968
I Vol. 11, No. 2, Baudot streams April 1957
Vol. XVI, No. Communist China 2, Spring 1971
Vol. IX, No. Data processing 1, Winter 1 964
Vol. VII, No. Computers 2, spring 1962
Vol. XXII, Signals analysis No. 1, Winter 1977
Vol. 11, No. 4, Computer October 1957 diagnostics
Vol. IX, No. Mathematics 4, Fall 1964
Vol. XVIII, Bookbreaking No. 4, Fall Computers 1 1973
Various Vol. XIX, No. Computer use 1, Winter NSA 1974
Kullback, Vol. IV, No. Codes Solomon, and F. 3, July 1959 Keywords W. Lewis
Representation of Signals on Vol. IX, No. Signals Orthonormal Bases, The (U)
DOCID: 3020956 REF IDtA398598 :(b) ( 3 ) - P . L . 86-36
Title Author Reference
Representative Machine Cipher Callimahos, Vol. 111, NO. Systems (U) Lambros D. 1, January
1958
Representing Data in Vol. 111, No. Computers (U) 1, January
I 1958
Research a t NSA (U) Campaigne, Vol. XfII, No. Howard H. 2, Spring
j 1968
Response of a Non-Linear Vol. VIII, No. Device to an Emitter 1, Winter Environment in the High 1963 Frequency Spectrum, The (U)
Reverse Sort Machine Listings D'Imperio, Mary Vol. XVIII, (U) No. 1,Winter
1973
Revision - de novo, A (U) Wray, W. D. Vol. I, No. 3, October 1956
RF Interference Phenomenon Vol. XXIII, and Intelligence Applications No. 4, Fall (u) 1978
Rocheford's Cipher: A Discovery Gaddy, David W. Vol. XVIII, in Confederate Cryptography No. 4, Fall (U) - 1973
Rocket Motion and Newton's Fall 1960 Second Law (U)
Role of Carrier (VCh) Telephony in Soviet World War I1 Strategic Communications (U)
Room 40 Compromise, The (U) I Meyer, Joseph A.
Rosetta Stone and Its Decipherment, The (U)
Callimahos, Lambros D.
Rotation Problem in Pattern I I Recognition, The (U)
Keyword
Cipher machines
Data representation
Research
Signals
Computer working aids
Cryptanalysis
Collection
Civil war Cryptologic history
Rocket motion
Vol. XIX, No. Communications 3, Summer Soviets 1974
Vol. XXV, Cryptologic history No. 1, Winter 1980
Vol. XVI, No. Cryptologic history 1, Winter Rosetta Stone 1971
Vol. VII, No. Pattern 1, Winter recognition 1962
Title
Roughness of Visitations in a Markov Chain, The (U)
Russian Diamond, A CU)
RYE, an Extended Capacity Remote Access System (U)
Scaling Matrix for the Analog Computer (U)
Scheduling Function in a Time- Sharing Environment, The (U)
Science and Cryptology (U)
ScientXc and Engineering Information Management in the Department of Defense (U)
Scoring Function and Its Distribution, A (U)
Security Architecture in SrGrNT Collection and Processing (U)
Selected SIGINT Intelligence Highlights (U)
Selection and Placement of Cryptanalytic Personnel (U)
SELLNOW - A Man- Machine Communication System for ELINT Data (U)
Sequential Least Squares Estimates (U)
Setwise Transitive Groups (U)
SIGINT Computer Processing in the 1980's (U)
Author Reference Keyword
Vol. VIII, No. Mathematics 2, Spring 1963
Vol. XII, No. Russian navy codes 2, Spring 1967
Vol. IX, No. Computer 2, May 1964 programming
Vol. VII, No. Computer 1, Winter programming 1962
Vol. XVI, No. Computer systems 2, Spring 1971
Meyer, Joseph A., ( Jr.
Tordella, Louis
Vol. 111, No. Cryptology 3, July 1958 Science
Vol. X, No. 2, Information Spring 1965 management
Vol. XIII, No. Mathematics 4, Fall 1968
Vol. XX, No. Collection 1, Winter Security 1975
Vol. XIX, No. SIGINT 4, Fall 1974
Fall 1960 Personnel
Vol. WII, No. ELINT 4, Fall 1963
Vol. XII, No. Mathematics 2, Spring 1967
Vol. X, No. 2, Mathematics Spring 1965
Vol. XXII, Computer No. 2, Spring processing 1977
DOCID: 3020956 9 3 9 8 5 9 8
Title I Author Reference Keyword
SlGINT Implications of Military Oceanography (U)
SIGINT System Logic (U)
srG1N~ing with SACO: Experiences with the Rice Paddy Navy (U)
Signals from Outer Space (U)
Simple Homogeneity Test Using Log-Factors, A (U)
Simple Test for Slide or Kick, A (U)
Simplified Exposition of a New Cycle Search Technique (U)
Simulation of Cryptoprinciples (U)
Simultaneous Error Insinuation in Electronic Cipher Machines (U)
Six Characteristics of Information Handling Systems (U)
Six Point Program for Improved Intercept (Part I) (U)
Sliding Strips, Additive, Subtractive, and Minuend (U)
Slow Look at Fast Transforms, A (U)
Meyer, Joseph A.
Unknown
Vol. XII, No. Oceanography 4, Fall 1967
Vol. X, No. 2, SIGINT Spring 1965
(b ( 3 ) - P . L . 8 6 - 3 6 Vol. XXI, No. Cryptologic history) 1, Winter 1976
Vol. 111, No. Sputnik 2, April 1958
Vol. VIII, No. Ciphers 4, Fall 1963
Vol. VIII, No. Mathematics 4, Fall 1963
Vol. I, No. 1, Teleprinter cipher April 1956 analysis
Special Communicatio*, i : i -,, ,,, 4 0 3 Council of security jb) ( 3 1 - 1 9 usc 798 Learned ( 0 1 ( 3 ) - P . L . 86-36
Organization Issue, 1972
Meyer, Jweph A. Vol. XIV, No. Cipher machines J , ;E"'" Vol. XXI, No. Cryvtologic history I 1,Winter
Gerson, Nathaniel C.
Vol. XIV, No. Information systems 3, Summer 1969
Vol. VII, No. Intercept 3, Summer 1962
Vol. XI, No. Cryptanalysis 2, Spring 1966
Special Fast Mathematics Fourier Issue, August 1973
DOCID: 3020956
Title I Author Reference Keyword
Software Maintenance -The Other Side of Acquisition (U)
So You Want to Correlate (U)
Solution of a Fractionated Monome-Dinome System (U)
Vol. X, No. 2, Waveform Spring 1965 recognition
Solution of a Polyalphabetic Monome-Dinome System (U)
Solution of Additive-Minuend Busts (U)
Vol. XXIII, Software No. 3, maintenance Summer 1978
Vol. 11, No. 2, Cryptanalysis April 1957
Lutwiniak. Vol. I, No. 3, Cryptanalysis William October 1956
Vol. 111, No. Cryptanalysis 1, January I) 1958
Solution of Hill's Basic Vol. I, No. 2, Encipherment Algebraic Methods for July 1956 Enciphering Polygraphs (U)
Solution of the Japanese PURPLE Machine, The (U)
Solution of VEJX-0, or the Uses of Delta (U)
Solving a Playfair Cipher by Computer (U)
Some Applications of Information Theory (U)
Some Applications of the Chi- Square Test in Cryptanalysis (U)
Some Contributions towards a Course in COMINT Translation (U)
Some Cribbing Techniques (U)
Some Formulas concerning Bulges of Combining Functions (U)
Some Graphical Display Techniques for Fourier Analysis (U1
Friedman, Vol. XIX, No. Cryptologic history William F. 1, Winter PURPLE machine
1974
Lutwiniak, Vol. XVIII, Cryptanalysis William No. 2,Spring
1973
Vol. XIV, No. Computer 4, Fall 1969 cryptanalysis
Kullback, Vol. I, No. 1, Information theory Solomon April 1956
Callimahos, Vol. XIV, No. Cryptanalysis Lambros D. 4, Fall 1969
Vol. XVI, No. Translation 3, Summer 1971
Vol. XXIII, Cribbing techniques No. 1, Winter 1978
Special Fast Mathematics Fourier Issue, August 1973
Special Issue, Computer graphics January 1971
DOCID: 3020956 REF IDzA398598 9
Title Author Reference Keyword - Some Notes about Chi-square (U)
Some Noks on Information Theory (U)
Some Observations on Computer Aids to Indicator Recovery (U)
Some of My Best Friends Are Mathematicians (U)
Some Principles of Cryptographic Security (U)
Some Problems and Techniques in Bookbreaking (U)
Some Problems in the Field of Machine Translation or the Case of the Volatile Mouses (U)
Some Properties of Sample
Vol. VIII, No. Chi-squares 3, Summer 1963
Vol. IV, No. Information theory 1, January 1959
Vol. XVII, Cryptanalysis No. 4, Fall 1972
Lewis, Frank W. Vol. IV, No. Mathematicians 2, April 1959
Tiltman, John Vol. XIX, No. Cryptographic H., Brigadier 3, Summer security
1974
Vol. XI, No. Bookbreaking 1, Winter 1966
Salemme, Arthur Fall 1960 Machine J. translation
Special Fast Mathematics Fourier Issue, August 1973
Vol. IX, No. Information 4, Fall 1964 transmission
Vol. XIII, No. Vocoders 2, Spring 1968
Bulges (U)
Some Properties of the Two- State First-Order Markav Chain (U)
Some Recent Vocoder Studies a t the National Security Agency (U) ,
Some Reminiscences (U) Tiltman, John H., Vol. XI, No. Cryptanalysis Brigadier 3, Summer
1966
Some Thoughts concerning Traffic Analysis Mechanization ( u )
Something May Rub Mf! (U)
Soviet Communications Journals as Sources of
Vol. XI, No. Traffc analysis 3, Summer 1966
Lewis, Frank. W. Vol. X, No. 1, Cryptanalysis Winter 1965
I Vol. IX, No. Communications 3, August Soviet
Intelligence (U) \A 1964
: , ,
USC 403 USC 798
4, Fall 1971
Title
Spacecraft Passenger Television from Laika to Gagarin (U) n
Author Reference Keyword
Soviet Science and Technology: Present Levels and Future Prospects (U)
Spanish Languages, The (U) I I
Vol. XXV, No. 4, Fall 1980
Sinkov, Abraham
Speaker Identification by Machine: Where Do We Stand? (U)
Special Felix System, The (U)
-
Special Purpose CrypWlyt ic Computers: State of the Art (U)
i
SPECOL: A New AND, OR, NOT Language for Use with Computers (U)
Spectral Analysis and the Fast Fourier Transform (U)
Spoken Russian: The Other Grammar (U)
Spread Spectrum System Jamming Response (U)
Standard for Evaluating the Intelligence Content of Equipment Emanations (U)
Gurin, Jacob
Kullback, Solomon
Vol. IV, No. Science and 1, January technology 1959 Soviet
Vol. XXI, No. Space flights 2, Spring 1976
Vol. XIII, No. Spanish language 1, Winter 1 968
Vol. XIV, No. Speaker 4, Fall 1969 identification
Vol. IV, No. German code 2, April 1959
VOI. XXIII, Computers No. 1, Winter 1978
Vol. XII, No. Computer 1, Winter language 1967
Vol. XIV, No. Mathematics 1, Winter 1969
Vol. XIV, No. Russian language 3, Summer 1969
Vol. XXII, Signals No. 3, Spread spectrum Summer 1977
Vol. IX, No. Equipment 3, August emanations 1964
DOCID: 3020956
Title
REF ID:A398598 ( b ) ( 3 ) - P . L . 8 6 - 3 6
Statistical Description of the Noise and Emitter Environment, A (U)
Status of Optical Logic Elements for Nanosecond Computer Systems (U)
Stirling Numbers of the Second Kind (U)
Author
Strategic Warning: An Intelligence Gap That NSA Might Fill (U)
Strategy for Program Decomposition for a Distributed Pipeline, A (U)
Strength of the Bayes Score, The (U)
Study of Character-Handling by Computer a t NSA. A (U)
Study of Hourly Correlation of Trans-Horizon VHF-UHF Signals and Meteorological Conditions (U) r Study of Japanese Nominalization, A (U) I Subnanosecond Instrumentation (U)
Substantive Analysis (U)
Supporting the Support Facilities (U)
Survey of Bent Functions. A (U) I
Reference Keyword
Vol. X, No. 4, Collection Fall 1965
Vol. V111, No. Computers 3, Summer 1963
Vol. 111, No. Stirling numbers 1, January 1958
Vol. XVIIE, Strategic warning No. 3, Summer 1973
Vol. XXII, Mathematics No. 4, Fall 1977
Vol. XVlI, Mathematics No. 1, Winter 1972
Vol. XIV, No. Computers 2, Spring 1969
VoJ. XIV, No. Signals 2, Spring 1969
Vol. XXIII, Japanese No. 2, Spring language 1978
Vol. IX, No. Pulses 1, Winter 1964
Vol. IV, No. Analysis 2, April 1959
Vol. XVIII, Computer test No. 3, equipment Summer 1973
Special Fast Mathematics Fourier Issue, August 1973
DOCID: 3020956
! b i (1) ( b i ( 3 ) - 5 0 USC 4 0 3 (bi ( 3 1 - 1 8 USC 7 9 8 (bi (3)-P.L. 8 6 - 3 6
Title 1'
Survey of Multinomial Estimation for Code Weighting, A (U)
Survey of the Distance Problem, A (U)
Survey of the Status of the Voice Problem, A (U)
Symmetric A proximations to e Boolean Func 'ons (U)
Systems Approach to Training Radiotelephone Technicians, The (U)
Tail Probabilities for the Binomial Distribution (U)
"Take Care of Your Pennies . . . "(U)
Target in Space, A (U)
Technology of Future Powerful Personal Computers, The (U)
Telecommunications from the Tom-Tape to the Computer (U)
Issue, 1972
Teletype Processing in the Vol. XVIII, Signals processing FROSTING System (U) No. 2, Spring
1973
Author I
Reference Keyword - . .
Vol. XX, No. ~atherafiik 3, Summer 1975
Vol. XVIII, Crypto- No. 2, Spring mathematics 1973
Vol. XII, No. Voice 4, Fall 1967 communications
1 Vol. XIX, No. Mathematics 3, Summer 1974
Vol. XVIII, Communications No. 1,Winter Training 1973
Vol. VIII, No. Mathematics 3, Summer 1963
Vol. 111, No. Computers 1, January 1968
Special Council of U sate ltes Learned Organization Issue, 1972
Vol. XXV, Computers No. 3, Summer 1980
I Special CRlTICOMM Council of Learned Organization
DOCID: 3020956 REF IDzA398598 9
Title Author Reference Keyword
TEMAC (Text Macro Compiler): D'Imperio, Mary Vol. X, No. 3, Computers A Machine Language for Summer 1965 Machine language Processing Text (U) and
Computer (b) ( 3 ) - P . L . 8 6 - 3 6
and Information Science Issue
TEMPEST Considerations in Vol. XIV, No. COMSEC
Automatic Data Processing 1, Winter TEMPEST
Equipment Installations (U) 1969
Tetrahedral Plugging (U) Vol. VIII, No. Ciphers 2, Spring Key 1963
Text Recognition Procedure for Vol. XI, No. Cryptanalysis Cryptanalysis, A (U) 3, Summer
1966
Textual Criticism and NSA (U) . Vol. XIV, No. Editing 3, Summer 1969
Theoretical Linguistics and Vol. XXII, Linguistics Language Universals (U) No. 2, Spring
1977
Theory and Applications of Vol. XXI, No. Cryptanalysis Three-Way Multidimensional 2, Spring Scaling (U) 1976
Theory of Secondary Testing, Vol. XIII, No. Cryptanalysis The (U) 3, Summer
1968
Thermal Noise (U) Vol. VII, No. Electricity 3, Summer 1962
Thin Film Shifting Matrix, A Vol. VII, No. Currents (U) 4, Fall 1962
Thin Film Thermocouple (U) Vol. VII, No. Physics 4, Fall 1962
Third Revolution: Prospects for Vol. XIII, No. srGINT Continued SIGlNT Productivity, 3, Summer productivity The (U) 1968
lbi 131-50 USC 403
Title
This Is a Recording? (U)
This Matrix Business (U)
This Matrix Business: Part I1 (U)
Thoughts about Systems and Program Design (U)
Threaded File Retrieval System (U)
Thrusts and Boggles of Outrageous Escalation, The: A VOCABUZARY SURYEY ATTHE NATIONAL WAR COLLEGE (U)
Time Coordination of SCINT Sites (U)
Time Is -Time Was -Time Is Past Computers for Intelligence (U)
Time-Element Scramble (U)
Times of Shadow Passage for Earth Satellites (U)
Tour of Some Russian Translation Traps, A (U)
Trade-off Approach to Quality Intercept versus Quantity Intercept, A (U)
Traffic Analysis on Sovie u
Author Reference Keyword
Vol.XVII1, ~ e c o & k ) ( ~ ) - ~ . ~ ' 86- No. 2, Spring 1973
Vol. 111, No. Cryptanalysis 2, April 1958
Vol. 111, No. Cryptanalysis 4, December 1958
Vol. XVIII, Computer No. 2, Spring programming 1973
Vol. XII, No. Document storage 2, Spring 1967
Vol. XIII, No. Vocabulary 2, spring 1968
Vol. XII, No. Intercept sites 2, spring 1967
Campaigne, Vol. X, No. 1, Artificial Howard H. Winter 1 9 a intelligence
and Computers Computer and Information Science Issue
Vol. VII, No. Encipherment 4, Fall 1962 Speech privacy
Vol. VIII, No. Satellite 3, Summer tracking IS63
Salemme, Arthur Vol. XIV, No. Russian J. 4, Fall 1969 Translation
Vol. XXIII, ~ 1 ~ 1 ~ ~ c o l l e c t i o n No. 1, Winter and processing 1978
Vol. XIII, No. Traffic analysis ~ r a n s m i s s i o ~ ~ ~ 1 1 1, Winter
1968
Title I Author Reference Keyword
Transient Analysis of Coaxial Cables Considering Skin Effect (U)
Transient Response of Tunnel Diodes with Resistive Loading (U)
Transistor Phantastrons (U)
Translation of a Classic: A Matter of Ethics, The (U)
Vol. I, No. 2, Coaxial cables (b) (31-P.L. 86-36
July 1956
Vol. VII, No. Circuits 1, Winter 1962
Vol. IV, No. Circuits 2, April 1959
Gurin, Jacob Vol. XI, No. Literature 2, Spring Translation 1966
Transverse Mercator Projection, Vol. XXIV, Mapping The (U) No. 4, Fall
1979
Trends, Developments, and Pressures in SIGINT Reporting Today (U)
Trots" in Foreign Language Study (U)
Tunnel Diode Characteristic Function Generator (U)
Tunnel Diode Dynamic Logic Module, A (U)
--
--------p--
DOCID: 3020956 REF ID:A398598 A
Oliver, Donald B. Vol. XXI, No. MGINT reporting 1, Winter 1976
1 Vol. 11, No. 1, Language aids January 1957 and Special Linguistics
I Issue
Vol. VIII, No. Computers 1, Winter 1963
Summer 1961 Computers Logic
"TUNNY" Machine and Its Spring 1961 Cipher machines Solution, The (U) Brigadier Germany
Turing's Contributions to Cryptology (U)
Two New Language Models (U)
Typewriter" Key and the Stereotype, The (U)
Vol. VIII, No. Cryptology 3. Summer Mathematics 1963
Vol. XXIV, Language modeling No. 3, Summer 1979
Vol. IV, No. Code groups 4, October 1959
DOCID: 3020956
Title
U. S. Program in Direction Finding, A (U)
Unbreakable Cipher, The (U)
Under-Developed Languages, Under-Utilized Computers (U)
UNNA -An Introspective Signal Processor (U)
U p g r a d q Selected U.S. Codes and Ciphers with a Cover and Deception Capability (U)
Use of Bayea Factors with a Composite Hypothesis (U)
Use of Optical Density Measurements of Thin Films to Determine Vapor Distributions, The (U)
Use of Production Methods in Reading Transposed Letter Codes (U)
Use of Special Identification Techniques (SIT) in the Solution of Specific SICINT Problems, The (U)
Use of the B-Coefficient in Information Retrieval, The (U)
UTIL of English: A Study of the Quality of SIGINT Product (U)
Utilization of Code Limitations in Solving Bust Messages (U)
Output String
I Author Reference Keyword
Gerson, Vol. X, No. 2, Direction finding Nathaniel C. Spring 1965 Wullenweber systems
I Campaigne, Spring 1961 Ciphers Howard H. Cryptanalysis
Vol. XX, No. Computers 1, Winter L W P g e 1975
Vol. XX, No. Signal processing 2, Spring 1975
Vol. XXI, No. Ciphers 1, Winter Deception 1976
Vol. IX, No. Cryptanalysis 4, Fall 1964
Vol. VIII, No. Physics 3, Summer 1963
Vol.II,No. 1, Codes January 1957 and Special Linguistics Issue
Vol. XII, No. Signal identification 4, Fall 1967
Vol. XIII, No. Information 4, Fall 1968 retrieval
Vol. XVII, SIGINT reporting No. 4, Fall 1972
January 1960 Codes and Special Linguistics Issue
Vol. XXI, No. Mathematics 4, Fall 1976
Title
Variance of the Number of Ones in a Derived Stream of Zeros and Ones (U)
Verified Intercept Predictions (U)
VIDEOFILE: A New Information Storage System (U)
Viet Minh Cover Terms and Their Solution (U)
Voice Problem, The (U)
Voynich Manuscript Revisited, The (U)
Voynich Manuscript, The: 'The Most Mysterious Manuscript in the World" (U)
Waiting Times for Polygraphic Repeats (U)
Introduction
I Author Reference Keyword
'(b) ( 3 ) - P . L . 86-t Vol. XII, No. Mathematics 2, Spring 1967
Yol. XII, No. Intercept 1, Winter 1967
Vol. XIII, No. Informstion storage Video
Gaddy, David W. Vol. IV, No. Viet Minh 3, July 1959 cover terms and Special Lingxiistics Isssue
Special Voice Council of communications Learned Organization Issue, 1972
- - - '1
DOCID: 3020956 REF IDzA398598 -
I
Vol. XXI, No. Voynich Manuscript 3, Summer 1-I 1 976
WARsAN I1 - An Implementation of the FFT and Other Tools for Digital Signals Analysis (U)
Way the Ball Bounces,The: An Experiment in Deconvolution Filtering (U)
Weather or Not - Encrypted? (U) I
Tiltman, John H. Vol. XII, No. Voynich Manuscript Jr., Brigadier 3, Summer
1967 and Special Linguistics
Vol. XXIV, Cryptomathematics No. 2, Spring 1979
Vol. XIII, No. Cipher machines 1, Winter 1968
Special Issue, Digital signals January 1971 analysis
Special Issue, Mathematics January 1971
Vol. XII, No. COMSEC , 4, Fall 1967 North Vietnam
DOCID: 3020956 g8
Title Author Reference Keyword
Weather: Its Role in Communications Intelligence (U)
What Is Good TraCfic Analysis?
Vol. 111, No. ~ e a t h e i b) ( 3 ) - P . L . 86-
3, July 1968
Vol. XXIV, Tfaffic analysis (U)
What Next, Dr. Trithemius? (U)
Whole New World of Speech, A; Or, Maybe 1984 Will Be a Good Year After All! (U)
Why Analog Computation? (U)
Wideband and the SlGINT System (U)
Will the Real 53 Stand Up? (U)
No. 4, Fall 1979
Lewis, Frank W. Vol. XI, No. Cryptanalysis 4, Fall 1966
Vol. XXI, No. Keyword 4, Fall 1976 recognition
Vol. VII, No. Analog computers 3, Summer 1962
Vol. VIII, No. Intercept 4, Fall 1963
Vol. XIX, No. Cryptanalysis 1, Winter
Wireline Modem with Harmonic Distortion Equalization, A (U)
With Love (and Parentheses) from Peking (U)
1974
Vol. XXV, Communications No. 2, Spring Modems 1980 and Special Mathematics and Engineering Issue, 1981- 1983
Vol. XII, No. Chinese language 1, Winter Codes 1967
Words and the Intelligence Value of Conversations (U)
Gurin, Jacob Vol. XXIII, Language No. 2, Spring 1978
"Word Spotter, A" (U)
Work Breakdown Structure: A
Vol. IV, No. Computers 4, October 1959
Vol. XXV, Software Better Implementation to 1-1 ~ g " ~ , " , F ~ U acquisition Manage Software Overruns (U)
DOCID: 3020956 REF IDrA398598 .-
Title Author Reference Keyword - *
Worldwide Language Problems Voi. XIII, No. Language Ib ) ( 3 ) - p . L
at NSA (U) 4, Fall 1968 training
Writing Efficient FORTRAN (U) Vol. XVII, FORTRAN No. 2, Spring 1972
Fairbanks, Vol. IX, No. Cryptanalysis Sydney 1, Winter
1964
ZFlags in Hagelin Cryptanalysis (U)
- -- - - - _ _ _ _ _ _ -__ , . A L
DOCID: 3020956 REF ID:A398598
R Y
2
NSA
Technical
Journal
AUTHOR
INDEX
3 h
DOCID: 3020956 ( b i 11) (b)(3)-5C USC 403 (b)13)-P.L. 86-36
(b) (3)-P.L. 86-36 N S A Technical Journal Indexed by Author
VO~. IX, NO. ELINT I
2,May1964 Signalanalysis
Fourier Coefficients and Special Fast Mathematics Function Decomposition (U) Fourier Issue,
August 1973
Use of Optical Density Vol. VIII, No. Physics
Signals from Outer Space (U) Vol. 111, No. Sputnik 2, April 1958
Communications Intelligence Vol. 11, No. 2, COMINT April 1957 Intercept
Data Standards for StGINT Vol. XVI, No. Data standardization
Mechanization Systems and a Vol. VII, No. Management New Look a t Management and 2, Spring Organization (U) 1962
Number of Components in Vol. IV, No. Cryptanalysis Random Linear Graph, The (U) 2, April 1959
Model 204 - The Analyst's Vol. XXI, No. Analysis 3, Summer Computers 1976 i
I
Random and Algebraic Vol. XXIII, Mathematics Coverings of Binary Vectors (U) No. 3, i
Summer 1978 I and Special Mathematics and I
Engineering Issue, 1981- 1983
1
i I
1979 I
! I
59 I
DOCID: 3020956 0 8
{ b ) ( 3 ) - P . L . 3 6 - 3 6
Author Title Reference Keyword
On Cipher (U) January 1960 Ciphers
This Is a Recording? (U) Vol. XVIII, Recording No. 2, Spring 1973
Computer Program Debugging: Vol. XIII, No. Computers A New Era (U) 2, Spring Debugging
1968 and Special Computer and Information Sciences Issue
Theory of Secondary Testing, Vol. XIII, No. Cryptanalysis The (U) 3, Summer
1968
Can We Lick the Voice Problem? Vol. XVII, Communications (U) No. 3, Russian
Summer 1972
Deposited Films - Magnetic Vol. I, No. 3, Films Elements for the Memory of the October 1956 Storage Future (U)
Fast Dynamic Programming Vol. XXI, No. Mathematics Algorithm and Its Mathematical 1, Winter Basis, A (U) 1976
Measurement of Insecurity for Vol. XXII, Degaussing Imperfect Erasure, A (U) No. 1, Winter Tape storage
1977
Estimating the Number of Vol. VIII, No. Mathematics Solutions in [GF (2)lnof a 3, Summer System of Equations over the 1963 Integers (U)
In General th4-Iteration Vol. XII, No. Mathematics Convergesw- 1, Winter
1967
On the Maximization of X'AX Vol. VIII, No. Cryptanalysis over the Vertices of the Cube 1, Winter (u) 1963
Systems Approach to Training Vol. XVIII, Communications Radiotelephone Technicians, No. 1,Winter Training The (Ul 1973
DOCID: 3 0 2 0 9 5 6 -98598 ( b ) ( 3 ) -P.L. 86-36
Author I Title
Study of Japanese Nominalization, A (u)
Linearly Induced Nonlinear Cycles (U)
Generalizations of "Maximum- Entropy" (Pattern) Analysis (U)
Some Thoughts concerning Traffic Analysis Mechanization (U)
Integrated and Guided Wave Optics and Device Applications
Potential of Interactive Computer Programs in the Decryption Process of SIGINT, The 4P0WtW
Bipolar Coding and Baseband Recovery (U)
i Another Derivation of Binary Error Rates a s a Function of Signal-to-Noise Power Ratio for Various Modulation Schemes (U)
Noise Communication Technique for Speech (U)
Preamble for Push-to-Talk Ciphony, A (U)
I RAKE System for Tropospheric Scatter, A (U)
Reference Keyword
Vol. XXIII, Japanese No. 2, Spring language 1978
Vol. XXII, Mathematics No. 4, Fall 1977
Vol. XXIV, Signal theory No. 2, Spring 1979
Vol. XI, No. Tr&c analysis 3, Summer 1966
Vol. XXIV, Optics No. 2, Spring Signals processing 1979 and Special Mathematics and Engineering Issue, 1981- 1983
Vol. XXV No. Computers 3, Summer Cryptanalysis 1980 SIGINT
Vol. XII, No. Basebands 1, Winter Codes 1967
Vol. X, No. 3, Collection Summer 1965 Signal-to-noise ratio
Vol. VII, No. Communications 4, Fall 1962
Vol. XII, No. Communications 2, Spring 1967
Vol. X, No. 4, Collection Fall 1965
DOCID: 3020956
(b) ( 3 ) - P . L . 86-36
I Title Reference Keyword
Computers Manual morse Transcription
Author
Transcription of Vol. 111, No. Manual Morse (U) 3, July 1958
Inexpensive Device for Pictorial Input and Output, An (U)
January 1960 Computer graphics
Vol. IV, No. 3, July 1959
Cryptanaly sis On Cryptanalysis and Redundancy (U)
On Operatorless Computers (U) Vol. I., No. 1, April 1956
Computers Storage
Program for Correcting Spelling Errors, A (U)
Vol. IV, No. 4, October 1959
Computers
"Take Care of Your Pennies . . . (U)"
Vol. 111, No. 1, January 1958
Computers
Document storage Threaded File Retrieval System (U)
Vol. XII, No. 2, Spring 1967
Euclidean Algorithm and Distances between Wheel Settings, The (U)
Vol. VIII, No. 1, Winter 1963
Cryptanal y sis Mathematics
Fast Dynamic Programming Algorithm and Its Mathematical Basis, A (U)
Vol. XXI, No. 1, Winter 1976
Mathematics
Generation of Permutations (U) Vol. IX, No. 2, May 1964
Cryptography
Time-Element Scramble (U) Vol. VII, No. 4, Fa11 1962
Encipherment Speech privacy
Maya Astronomical Computer, The (U)
Vol. XXII, No. 1, Winter 1977
Astronomy Cryptologic history
Application of Queuing Theory to Computer Systems, An (U)
Vol. XIV, No. 2, Spring 1969
Computers Queuing theory
Book Review: Lincos, Design of a Language for Cosmic Intercourse, Part I (U)
Vol. VII, No. 1, Winter 1962
Book review Communications Extraterrestrial intelligence
I Cosymmetric Approximations to Vol. XVI, No. Combining Functions (U) 4, Fall 1971
Mathematics
DOCID: 3020956 REF IDgA398598
h ) ( 3 , - t l . . Rh-36 6
Author Title Reference Keyword
Enumeration of the Square Vol. XVIII, Crypto- Permutations of the Symmetric No. 4, Fall mathematics Group (U) 1973
Optical Data Processing - A Vol. XX, No. Cryptanalysis Cryptanalytic Perspective (U) 3, Summer Data processing
1975
Recovering the Structure of a Vol. XIV, No. Cryptanalysis Linear Shift Register (U) 4, Fall 1969
Degrees of Freedom in an N-bit Vol. I, No. 1, Frequency Frequency Distribution (U) April 1956 Distribution
Hill Climbing (U) Vol. X, No. 4, Mathematics Fall 1965
Penney-Ante (U) Vol. XII, No. Cryptanalysis 1, Winter 1967
Recurrent Events and Baudot Vol. 11, No. 2, Baudot streams Streams (U) April 1967
CRISP1 (U) V O ~ . X, NO. 1, Computers Winter 1965 On-line processing
TEMPEST Considerations in Vol. XIV, No. COMSEC Automatic Data Processing 1, Winter TEMPEST Equipment Installations (U) 1969
Thin Film Shifting Matrix, A Vol. VII, No. Currents (U) 4, Fall 1962
Privacy and Protection in Vol. XVIII, Operating systems Operating Systems (U) No. 2,Spring Privacy
1973
Application of Fourier Special Fast Mathematics Transforms to Combiners (U) Fourier
Transform Issue, August 1973
Distribution of the Maximum Vol. VII, No. Binary stream Bulge in a Flat Random Binary 4, Fall 1962 Probability Stream, The (U)
Mathematical Analysis of Jitter Vol. VIII, No. Frequency in a Digital Frequency Source 2, Spring (u) 1963
Simple Homogeneity Test Using Vol. VIII, No. Ciphers Log-Factors, A (U) 4, Fall 1963
DOCID: 3020956
Author I Title Reference Keyword
Introduction to the Fast Fourier Transform, An (U)
Special bsue, January 1971
Computers Mathematics
I Book Review: Lo& Languages Fall 1960 Book review Cryptology
Signals I Multipath Differential Doppler Vol. XXI, No. 3, Summer 1976
I Scientific and Engineering Information Management in the Department of Defedse (U)
Vol. X, No. 2, Spring 1965
Information management
Computer graphics 11 Some Graphical Display Special Issue, January 1971 Techniques for Fourier Analysis 1 iu,
Teletype Processing in the FROSTING System (U)
Vol. XVIII, No. 2, Spring 1973
Signals processing
ABC of Ciphony, The (U) Vol. I, No. 2, July 1956 and Special Linguistics Issue
Ciphony Coding Processing S i a l s
11 Bookbreaking Improvisations - Vol. XI, No. 3, Summer 1966
Bookbreaking Code Part I (U)
Bookbreaking Improvisations - Part 11 (U)
Faithful Mirror, The (U)
Red China's Drive for Literacy (U)
RF Interference Phenomenon and Intelligence Applications (U)
Linguistic Canonical Forms: Tools for Analytic Progress (U)
Vol. XI, No. 4, Fall 1966
Bookbreaking Code
Vol. XIV, No. 1,Winter 1969
Bookbreaking
Vol. XVI, No. 2, Spring 1971
Communist China
Vol. XXIII, No. 4, Fall 1978
Collection
Vol. XIII, No. 1, Winter 1968 and Special Linguistics Issue 11
Communications L=ww3e
REF IDzA398598 DOCID: 3020956 ,,,,,,,,.,,,,,,
Book Review: Cryptanalysis of the Single Columnar Transposition Cipher (U)
Author
I Summer 1961
Title Reference Keyword
Note on the English VCCCC Vol. XVII, Language identification Pattern or Maximum Post- No. 1, Winter Vocalic Consonant Clustering in 1972 Monosyllabic English Words, A (U)
Computer Automation of Circuit Vol. VII, No. Circuit analysis Analysis (U) 4, Fall 1962 Computers
Introduction to Semiconductor Vol. 11, No. 2, Electronics Physics and Diode Theory (U) April 1957
Book review Cryptanalysis
Book review Cryptologic history
Callimahos, Lambros D.
Book Review: The Broken Seal (U)
Vol. XIV, No. Cryptanalysis 2, Spring Plain text
Vol. XII, No. 3, Summer 1967
1 1969
Communications with Extraterrestrial Intelligence IU)
Vol. XI, No. 1, Winter 1966
Communications Extraterrestrial intelligence
Cryptanalyst's Nightmare: An Oneiric Problem and Its Solution, A (U1
Vol. XVI, No. 4, Fall 1971
Ciphers Cryptanalysis
Cybernetics and Problems of Diagnostics: the Parallels between Medicine and Cryptanalysis (U)
Vol. XIV, No. 1,Winter 1969
Cryptanalysis Information analysis
De Profundis; or the ABC of Depth Reading (U)
Vol. 11, No. 1, January 1957
Cryptography Monoalphabetic substitution
Vol. XIX, No. 1, Winter 1974
Cryptologic history
I Introduction to IBM Methods in Cryptanalysis, An (U)
Vol. 11, No. 3, July 1957
Cryptanaly sis
Introduction to Tiaffic Analysis 1 (U) Vol. 111. No. 2, April 1958
Traffic analysis
Ciphers I No, Not Again! (U) Vol. I, No. 1, April 1956
DOCID: 3020956
Author
9 9 8
I Title Reference Keyword
1 On Key Analysis (U) Vol. XIX, No. 4, Fall 1974
Cryptanalysis
Q.E.D.- 2 Hours, 41 Minutes (U) Vol. XVIII, No. 4, Fall 1973
Ciphers
Representative Machine Cipher Systems (U)
Vol. 111, No. 1, January 1958
Cipher machines
Rosetta Stone and Its Decipherment, The (U)
Vol. XVI, No. 1, Winter 1971
Cryptologic hiatory Rosetta Stone
Some Applications of the Chi- Square Test in Cryptanalysis b(U)
Vol. XIV, No. 4, Fall 1969
Cryptanalysis
Campaigne, Howard H.
Aristocrat - An Intelligence Test for Computers (U)
Vol. VII, No. 2, Spring 1962
Computers Cryptanalysis
Book Review: "Analyses of the Case n = 3 in Algebraic Cryptography with Involutory Key-Matrix and Known Alphabet " (Jourml fur die 'Reine und Angewandte Mathematik) (U)
Vol. IX, No. 3, August 1964
Book review Cryptanalysis
Book Review: "How to Estimate Probabilities," (Journal of the Institute of Mathematics and Its Application) (U)
Vol. XII, No. 2, Spring 1967
Book review Mathematics
Book Review: "Involutory Commutants with Some Applications to Algebraic Cryptography, I" (Journal fur Reine u d Angewandte Matkmatik) ( U )
Vol. XII, No. 1, Winter 1967
Book review Mathematics
Book Review: Mechanical Resolution of Linguistic Problems (U)
Vol. 111, No. 4, December 1958
Book review Computers L~~kruaee
Book Review: Military Cryptanalytics, Part I1 (U)
Vol. IV, No. 4, October 1959
Book review Cryptanal ysis Military
DOCID: 3020956 REF IDzA398598
Author ( Title Reference Keyword
Book Reuiew: "Some Further Fall 1960 Book review Methods in Algebraic Mathematics Cryptography"; (Journal of the Mitchell Scientific Society, No. 74) (U)
Book Review: "Variable Matrix Substitution in Algebraic Cryptography" (U)
Distribution of Letters in Short Messages of English, The (U)
Extraterrestrial Intelligence (U)
Key to the Extraterrestrial Messages (U)
I LIGHTNING (U)
I Null Hypothesis, The (U)
I Reading TUNNY (U)
Research a t NSA (U)
I Time Is -Time Was - Time Is Past Computers for Intelligence
Unbreakable Cipher, The (U)
I Coupon Collecting and Cryptology (U)
I Composition of Boolean Functions I (U)
Vol. IV, No. Book review 4, October Cryptography 1969
Vol. XIV, No. Ciphers 2, Spring1969 Plaintext
Vol. XI, No. Communications 2, Spring Extraterrestrial 1966 intelligence
Vol. XIV. No. Communications 1, Winter Extraterrestrial 1969 intelligence
Vol. IV, No. Computers 3, July 1959
Vol. I, No. 2, Cryptology July 1956
Vol. VII, No. Cryptologic history 4, Fall 1962 Germany
Vol. XIII, No. Research 2, Spring 1968
Vol. X, No. 1, Artificial Winter 1966 intelligence and Computers Computer and Information Science Issue
Spring 1961 Ciphers Cryptanalysis
Vol. XI, No. Cryptanalysis 4, Fall 1966 Mathematics
Special Fast Mathematics Fourier Issue, August 1973
67 'b) 3 ) - P . L . 8 6 - 3 6
6
DOCID: 3020956
Author I Title
Matric Recursions (U)
- -
Generating Function Approach to CRETAG, A (U)
Band-Pass Filters (U) n
FIR: A CDC 1604 Program for Solution of Systems of Linear Equations (U)
Realization and Optimization of the Audio Frequency Microminiature Thin Film
Solution of Hill's Basic Algebraic Methods for Enciphering Polygraphs (U)
Composition of Boolean Functions I (U)
Composition of Boolean Functions I1 (U)
Distribution of Letters in Short Messages of English, The (U)
I Distribution of C bd (a, f l , The
Solution of Additive-Minuend Busts (U)
Contextual Testing in Establishing Minimum Working Level Language Proficiency (U)
Voynich Manuscript Revisited, The (U)
Reference Keyword
Vol. XXII,' Mathematics No. 1, Winter 1977
Vol. XXII, Mathematics No. 3, Summer 1977
Vol. XIII, No. Filters 4, Fall 1968 Frequency and Special Mathematics and Engineering Issue, 1981- 1983 - Vol. X, No. 1, Computer Winter 1965 Mathematics
Vol. I, No. 2, Encipherment July 1956
Special Fast Mathematics Fourier Issue, August 1973
Special Fast Mathematics Fourier Issue, August 1973
Vol. XIV, No. Ciphers 2, Spring Plain text 1969
Special Fast Mathematics Fourier Issue, August 1973
Vol. 111, No. Cryptanalysis 1, January 1958
Vol. XXV, Language proficiency No. 1, Winter Testing 1980
Vol. XXI, No. Voynich Manuscript 3, Summer 1976
- - - -
ibl ill
REF IDtA398598. ( h ( 3 ) - 5 0 USC 403
DOCID: 3020956 (bl (31-18 usc 7 9 8
9 (bl(3)-?.L. 86-36
ibi(3)-P.L. 86-36
Author 1 Title Reference Keyword
Design and Implementation of a Vol. XXIII, Digital Demodulator for Use No. 2, Spring against On-Off Keyed Signals, 1978 The (U)
I Frequency Analysis of a Set of Vol. XVI, No. Harmonically Related Tones (U) 1, Winter
1971
African Language Problem a t Vol. XI, No. NSA, The (U) 3, Summer
1966
I Magic Digraphs (U) Vol. XII, No. 1, Winter 1967
Vol. XXV, No. 1, Winter Ism
Wireline Modem with Harmonic Vol. XXV, Distortion Equalization, A (UI No. 2, Spring
1980 and Special Mathematics and Engineering Issue, 1981- 1983
Traffic Analysis on Sovie (-1 ?&::;NO. ~ r a n s m i s s i o n ~
1968
Morse Signals
Signals analysis
African language
Cryptanalysis
Spread spectrum
Communications Modems
Traffic analysis
Note on a Solution of a Voi. I, No. 3, Ciphers Polyalphabetic Dinome System, October 1956 A (U)
Variable-Length Output String Vol. XXI, No. Mathematics
3- 4, Fall 1976
Electrical Design of Random Vol. IX, No. Encryption Sequence Generators (U) 3, August
1964
One Model for an Artificial Vol. XI, No. Radio intercept Ionosphere (U) 2, Spring
1966
Trade-off Approach to Quality Vol. XXIII, SICINT collection Intercept versus Quantity No. 1, Winter and processing Intercept, A (U) 1978
DOCID: 3020956 m r \ n 3 9 8 5 9 8 -
Author Title
Control of
Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System (U)
Cluster Analysis: Introduction to Models and Methods (U)
Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Scaling, The (U)
Introduction-to Statistical Pattern Recognition (U)
Investigation of Nonrandom Features in the Optical Fourier Transform of Shift Register Sequences and Binary Key, An (U)
Investigation of Techni ues for of thd-1
Theory and Applications of Three-Way Multidimensional Scaling (U)
CANDEW: A Methodology for Evaluating tlF C;ollection Potential (11)
CAPER %ftw:irt? Support System, The (U 1
Reference Keyword
Vol. XVII, Computer No. 2, Spring programmnig 1972
Vol. XII, No. Signals 4, Fall 1967 TEMPEST
Vol. XXII, Mathematics No. 2, Spring 1977
Vol. XXI, No. Cryptanalysis 4, Fall 1976
Vol. XXII, Pattern No. 3, recognition Summer 1977 and Special ( b i I 1 i Mathematics (b):3)-5@usc 4C3
and (b) (3)-1E USC 798 ( b ) ( 3 ) - P . L . 8 6 - 3 6
Engineering Issue, 1981- 1983
Vol. XfX, No. Crypto- 4, Fa11 1974 mathematics
Vol. XX, No. Signals 4, Fall 1975 Soviet
Vol. XXI, No. Cryptanalysis 2, Spring 1976
Vol. XXII, HF collection No. 3, Summer 1977
Voi. Y XII, Software support No. 2, Spring Soviet 1977
DOCID: 3020956 9 9 8 5 9 8
Author Title Reference Key word .--
On the Expected Number of Vol. VIII, No. Cryptanalysis Random Stops Corresponding to 1, Winter a Given Menu (U) 1963
Thin Film Thermocouple (U) Vol. VII, No. Physics 4, Fall 1962
Application of Human Factors to Vol. XXIV, Computers the Specification and Design of No. 4, Fall Human factors Interactive Computer Systems 1979 (U)
Data Standardization and the Vol. XVI, No. Data standards Trace Factor (U) 2, Spring Information
1971 management
Some Properties of Sample Special Fast Mathematics Bulges (U) Fourier Issue,
August 1973
Wideband and the SIGINT Vol. VIII, No, Intercept System (U) 4, Fall 1963
Linear and Quadratic Electro- Vol. IX, No. Optics Optic Effects (Pockels and Kerr 4, Fall 1964 Effects) (U)
Approximation of Central Vol. IV, No. Random variables Limits 4, October
1959
Exact Markoff Probabilities Vol. 11. No. 3, Mathematics from Oriented Linear Graphs July 1957 (U)
Stirling Numbers of the Second Vol. 111, No. Stirling numbers Kind (U) 1, January
1958
Survey of Multinomial Vol. XX, No. Mathematics Estimation for Code Weighting, 3, Summer A (U) 1975
Transient Analysis of Coaxial Vol. I, No. 2, Coaxial cables Cables Considering Skin Effect July 1956 (U)
Some Properties of the Two- Vol. IX, No. Information State First-Order Markov Chain 4, Fall 1964 transmission (U)
DOCID: 3020956 I--! 98(1) b) (31-50 USC 403
t b ) ( 3 ) - F . L . 86-3n ~ b ) (3)-18 USC 798
Author I Title Reference Keyword
Vol. XVI, No. l] 4. Fall 1971 vie navy
1 Work Breakdown Structure: A Vol. XXV, Software Better Implementation to No. 4, Fall acquisition Manage Software Overruns (U) 1980
Software Maintenance -The Vol, XXIII, Software Other Side of Acquisition (U) No. 3, maintenance
Summer 1978
On the Selection of Personnel for January 1960 Cryptanalytic Cryptanalysis (U) personnel
On the Selection of April 1960 Cryptanalytic Cryptanalysts - Part 11 (U) personnel
Real-Time Raster (U) Vol. XXIV, ELINT collection No. 1, Winter 1979
1 I Note on Product Sequences. A Vol. XVI. No. Mathematics 2, Spring 1971
Slow Look at Fast Transforms, Special Fast Mathematics A (U) Fourier Issue,
August 1973
Survey of Bent Functions, A (U) Special Fast Mathematics Fourier Issue, August 1973
Experimental Approach ta an Vol. VIII, No. Collection Environment Study in the HF 4, Fall 1963 Signals Band (U)
Art of Automatic Bearing Vol. XVIII, Mathematics Instrumentation, The (U) No. 4, Fall
1973
Introduction to Vol. XII, No. Communications Psycholinguistics, 2, Spring Paralinguistics, and Kinesics, 1967 An, (U)
Introduction to the Methods of Summer 1961 Thin film analysis Thin Film Analysis, An (U)
DOCID: 3020956 9 3 9 8 5 9 8
I Low Weight Linear Recursions Vol. VIII, No. Mathematics in Key (U) 1, Winter
1963
Author
Hoopscotch (U) Vol. XII, No. Games 2, Spring 1967
Title Reference Keyword
IFF: A New Branch c;f Vol. 11, No. 4, IFF Cryptology (U) October 1957 Planes
Scientific and Engineering Vol. X, No. 2, Information , Information Management in the Spring 1965 management Department of Defense (U)
D'Imperio, Mary
Assignment of Storage Space in Rapid-Access Memory Systems (U)
Computer Sorting (U)
Magnetic Core Memories (U)
Some Cribbing Techniques (U)
Hybrid Circuits (U)
Vol. 11, No. 2, Addressing Systems April 1957 Memory
Vol. XIII, No. Computers 3, Summet 1968
Vol. 11, No. 1, Computers January 1957 Memory
Vol. XXIII, Cribbing techniques No. 1, Winter 1978
Vol. 111, No. Circuits 1, January 1958
Application of Cluster Analysis Vol. XXIII, Cluster analysis and Multidimensional Scaling No. 3, Voynich Manuscript to the Question of "Hands" and Summer 1978 "Languages" in the Voynich Manuscript. An (U)
Application o 43 the vol. XXIV, Voynich Manuscrlp , An Ub( No. 2, Spring Voynic Manuscript - Data Structures and Their Vol. IX, No. Computers Representation in Storage: Part 3, August Memory I (U) 1964
Data Structures and Their Vol. IX, No. Computers Representation in Storage: Part 4, Fall 1964 Memory I1 (U)
DOCID: 3 0 2 0 9 5 6 9 8
Author I Title Reference Keyword
Human-Machine Interfaces for NSA Computer Systems (U)
Vol. XXIV, Computers No. 4, Fall SOLIS 1979
Reverse Sort Machine Listings (U)
Vol. XVIII, Computer No. 1,Winter working aids 1973
Study of Character-Handling by Computer at NSA, A (U)
Vol. XIV, No. Computers 2, Spring 1969
TEMAC (Text Macro Compiler): A Machine Language for Processing ~ e x t (U)
Vol. X, No. 3, Computers Summer 1966 Machine language and Computer and Information Science Issue
Growing Up with Computers a t NSA (U) '
Special Computers Council of Learned
Eachus, Joseph
r i In General the PCAH Iteration Converges (U)
Organization Issue, 1972
Vol. XII, No. 1, Winter 1967
Mathematics
Tunnel Diode Characteristic Function Generator (U)
Vol. VIII, No. 1, Winter 1963
Computers
Symmetric Approximations to Boolean Functions (U)
Vol. XIX, No. 3, Summer 1974
Mathematics
Vol. IV, No. 3, July 1959 I Computers
Signal theory
Operation Babel (U)
Generalizations of "Maximum- Entropy" (Pattern) Analysis (U)
Vol. XXIV, No. 2, Spring 1979
Engstrom, H. T. Science and Cryptology (U) I Vol. 111, No. 3, July 1958
Cryptology Science u Arithmetic of the Addition
Generation Principle for Electronic Key Generators (U)
Vol. 11. No. 3, July 1957
Mathematics
DOCID: 3020956 REF ID:p398598 A
Author I Title Reference Keyword
Mathematics Vol. 11, No. 1, January 1957
Arithmetic Qfa Generation Principle for an Electronic Key Generator, The (U)
Arithmetic of the Linear Generation Principle for Electronic Key Generators, The (U)
Vol. 11, No. 4, October 1957
Mathematics
Arithmetic of the Multiplication Generation Principle in the Koken Key Generator, The (U)
Vol. 11, No. 2, April 1957
Mathematics
Book Review: "Some Applications of High Speed Computers to the Case n= 2 of Algebraic Cryptography," (Mathematics of Computation, Vol. 15, No. 75) (U)
Fall 1961 Book review Mathematics
I I Number of Components in Random Linear Graph, The (U)
Vol. IVY No. 2, April 1959
Cryptanal ysis
I I Random Walks with Restraining Barrier a s Applied
Vol. 111, No. 2, April 1958
Computers Sampling
I I Collected Editorials of Sydney Fairbanks (U)
April 1956 - July 1959
Editorials
Cryptanalysis Z-Flags in Hagelin Cryptanalysis (U)
Vol. IX, No. 1, Winter 1964
I I Communications Security and Special Council of Learned Organization Issue, 1972
Computers COMSEC Computers (U)
I I Channel Modeling and Code Performance Evaluation (U)
Vol. XXIII, No. 2, Spring 1978 and Special Mathematics and Engineering Issue, 1981- 1983
Channels Communications
DOCID: 3020956 -9 * (b)i3)-1.L. 86-36
Author 1 Title
I
Book Review: Norse Medieval Cryptography in Runic Carvings (U)
Continued Fractions and Mills' Algorithm (U)
Filby, P. W.
I UTIL of English: A Study of the Quality of SICINT Product (U)
Gweeks Had a Gwoup for It, The (U)
1 Precursor of Modern Communications Intelligence (U)
Third Revolution: Prospects for Continued SICINT Productivity, The (U)
Response of a Non-Linear Device to a n Emitter Environment in the High Frequency Spectrum, The (U)
Statistical Description of the Noise and Emitter Environment, A (U)
I Example of Computer Graphics as Applied to Key Analysis, An
I Computers and Advanced Weapons Systems (U)
I Remarks concerning Substantialization (U)
SELLNOW - A Man-Machine Communication System for ELINT Data (U)
Reference Keyword
Vol. XXV, Mathematics No. 3, Summer 1980
Vol. XXI, No. Eletchley Park 2, Spring Cryptologic history 1976
Vol. XIII, No. Book review 3, Summer Cryptologic history 1968
Vol. XVII, SIGINT reporting No. 4, Fall 1972
Vol. 111, No. Cryptologic history 3, July 1958
Vol. XIII, NO. srCrNT 3, Summer productivity 1968
Vol. VIII, No. Signals 1, Winter 1963
Vol. XI No. 4, Collection Fall 1965
Vol. XXII, Computer graphics No. 1, Winter 1977
Special Advanced weapons Council of systems Learned Computers Organization Issue, 1972
Vol. XVIII, Computers No. 1,Winter Cryptanalysis 1973
Vol. IX, No. Mathematics 4, Fall 1964
Vol. VIII, No. ELINT 4, Fall 1963
DOCID: 3020956 REF ID:A398598
Author 1 Title Reference Keyword I
Matter Transmission (U) Vol. VIII, No. Cryptosecurity 1, Winter 1963
I I Automatic Signal Identification Special Issue,. Signal identScation January 1971
FDM Activity Detection (U) Vol. XXI, No. FDM signals 1, Winter 1976
Reference Patterns for Nearest Vol. XXII, Signals analysis Neighbor Rule (U) No. 1, Winter
1977
Friedman, William F.
Can Cryptologic History Repeat Vol. XVIII, Cryptologic history Itself? (U) No. 3,
Summer 1973
Introduction to Cryptology - I , Vol. IV, No. Cryptologic history An (U) 4, October
1959
Introduction to Cryptology - 11, April 1960 Cryptologic history An (U)
Introduction to Cryptology - 111, Fall 1960 Cryptologic history An (U)
Introduction to Cryptology - IV, Winter 1961 Cryptologic history I An, i u i
Introduction to Cryptology - V, Summer 1961 Cryptologic history I An, (Ui
I Introduction to Cryptology - VI, Fall 1961 Cryptologic history An, (U)
Solution of the Japanese PURPLE Vol. XIX, No. Cryptologic history Machine, The (U) 1, Winter PURPLE machine
1974
Gaddv. David W. 1 Rocheford's Cioher: A Discovery Vol. XVIII, Civil war in ~ o n f e d e r a t . ~ r y p t o ~ r a ~ h ~ - No. 4, all- Cryptologic history
1973
Viet Minh Cover Terms and Vol. IV, No. Viet Minh Their Solution (U) 3, July 1959 cover terms
and Special Linguistics Isssue
DOCID: 3020956 Ib] ( 3 1 - P . L . 86-36
6 9 8
Author I Title Reference Keyword
Gerson, Nathaniel C.
Multichannel Language Processing as a System (U)
Rocket Motion and Newton's Second Law (U)
, Correlation and Power Spectra of Randomly Sampled and Held
I Analysis of Sorting Techniques for Multiple Signal Intercept (U)
Cost-Effectiveness Study of Spectrum Surveillance Systems,
Vol. XVII, Language processing No. 4, Fall 1972
Fall 1960 Rocket motion
Vol. XIV, No. Signals analysis 2, Spring 1969
VO~. XII, NO. COMINT target 3, Summer identification 1967
Vol. XIV, No. Collection 3, Summer 1969
Antipodal Propagation (U) Vol. IV, No. Radio waves 1, January Transmitters 1959
CoMsEC a t IUD Sites- Vol. VII, No. COMSEC 4, Fall 1962
Future Problems of Intercept (U) Vol. VIII, No. COMINT 1, Winter ELINT 1963
Ionospheric Propagation (U) Vol. 111, No. Communications 4, December Ionosphere 1958
Intercept and Electromagnetics Vol. XX, No. Electricity (U) 2, Spring Optics
1975
Intercept of USSR Missile Vol. IV, No. Electromagnetics Transmissions (U) 3, July 1959 Missile radiation
Interference and Intercept (U) Vol. XVI, No. Intercept 1, Winter Noise 1971
I Polar Ionosphere, The (U) Summer 1961 Ionosphere Physics
Six Point Program for Improved Vol. VII, No. Intercept Intercept (Part I) (U) 3, Summer
1962
DOCID: 3020956 REF IDzA398598 9
Title Reference Key word
U. S. Program in Direction Vol. X, No. 2, Direction finding Finding, A (U) Spring 1965 Wullenweber
systems 1
Determination of Missile and April 1960 Earth satellite Earth Satellite Trajectories Orbits from Radar Observations (U)
Geodetic Latitude and Altitude Vol. XX, No. Astrodynamics from Geocentric Coordinates (U) 1, Winter Mathematics
1975
Least Squares Analysis of a Vol. IV, No. Mathematics Probability Matrix, The (U) 1, January
1959
Logarithmic Scoring and Vol. 11, No. 1, Cryptanalysis Preliminary Testing (U) January 1957
Maps and the Conversion of Vol. 111, No. Mapping Gauss-KrQger Grid Coordinates 1, January (u) 1958
Maximum Likelihood Fall 1961 Celestial mechanics Estimation of an Orbit (U)
Mechanical Treatment of Vol. 11, No. 4, Cryptanalysis Fibonacci Sequences, A (U) October 1957
Orbit Computation with the Vol. XIX, No. Astrodynamics Vinti Potential and Universal 1, Winter Variables (U) 1974
Orbit Fitting to Angular Data Vol. XXI, No. Astrodynamics (U) 2, Spring
1976
Sequential Least Squares Vol. XII. No. Mathematics Estimates (U) 2, Spring
1967
Times of Shadow Passage for Vol. VIII, No. Satellite Earth Satellites (U) 3, Summer tracking
1963
Transverse Mercator Projection, Vol. XXIV, Mapping The (U) No. 4, Fall
1979
On the Expected Number of Vol. VIII, No. Cryptanalysis Random Stops Corresponding to 1, Winter a Given Menu (U) 1963
Author
I ,
DOCID: 3020956
Title Reference Keyword Author
Characteristic Features of the Vol. XI, No. Russian language Russian Language of the Last 2, Spring '
Decade (U) 1966
The Case for Bad Grammar Vol. IX, No. Russian grammar 2, May 1964 and Special (bi (1) Linguistics Issue
(bi(3)-50 USC 403
(b)(Z)-13 USC 799
Spoken Russian: The Other Grammar (U)
Vol. XIV, No. 3, Summer 1969
Russian language ( bi ( - P. L .
II Weather or Not - Encrypted? (U) Vol. XII, No. 4, Fall 1967
COMSEC North Vietnam
Standard for Evaluating the Intelligence Content of Equipment Emanations (U)
Vol. IX, No. 3, August 1964
Equipment emanations
II Book Review: Basic Cryptologic Glossary (C)
Vol. XI, No. 1, Winter 1966
Book review Cryptology
II Exact Markoff Probabilities from Oriented Linear Graphs
Vol. 11. No. 3, July 1957
Mathematics
II List of Properties of Bayes- Turing Factors, A (U)
Vol. X, No. 2, Spring 1965
Mathematics
Mickle-Muckle Principle in Hagelin Cryptanalysis, The (U)
Vol. IX, No. 4, Fall 1964
Cryptanalysis Hagelin machines
Roughness of Visitations in a Markov Chain, The (U)
Vol. VIII, No. 2, Spring 1963
Mathematics
Turing's Contributions to Cryptology (U)
Vol. VIII, No. 3, Summer 1963
Cryptology Mathematics
COMINT Analysis and Reporting on the Developing Nations (U)
Vol. XVII, No. 2, Spring 1972
Analysis COMINT Reporting
1 Fourier Analysis on Finite Vol. XXI, No. Mathematics Abelian Groups (U) 3, Summer
1976
Computer Generation of Vol. X, No. 3, Cryptanalysis Unrelated Latin Squares (U) Summer 1965 Latin squares
DOCID: 3020956 REF ID:A398598 A A a
Author I Title Reference Keyword
Generating Random Characters on a Computer (U)
Rationale for and Preliminary implementation of HYPERCAN (High Performance Cryptanalysis) (U)
Scientific and Engineering Information Management in the Department of Defense (U)
Gurin, Jacob Employment of Military Linguists (U)
Vol. XII, No. Code generation 1, Winter Computers 1967
Vol. XXIII, Computers No. 4, Fall Cryptanalysis 1978
Special Computers Council of Learned Organization Issue, 1972
Vol. X, No. 2, Information Spring 1965 management
Vol. XIII, No. Military linguists 4, Fall 1968 and Special Linguistics Issue, I1
Layman's Guide to the Vol. XXIII, Language Mysteries of Linguistics, A (U) No. 1, Winter Linguistics
1978
Nest of Dragons. A: The Voice Problem (U)
Possible Applications of Keyword Recognition in Voice Intercept (U)
Speaker Identification by Machine: Where Do We Stand? (U)
Translation of a Classic: A Matter of Ethics, The (U)
Vol. XXI, No. 1, Winter 1976
Vol. XXII, No. 1, Winter 1977
Vol. XIV, No. 4, Fall 1969
Vol. XI, No. 2, Spring 1966
Language Voice problem
Keywords Voice intercept
Speaker identification
Literature Translation
Words and the Intelligence Vol. XXIII, Language Value of Conversations (U) No. 2, Spring
1978
"Maybe It's Related to the Phase Vol. XVII, Callsign generation of the Moon" (U) No. 4, Fall PRC
1972
DOCID: 3020956
Author I Title Reference Keyword
I Growing Up with Computers a t NSA (U)
Use of Production Methods in Reading Transposed Letter Codes (U)
Special Computers Council of Learned Organization Issue, 1972
Vol. 11, No. 1, Codes January 1957 and Special Linguistics Issue
I Electron Beam Recording for Wideband Analog Signals (U)
Optical Receiver, The (U)
Recovery of Pre-Detection Signals in the Optical Receiver (U)
Did Alexander Popov Invent Radio? (U)
Soviet Communications Journals as Sources of Intelligence (U)
I Combining Functions in Key Generators (U)
LVHF Propagation and Collection Techniques (U)
On Milking the Sacred Cow (U)
On an Algorithm for Approximate Polybit Scoring Using Fourier Transforms (U)
Electrical and Magnetic Properties of Computer Tape (U)
I Range Dependence on System Temperatures (U)
Vol. XIV, No. Recording 3, Summer Signals 1969
Vol. XIII, No. Optical receiver 2, Spring 1968
Vol. XIII, No. Signals 4, Fall 1968
January 1960 Radio
Vol. IX, No. Communications 3, August Soviet 1964
Spring 1961 Keys Shift registers
Vol. XVI, No. LVHF collection 4, Fall 1971
Vol. XVII, Collection No. 2, Spring 1972
Special Fast Mathematics Fourier Issue, August 1973
Vol. IX, No. Digital recordings 1, Winter IBM 1964
Vol. IV, No. Communications 1, January 1959
DOCID: 3020956 REF IDgA398598 9
Author 1 Title Reference Keyword
Markov Chain -The Models with the Short Memories (U)
II Learn with BOOK (U)
Hybrid Circuits (U)
Low Cost Process for Printed Circuits, A (U)
Modifhation of a Phantastron Genetator, A (U)
New Mode of Operations in Junction Transistors, A (U)
Transistor Phantastrons (U)
I ( Cover and Deception (U)
New Approach to the One-Time Pad, A (U)
Problem Solving with On-line Systems (U)
Reliability and Checking in Computing Systems (U)
Vol. XVII, Mathematics No. 1, Winter 1972
Vol. XI, No. Light reading 3, Summer 1966
Vol. 111, No. Circuits 1, January 1958
Vol. 11, No. 1, Circuits January 1957
Vol. IV, No. Circuits 4, October 1959
Vol. 11. No. 3, Circuits July 1957
Vol. IV, No. Circuits 2, April 1959
Vol. IV, No. Communications 3,July1959 Deception
(b) : ? )
Vol. XIX, No. Ciphers O(,A
3, Summer One-time pads 1974
Special On-line systems Council of Problem solving Learned Organization Issue, 1972
Vol. 11, No. 4, Computer October 1957 diagnostics
Threaded File Retrieval System Vol. XII, No. Document storage (U) 2, Spring
1967
Cryptanalytic Applications of Vol. IX, No. Cryptanalysis Sequential Analysis (U) 3, August Mathematics
1964
I Multiple Hypothesis Testing Vol. XVI, No. Cryptomathematics and the Bayes factor (U) 3, Summer
1971
DOCID: 3020956
Author Title
Distribution. A (U)
11 Project EXPMRER'(U)
Introduction to Computer Binary Arithmetic, An (U)
Assignment Algorithm Applied to Manual Cryptosystems (U)
Introduction to "Hairpin" Registers (U)
for Operation
Dialect: A Data Type for the Person-Machine Interface (U)
Extensible Model of a Hand Cryptosystem, An (U)
I I FUZZY: An Evolutionary Model for Data Structures (U)
2 GEE System - V, The (U)
Jacobs, Walter Finding the Best-Scoring W. Permutation (U)
I Growing up with Computers a t NSA (U)
Insolvable Problem, An (U)
Reference Keyword - - --
Vol. XIII, No. Mathematics 4, Fall 1968
Vol. XVI, No. Cryptologic history 2, Spring Vietnam 1971
Vol. 111, No. Computer 2, April 1958 Mathematics
Vol. XX, No. Computers 1, Winter Cryptanalysis 1975
Vol. XX, No. Cryptovariables 1, Winter 1975
Vol. 11, No. 2, April 1957
Vol. XXII, Computers No. 2, Spring 1977
Vol. XXIII, Computers No. 1, Winter Cryptanalysis 1978
Vol. XXIV, Programming No. 3, Software Summer 1979
Vol. VII, No. Cryptologic history 4, Fall 1962 Germany
Vol. XIV, No. Mathematics 4, Fall 1969
Special Computers Council of Learned Organization Issue, 1972
Vol. XIV, No. Computer 3, Summer programming 1969
Vol. VIII, No. Computers 3, Summer Cryptology 1963 Turing machine
Author
Jenkins, Virginia
Title Reference Keyword
Learning Machines (U) Vol. 111, No. Learning machines 3, July 1958
Learning Machines - Part I1 (U) Vol. IV, No. Learning machines 2, April 1959
Pattern Recognition (U) Winter 1961 Pattern recognition
Reading a Depth by Computer Vol. X, No. 2, Computer (U) Spring 1965 programming
CAMINO (U) Vol. XII, No. Computers 3, Summer Translation 1967
On the Distribution of n-Digit Vol. I, No. 2, Cryptography Groups by the Sum of Their July 1956 Digits (U)
Some Notes about Chi-Square Vol. VIII, No. Chi-Squares (U) 3, Summer
1963
Variance of the Number of Ones Vol. XII, No. Mathematics in a Derived Stream of Zeros and 2, Spring Ones (U) 1967
Role of Carrier (VCh) Telephony Vol. XIX, No. Communications in Soviet World War I1 Strategic 3, Summer Soviets Communications (U) 1974
On the Maximization of AX Vol. VIII, No. Cryptanalysis over the Vertices of the Cube 1, Winter (u) 1963
Automatic Crib-Dragging Vol. I, No. 1, Hagelin machines Device for Hagelin Machines, April 1956 An (U)
Cycles from Nonlinear Shift Special Shift registers Registers (U) Mathematics
and Engineering Issue, 1981- 1983
Public Key Cryptosystems (U) Vol. XXIV Cryptosystems No. 1 Winter 1979
Thin Film Shifting Matrix, A Vol. VII, No. Currents 4, Fall 1962
DOCID: 3020956 99 * t~'3)-P.L. 56-36
1
Author I Title Reference Keyword
About NSA (U) Vol. IV, No. History 1, January NSA 1959
I Text Recognition Procedure for Vol. XI, No. Cryptanalysis I Cryptanalysis, A (U)
I Magic Digraphs (U)
Computer Processing 4-1 Telemetry (U)
Fast Look-up in a Threaded Dictionary (U)
1 Cost-Effectiveness Study of Spectrum SurveiIlance Systems, [ A (UI
I Data Transmission Over Telephone Circuits (U)
I Analysis of Lexical Meaning across Cultures, An (U)
Kullback, Solomon
1 CY-600 View of Language, A
"False Friends" of the Translator in the English and Russian Languages: A Translation from the Russian of V. V. Akulenko (U)
Freedom in Translation (U)
3, Summer 1966
Vol. XII, No. Cryptanalysis 1, Winter 1967
Vol. XIII, No. , Com~uter , 3, Summer 1968
Vol. XVI, No. Dictionary references 1, Winter 1971
Vol. XIV, No. Collection 3, Summer 1969
Vol. IV, No. Digital data 1, January Transmission 1959
Vol. XIII, No.. Communications 4, Fall 1968 Language
Vol. XVIII, Language No. 3, Linguists Summer 1973
Vol. XVI, No. Russian translation 4. Fall 1971
Vol. XXI, No. Translation 3, Summer 1976
Problems of Meaning in Vol. 111, No. Language Interlingual Dictionaries (U) 1, January dictionaries
1958
I Flattening Effect, The (U) Vol. X, No. 1, Cryptology Winter 1965 Mathematics
DOCID: 3 0 2 0 9 5 6 9 : A 3 9 8 5 9 8
Reciprocal Alphabets and Vol. III,.No. Reciprocal Friedman Squares (U) 1, January alphabets
1958
Author
I Some Applications of Vol. I, No. 1 Information theory Information Theory (U) April 1956
Title Reference Keyword
On Tests of Sequences (U) Val. VII. No. Cryptanalysis 1, Winter 1962
Report on the Keyword System, A (U)
Special Felix System, The (U)
( Entropy of German, The (U)
Book Review: Mathematical Statistics (U)
Book Review: Modern Probability Theory and its Applications (U)
I Book Review: Probability: An Introduction (U)
Book Review: Recent Literature on Algebraic Cryptography (U)
Comparison of the Efficiency of Two Methods of Estimating Certain Time Parameters, A (U)
On Comparing Two Observed Frequency Counts (U)
On Tests of Sequences (U)
Vol. IV, No. 3, July 1959
Vol. IV, No. 2, April 1959
Vol. I, No. 2, July 1956
Vol. VII, No. 4, Fall 1962
Fall 1960
Fall 1960
Codes Keywords
German code
Frequency Probability
Book review Mathematics
Book review Probability theory
Book review Probability theory
Vol. VII, No. Book review 2, Spring Cryptography 1962 Mathematics
Vol. IX, No. Mathematics 2, May 1964
Vol. 111, No. Chi-squares 2, April 1958
Vol. VII, No. Cryptanalysis 1, Winter 1962
Probabilities of Hypotheses and Vol. I, No. 3, Cryptology Kullback-Leibler Information- October 1956 Statistics in Multinomial Samples (U)
Simple Test for Slide or Kick, A Vol. VIII, No. Mathematics 4, Fall 1963
DOCID: 3020956 9
' (bi (3)-P.L. 86-36
Author I Title Reference Keyword
Linear Approximation Attack Special Fast Mathematics on an Irregularly Stepping Key Fourier Issue, Generator, A (U) August 1973
Maya Astronomicdl Computer, Vol. XXII, Astronomy The (U) No. 1, Winter Cryptologic history
1977
ABC of Cifax, The (U) Vol. I, No. 2, Communications July 1956 Facsimile
Privacy
OVERLORD. the Programmer's Vol. XXII, Computer operating Friend: An Extension of the No. 2, Spring systems IDASYS Operating System (U) 1977
I I Error Formula for Iterative Vol. XXII, Frequency Prefiltering Frequency No. 3, Linear prediction Estimates, An (U) Summer 1977
"Typewriter" Key and the Vol. IV, No. Code groups Stereotype, The (U) 4, October
1959
Utilization of Code Limitations January 1960 Codes in Solving Bust Messages (U) and Special
Linguistics Issue
I I Apparent Paradox of Bayes Vol. X, No. 1, Bayes factors Factors, The (U) Winter 1965 Cryptanalysis
I I Bayes Marches On (U) January 1960 Cryptanalysis Mathematics
I I Notes on Chi-square in Vol. 11. No. 3, Cryptanalysis Cryptanalysis (U) July 1957
Optimum Use of Log Weights (U)
Solving a Playfair Cipher by Computer (U)
Use of Bayes Factors with a Composite Hypothesis (U)
Note on "A Low Cost Process for Printed Circuits" (U)
Vol. IX, No. Computers 3, August Plain text 1964
Vol. XIV, No. Computer 4, Fall 1969 cryptanalysis
Vol. IX, No. Cryptanalysis 4, Fall 1964
Vol. 11, No. 3, Circuits July 1957
DOCID: 3020956 TO -398598
Author I Title Reference Keyword
Random Walks with Restraining Barrier as Applied to the Biased Binary Counter (U)
Mathematics and Computers in Cryptanalysis (U)
Lewis. Frank W. I Book Review: Cloak & Cipher
Vol. 111, No. Computers 2, April 1958 Sampling
Special Computers Council of Mathematics Learned Organization Issue, 1972
Vol. VII, No. Book review 3, Summer Cryptanalysis 1962
Categories of Cryptographic Vol. XII, No. Cryptography Phenomena - with a Few 4, Fall 1967 Examples of Effect and Cause (U)
Fallacy of the One-Time-Pad Vol. XIV, No. Cryptanalysis Excuse, The (U) 3, Summer
1969
Garden Paths I Have Followed Vol. IX, No. Cryptanalysis (U) 3, August
1964
German Agent Systems of Vol. VII, No. Cryptologic history World War I1 3, Summer Germany
1962 South America
"It Is Obvious That . . .": A Vol. 111, No. Codes Painless Approach to 2, April 1958 Messages Cryptanalytic Diagnosis (U)
Report on the Keyword System, Vol. IV, No. Codes 3, July 1959 Keywords
I Some of My Best Friends Are Vol. IV, No. Mathematicians Mathematicians (U) 2,April1959
I Something May Rub Of l (U) Vol. X, No. 1, Cryptanalysis Winter 1965
What Next, Dr. Trithemius? (U) Vol. XI, No. Cryptanalysis 4, Fall 1966
Introduction to Magnetic Tape Vol. I, No. 3, Communications Recording and Its Use in October 1956 Recording Intercept Activities, An (U)
DOCID: 3020956
Author
Lutwiniak, William
Solution of VEJX-0, or the Uses of Delta (U)
Title Reference Keyword
Recording Techniques Affecting Vol. IX, No. Intercept Total Intercept fet 1, Winter Recording
1964
Long and Short of Single Vol. XXI, No. Cryptanalysis Transpositions, The (U) 2, Spring Mathematics
1976
Quick Check for fiansposal Vol. IV, No. Garbles Garbles. A (U) 2, April 1969
and Special Linguistics Issue
Net Reconstruction -A Basic Val. 111, No. Traffic analysis Step in Tr&c Analysis (U) 3. July 1958 91 ~ " ~ ~ 7 g , C ~ m a t h e s n a t i c s
No. 3,
CAM 11 (U) Vol. IX, No. Computers 2, May 1964 Memory
Solution of a Polyalphabetic Vol. I, No. 3, Cryptanalysis Monome-Dinome System (U) October 1956
MICROCOMPUTER: General- Purpose Signal Process, The (U)
Introduction to Log-Linear Models in Cryptanalysis (U)
Midway and Yamamoto: Properly Revisited (U)
I Classes of Rotors without Parallels (U)
Prograinming Concepts for Verification and Security (U)
Vol. XVIII, No. 2,Spring 1973
Vol. XXII, No. 2, Spring 1977
Vol. x x v , No. 2, Spring 1980
Vol. XIII, No. 3, Summer 1968
Vol. X, No. 4, Fall 1965
Vol. XXII, No. 4, Fall 1977
Cryptanal y sis
Signal processing
Computing Cryptanalysis
Cryptologic history Midway
Cryptanalysis Mathematics
Programming Software
90
TOP SE-
DOCID: 3020956 -Q~A398598
Author I Title Reference Keyword
Broadband Planar Log-Periodic Vol. X, No. 3, Antennas Feed for the Spherical Reflector Summer 1965 Collection Used a t ~ r e c i b o Ionospheric Laboratory (U)
Creation of an Artificial Vol. XI, No. Communications Ionosphere to Extend the Radio 2, Spring Horizon for Frequencies Below 1966 100 MC, The (U)
Extending the Radio Horizon for Intercept Purposes by Using the Moon as a Reflector (U)
Vol. X, No. 2, Intercept Spring 1965 Signals
Study of Hourly Correlation of Trans-Horizon VHF-UHF Signals and Meteorological Conditions (U)
I Marston, E. Dale
Linearly Induced Nonlinear Cycles (U)
Inexpensive Device for Pictorial January 1960 Computer graphics Input and Output, An (U)
Growing up with Computers a t Special Computers NSA (U) Council of
Learned Organization Issue, 1972
Exposition of a New ycle Search Technique (U)
the Augean Stables or ow Much TA Can a Computer
Vol. XXlV Chinese communists No. 1 Winter Korean War 1979
(b (1) ( t ) ( 3 ) - 5 0 USC 4 0 3
Vol. XIV, No. Signals 1;; i i j I ~ " , ~ ~ , ~ ~ 2, Spring 1969
Vol. XXII, Mathematics No. 4, Fall 1977
arrow-Band Speech Security tF1,
Vol. I, No. 1, Teleprinter cipher April 1956 analysis
Vol. XIII, No. Computers 3, Summer Traffic analysis 1968
Vol. 111, No. Cipher equipment 4, December Security 1958 and Special Linguistics - Issue
DOCID: 3020956
Author I Title Reference Keyword
Evaluating Intercept Techniques (U)
-
Vol. XI, No. 2, Spring 1966
Intercept evaluation
American Indian language I Phonemic Structure of Nootka,
The (U) Fall 1960
APL Mechanization of Indirect Symmetry (U)
Vol. XVII, No. 3, Summer 1972
Computer languages
Vol. XVII, No. 1, Winter 1972
Compilers FORTRAN
Compiler Object Code Optimization (U)
Program Complexity Measure, I * (UI Vol. XXI, No. 4, Fall 1976
Software engineering
Vol. XVIII, No. 2, Spring 1973
Computer programming
Thoughts about Systems and Program Design (U)
(Collection of LINCOMPEX Signals Vol. XVII, No. 2, Spring 1972
Collection Signals
Introduction to Log-Linear Models in Cryptanalysis (U)
Vol. x x v , No. 2, Spring 1980
Computing Cryptanalysis
Recognition of Latin Square Equivalence Classes (U)
Vol. XVI, No. 3, Summer 1971
Cryptanalysis
Machine translation Machine Translation (U) Vol. XII, No. 2, Spring 1967
Creation of an Artificial Ionosphere to Extend the Radio Horizon for Frequencies below 100 MC, The (U)
Vol. XI, No. 2, Spring 1966
Communications
Factors Affecting Required Antenna Gain in VHF Intercept (U)
Cranks, Nuts, and Screwballs (U)
Vol I., No.3, October 1956
Antenna gain VHF intercept
Vol. XI, No. 1, Winter 1966
Security
DOCID: 3 0 2 0 9 5 6 g8 ' (b) ( 3 ) - P . L . 26-26
Author I Title Reference Keyword
Thrusts and Boggles of Outrageous Escalation, The: A
VOCABULARY SURVEY AT THE NATIONAL WARCOLLEGE (U)
Vol. XIII, No. Vocabulary 2, Spring 1968
Computers and Queues (U) January 1960 Computers Queues
Vol. IV, No. Cryptanalysis 4, October 1959
Extreme Values in Cryptanalysis (U)
How to Visualize a Matrix (U) Vol. VI [ I , No. Mathematics 3, Summer 1963
Modified Normal Curves (U) Spring 1961 Cryptanalysis Mathematics
Convergence Techniques for Special Fast Mathematics .Finding Linear Approximations Fourier Issue, (u) August 1973
Collection Management (U) Vol. XIV, No. Collection management 1, Winter 1969
Evaluating Intercept Systems (U)
Intercept System Analysis (U)
Vol. IX, No. 4, Fall 1964
Signals
Vol. XI, No. 2, Spring 1966
Communications intercept
Receiving System Analysis (U) Vol. X, No 1, Winter 1965
Receivers
I Verified Intercept Predictions Vol. XI[. No 1, Winter 1967
lntercept
Vol. IV, No 4, October 1959
Computers
Automatic Maintenance (U) Meyer, Joseph A.
Vol. IX* No. 1, Winter 1964
Computers Maintenance
Communications Cryptanalysis
Capture-Jamming of SIGINT Targets (ti)
Vol. XII* No. 2, Spring 1967
DOCID: 3020956
Author Title Reference Keyword
COMINT - Hard Facts in the Cold Spring 1961 Communications War (U) Ethics
Computers -The Wailing Wall Vol. I, No. 3, Codes (U) October 1956 Cryptanalysis
Der Fall WICHER: German Vol. XX, No. Cryptologic history Knowledge of Polish Success on 2, Spring ENIGMA
ENIGMA (U) 1975
Fallacy of the Systems Val. VII, No. Engineering Approach, The (U) 3, Summer
1962
Vol. XI, No. SIGINT 1, Winter 1966
Room 40 Compromise, The (U) Vol. XXV, Cryptologic history No. 1, Winter 1980
Security Architecture in SlGINT Val. XX, No. Collection Collection and Processing (U) 1, Winter Security
1975
SIGINT Implications of Military Vol. XII, No. Oceanography Oceanography (U) 4, Fall 1967
Simultaneous Error Insinuation Vol. XIV, No. Cipher machines in Electronic Cipher Machines 1, Winter (u) 1969
Strategic Warning: An Vol. XVIII, Strategic warning Intelligence Gap That NSA No. 3, Might Fill (U) Summer 1973
CAMINO (U) Vol. XII, No. Computers 3, Summer Translation 1967
Language and the COMINT Vol. XIX, No. COMINT Production Process (U) 3, Summer Language
1974
Language as a Bulk Commodity Vol. XX, No. Language (U) 3, Summer
1975
Look at It This Way (U) Vol. XVIII, Dictionaries No. 1,Winter Foreign languages 1973
DOCID: 3020956 9 9 8 5 9 8
Author Title Reference Keyword
Some Contributions towards a Vol. XVI, No. Translation Course in COMINT Translation 3, Summer (u) 1971
Design and Implementation of a Vol. XXIII, Morse Digital Demodulator for Use No. 2, Spring Signals against On-Off Keyed Signals, 1978 The (U)
Setwise Transitive Croups (U) Vol. X, No. 2, Mathematics Spring 1965
Debugging Made Easier (U) Vol. 111, No. Computers 4, December Debugging 1958
Elements of Shift Register Vol. XVI, No. Cryptology Cryptology (U) 2, Spring Mathematics
1971
Thermal Noise (U) Vol. VII, No. Electricity 3, Summer 1962
Computerized Depth Reading Vol. XVII, Computers (U) No. 1, Winter Cryptanalysis
1972
Processes for Random and Vol. XXII, Dynamic memory Sequential Accessing in No. 4, Fall Mathematics Dynamic Memories (U) 1977
Generating Function Approach Vol. XXII, Mathematics GRETAG, A (U) No. 1, Winter
1977
Matric Recursions (U) Vol. XXII, Mathematics No. 3, Summer 1977
Slow Look a t Fast Transforms, Special Fast Mathematics A (U) Fourier Issue,
August 1973
High-speed Automatic Vol. XX, No. Speech scanning Scanningof Speech Bandwidth 4, Fall 1975 Channels (U)
Bar Statistics, The (U) Vol. VIII, No. Mathematics 2, Spring 1963
Sliding Strips, Additive, Subtractive, and Minuend (U)
Author Title Reference Keyword
Bar Statistics, The (U) Vol. VIII, No. Mathematics 4, Fall 1963
Textual Criticism and NSA (U) 1
I I Personal Contribution to the Bombe Story, A (U)
Intuitive Exposition of Zierler's Method for Finding Linear Recursions, An (U)
Maps and the Conversion of Gauss-Kriiger Grid Coordinates (U)
Missile Trajectories (U)
I I Note on Curve Fitting, A (U)
I ( Order Statistics for Cell Counts
I I Analysis of a Transistor Monostable Multivibrator (U)
Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer (U)
Vol. XI, No. Cryptanalysis 2, Spring 1966
Vol. XIII, No. Cryptography 1, Winter Linear recursions 1968
Vol. XIV, No. Editing 3, Summer 1969
Vol. 11, No. 1, Language aids January 1957 and Special Linguistics Issue
Vol. XX, No. Cryptologic history 4, Fall 1975 ENIGMA
Vol. 111, No. Mapping 1, January 1958
Vol. 11, No. 1, Missile trajectory January 1957
Vol. XIII, No. Mathematics 4, Fall 1968
Vol. XXIII, Mathematics No. 4, Fall 1978
Vol. XIV, No. Ciphers 2, Spring Modulation 1969
Vol. IV, No. Circuits 3, July 1959 Transistors
Vol. XXV, Communications No. 4, Fall Frequency hopping 1980 Jamming
DOCID: 3 0 2 0 9 5 6 ..,,-98598
Author Title Reference Keyword
REDMAN Program, The (U) Vol. IX, No. Data processing 1, Winter 1964
Intuitive Exposition of Zierler's Vol. XIII, No. Cryptography Method for Finding Linear 1. Winter Linear recursions Recursions, An (U) 1968
Markov Models for Phonetic Vol. XVIII, Communications Text (U) No. 1,Winter Speech
1973
Graceful Degradation Through Vol. XXIII, Computers Distributed Intelligence (U) No. 3,
Summer 1978
Use of Special Identification Vol. XII, No. Signal Techniques (SIT) in the Solution 4, Fall 1967 identification of Specific S I ~ I N T Problems, The (U)
Subnanosecond Vol. fX, No. Pulses Instrumentation (U) 1, Winter
1964
Nolte, William Project TENNIS and External Vol. XXIII, M. Influences on NSA Systems No. 2. Spring
Development (U) 1978
Error in a Capacitor-Type Vol. 111, No. Pulses Totalizer (U) 4, December Waves
1958
Factors Affecting Required Vol I., No.3, Antenna gain Antenna Gain in VHF Intercept October 1956 VHF intercept (U)
Survey of the Status of the Voice Vol. XII, No. Voice Problem, A (U) 4, Fall 1967 communications
VIDEOFILE: A New Information Val. XIiI, No. Information storage Storage System (U) 2, Spring Video
1968
u Solution of Additive-Minuend Vol. 111, No. Cryptanalysis Busts (U) 1, January
1958
Information Theory and the Vol. IV, No. Information theory Packing of Spheres (U) 2, April 1959
DOCID: 3020956
Author I Title Key word Reference
Minimizing Noise Effects in PCM (U)
Vol. 11, No. 2, April 1957
Collection
Classes of Rotors without Parallels (U)
Vol. X, No. 4, Fall 1965
Cryptanalysis Mathematics
Trends, Developments, and Pressures in SICINT Reporting Today (U)
Rotation Problem in Pattern Recognition, The (U)
Vol. XXI, No. 1, Winter 1976
SIGINT reporting
Vol. VII, No. 1, Winter 1962
Pattern recognition
Vol. XVIII, No. 2,Spring 1973
Crypto- mathematics
( Survey of the Distance Problem,
I Darlington Compound Transistor a s a Current
Vol. IX, No. 4, Fall 1964
Electricity
Controlled Voltage Source, A (U)
Representation of Signals on Orthonormal Bases, The (U)
Vol. IX, No. 1, Winter 1964
Signals
Computers Tunnel Diode Characteristic Function Generator (U)
Vol. VIII, No. 1, Winter 1963
I Why Analog Computation? (U) Vol. VII, No. 3, Summer 1962
Analog computers
Weather: I ts Role in Communications Intelligence
Vol. 111, No. 3, July 1958
Weather
(U)
Philosophy of U.S. Cryptography and Cryptographic Usage, A (U)
Vol. XII, No. 3, Summer 1967
Cryptography
Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Scaling, The
Vol. XXI, No. 4. Fall 1976
Cryptanalysis
Computer programming
RYE, a n Extended Capacity Remote Access System (U)
Vol. IX, No. 2, May 1964
DOCID: 3020956 REF ID:A398598 9
Author Title Reference Keyword
Development of Automatic Vol. 11. No 3, Circuits Telegraph Switching Systems July 1957 Switching Systems (U)
Recollections Concerning the Vol. 1, No 2, Cryptography Birth of One-Time Tape and July 1956 Printing-Telegraph Machine Cryptography (UI
Some Notes on Information Vol. IV, No. Information theory Theory (L') 1 ,January
1959
Realization and Optimization of Vol XIII, No. Filters the Audio Frequency 4, Fall 1968 Frequency Microminiature Thin Film Special Band-Pass Filters (U) Mathematics
and Engineering Issue, 1981- 1983
Some Recent Vocoder Studies a t Vol. XIII, No. Vocoders the National Security Agency 2, Spring (u) 1968
Note on a Solution of a Vol. I, No. 3, Ciphers Polyalphabetic Dinome System, October 1956 A (U)
Randomization Made to Order: Special Cryptanalysis "Random Numbers Are Too Council of Randomization Important to be Left to Chance" Learned (U) Organization
lssue, 1972
Introduction to Electronic Vol. VIII, No. Phase-lock Phase-Lock Oscillators, An (U) 2, Spring oscillators
1963
Introduction to Programmingof Vol. 11, No. 3, Computer a Digital Computer (U) July 1957 programming
Cryptanalytic Use of High- Vol. IX, No. Computers Speed Digital Computing 3, August Cryptanalysis Machines (U) 1964
DOCID: 3020956
Author 1 Title Reference Keyword
Vol. X, No. 2, Spring 1965 and Computer and Information Sciences Issue
Mathematics
Number of Components in Random Linear Graph, The (U)
Vol. IV, No. 2, April 1959
Cryptanalysis
I Perpetuation of Bias in Shift Register Devices (U1
Vol. XIV, No. 4, Fall 1969
Shift registers
Vol. VIII, No. 2, Spring 1963
Ciphers Key
RYE, an Extended Capacity Remote Access System (U)
Vol. IX, No. 2, May 1964
Computer programming
I Fundamentals of Majority Logic Vol. IV, No. 4, October 1959
Digital circuits Logic
Vol. 111, No. 4, December 1958
Communications Ionosphere I Ionospheric Propagation (U1
Phillips, Cecil SiGlNT Computer Processing in I the 1980s (U) Vol. XXII, Computer No. 2, Spring processing 1977
Digitizer Queuing Model for FROSTING (U)
JACQUARD - A Yates Algorithm Machine (U)
On Understanding the Null 3 Hypotheses of Test Statistics (U)
Vol. XIV, No. Collection 4, Fall 1969 Queuing theory
Special Fast JACQUARD machine Fourier Issue, Mathematics August 1973
Vol. VIII, No. Mathematics 4, Fall 1963
I Spread Spectrum System Jamming Response (U)
Vol. XXII, Signals No. 3, Spread spectrum Summer 1977
Computer Graphics in an Engineering Simulation Program (U)
Vol. XVII, Computer No. 2, Spring programming 1972
DOCID: 3020956 REF ID:A398598 ib, (1)
TOP SEC- (oj(3)-50 USC 403 (b) (3)-18 USC 799 (b) (3)-P.L. 86-35
'bi (31-P L. 86-36
Author I Title Reference Keyword
Writing Efficient FORTRAN (U) Vol. XVII, FORTRAN No. 2, Spring 1972
Experimental Approach to an Vol. VIII, No. Collection Environment Study in the HF 4, Fall 1963 Signals Band (U)
Drawing to a Straight Flush -A Vol. XXI, No. ELiNT Study in Technical Intelligence 3, Summer Technical intelligence (u) 1976
Genesis of Mobile Magoo, The Vol. XX, No. Telemetry processing (U) 3, Summer
1975
Vol. XXI, No. Cr tolo ic histor 1, Winter 1976 f E e l
Spacecraft Passenger Television Vol. XXI, No. Space flights from Laika to Gagarin (U) 2, Spring
1976
Two New Language Models (U) Vol. XXIV, Language modeling No. 3, Summer 1979
German Radio Intelligence (U) Vol. XXV, Cryptologic history No. 4, Fall German COMINT 1980
Operation V A ~ C U A R D Vol. I , No. 2, Communications July 1956 Earth satellites
Linear Approximations and the Special Fast Mathematics Degree of the Function (U) Fourier Issue,
August 1973
Simulation of Cryptoprinciples Special Communications (U) Council of security
Learned Organization Issue, 1972
Analysis ofThin Film Vol. VIII, No. Physics Germanium Epitaxially 2, Spring Deposited onto Calcium 1963 Fluoride (U)
Scaling Matrix for the Analog Vol. VII, No. Computer Computer (U) 1, Winter programming
A 1962
DOCID: 3020956
Author I Title Reference Keyword
Status of Optical Logic Vol. VIII, No. Computers Elements for Nanosecond 3, Summer Computer Systems (U) 1963
Vol. XX, No. 1, Winter 1975
Aircraft tracking Asian Communist Aircraft Location Systems (U)
Vol. XXII, No. 3. Summer 1977
Cryptanalysis Conjugate Codebooks (U)
Vol. X, No. 3, Summer 1965 and Vol. X, No. 4, Fall 1965
Ciphers Cryptologic history
Boer War Cipher, A (U)
SELLNOW - A Man-Machine Communication System for ELINT Data (U)
Vol. VIII, No. 4, Fall 1963
ELINT
Theoretical Linguistics and Language Universals (U)
Vol. XXII, No. 2, Spring 1977
Linguistics
Cryptanalysis I I How to Choose a Good Crib (U) Vol. X, No. 4, Fall 1965
With Love (and Parentheses) from Peking (U)
Vol. XII, No. 1, Winter 1967
Chinese language Codes
I I Time Coordination of SIGIN'T Vol. XII, No. 2, Spring 1967
Intercept sites
Vol. IX, No. 1, Winter 1964
Missile trajectory I I Ballistics (Soviet) (U)
Vol. I , No. 1, April 1956 I Esperanto
Language Language Problem a t NSA, The (U,
Metalin: A Draft of a Vol. XI, No. Artificial language Metalanguage (U) 4, Fall 1966
Multilingual Codes (U) Vol. X, No. 4, Codes Fall 1965 Language
Worldwide Language Problems Vol. XIII, No. Language at NSA (U) 4, Fall 1968 training
DOCID: 3020956 -298598
Author Title
Algorithm (U)
Product Sequences I 1 ( U )
How the Japanese Army Water Transport Code 2468 Was Broken (LT)
CATNIP: Computer Analysis - Target Networks Intercept Probability (U)
Number of Components in Random Linear Graph, The (U)
Optical Fourier Transform and Periodic Phenomena (U)
Anglicisms in Puerto Rico (U)
Book Review: A History of NSA General-Purposc Electronic Digital Computers RSf2.Q-
I Low Cost Process for Printed Circuits, A (U)
I On the Minimization of Integer Quadratic Forms over Nonzero .Integer Vectors (U)
Cooley-Tukey Fas t Fourier Transform for Base 4 and Base 4 + 2 ( U )
Book Review: TRATADO DE CRIPTOCRAFIA (U)
Chaco: A Horrible Example (U)
Reference Keyword
Vol. XXV, Mathematics No. 3, Summer 1980
Vol. XX, No. Mathematics 4, Fall 1975
Vol. XVIII, Cryptologic history No. 4, Fall J a p a n 1973
Vol. XVI, No. Collection 1, Winter Intercept 1971
Vol. IV, No. Cryptanalysis 2, April 1959
Vol. XVIII, Mathematics No. 3, Summer 1973
Vol. XVII, Spanish language No. 1, Winter 1972
Vol. IX, No. Book review 2, May 1964 Computers
Vol. It , No. 1, Circuits January 1957
Vol.XXV, Mathematics No. 1, Winter 1980
Vol. XVII, Mathematics No. 4, Fall 1972
Vol. XI, No. Book review 2, Spring Spanish cryptography 1966
Vol. XVIII, Translation er rors No. 3, Summer 1973
DOCID: 3020956 9 9 8
L I ( 3 ) - r . ~ . e c - 3 6
Mokusatsu: One Word, Two Vol. XIII, No. Translation Lessons (L') 4, Fall 1968
and Special Linguistics Issue, 11
Author
Spanish Languages, The (U)
Title Reference Keyword
I I Note on Univariant
Scheduling Function in a Time- Sharing Environment, The (U)
I I Attack on Blair-Huffman Encipherments, An (U)
I I Don't Be Too Smart (U)
I1 Method of Recovery of Fibonacci Key, A (U)
I I John Dee: Consultant to Queen Elizabeth I (U)
I I Special Purpose Cryptanaly tic Computers: State of the Art (U)
Salemme, Arthur J.
Vol. XIII, No. Spanish language 1, Winter 1968
Vol. III, No. Interpolation 4, December 1958
Vol. XX, No. Collection 2, Spring 1975
Vol. XVI, No. Computer systems 2, Spring 1971
Spring 1961 Ciphers i b ) (1:
0 (b) ( 3 ) - 50 USC 4 0 3
January 1960 Codes [b) (3: - P . L . Japanese military 8 6-36
Vol. I, No. 3, Cryptanalysis October 1956
Vol. XII, No. Cryptologic history 4, Fall 1967
Vol. IV, No. Cryptology 4, October Electronic warfare 1959
Vol. XXIII, Computers No. 1, Winter 1978
Are the Russians Gaining Spring 1961 Russian language Wordwise? (U)
Computer, There is Thy Sting! Vol. XVl, No. Computers (u) 4, Fall 1971 Russian
Translation
I Language Files: A Basic Vol. IV, No. 2 COMINT COMIPiT Aid (U) April 1959 Russian language
Few Tricks of the Trade for the Vol. XI, No. Russian language Translator of Russian, A (U) 4, Fall 1966 Translation
DOCID: 3020956 REF ID:A398598
Author I Title Reference Key word
Handle with Care: Russian Transliteration (U)
Schierlmann, Charles J.
Some Problems in the Field of Machine Translation or the Case of the Volatile Mouses (U)
Tour of Some Russian Translation Traps, A (U)
Use of the B-Coefficient in Information Retrieval, The (U)
On the Maximization of X'AX over the Vertices of the Cube (LT)
Midway and Yamamoto: Properly Revisited (L;)
Parabolic "Mock" Design for a n FFT -Implemented Filter Scheme (U)
Database Services (U)
APT System, The (U)
Vol. XII, No. Russian 4, Fall 1967 transliteration
Fall 1960 Machine translation
Vol. XIV, No. Russian 4, Fall 1969 Translation
Vol. XIII, No. Information 4, Fall 1968 retrieval
Vol. VIII, No. Cryptanalysis 1, Winter 1963
Vol. XIII, No. Cryptologic history 3, Summer Midway 1968
Special Issue, Filters January 197 1
Vol. XII, No. Databases 1, Winter Soviet (b) 1 )
1967 (b)(3)-5C USC 403 (t)13)-P.L. 86-36
Vol XXIII, Computers No. 3, Data processing Summer 1978
Growing up with Computers a t Special NSA (U) Council of
Learned Organization Issue, 1972
Wandering Wheel, The (An Vol. XIII, No. Introduction ta-TMT 1, Winter
1968
Cold-Cathode Counter Tube Vol. 111, No. Study, A (L:) 4, December
1958
PPM Telemetry Simulator (U) Fall 1960
Computer Scripting (U) Vol. XXIV, No. 1, Winter 1979
Computers
Cipher machines
Cathode Pulses
Computers Language Working aids
DOCID: 3020956
Author I Title Reference Keyword
COMINT Signals Trends Val. XXV, COMlNT No. 2, Spring Signals trends 1980
How Can the Communications Vol. VIII, No. Communications Sciences Contribute to the Study 3, Summer Cybernetics of Natural Systems? (U) 1963
Parity a s an Operation Vol. VIII, No. Mathematics Checking Code (U) 3, Summer
1963
I I Substantive Analysis (U) Vol. IV, No. Analysis 2, April 1959
MP-14: Unlimited Random Vol. XVII, Computers Source (U) No. 3, Cryptanalysis
Summer 1972
German Tires and Black Cats: Vol. XIX, No. Cryptanalysis Estimation of Population Size 3, Summer (u) 1974
Conjugate Codebooks (U) Vol. XXII, Cryptanalysis No. 3, Substitution Summer 1977
Convolutions, Cube Roots, and Vol. XVIII, Computers Computer Cryptography (U) No. 3, Cryptography
Summer 1973
Introduction to the Special Issue Special Fast Mathematics Fourier Issue, August 1973
Linear Approximation Attack on a n Irregularly Stepping Key Generator, A (U)
Strength of the Bayes Score, The (U)
Approximations to the Distribution Function of Sums of Independent Identically Distributed Random Variables
Special Fast Mathematics Fourier Issue, August 1973
Vol. XVII, Mathematics No. 1, Winter 1972
Vol. X, No. 2, Mathematics Spring 1965
DOCID: 3020956 REF ID:A398598 BRA
Author Title Reference Keyword
Telecommunications from the Special CR~TICOMM Torn-Tape to the Computer (U) Council of
Learned Organization Issue, 1972
Determining Intercept Vol. XII, No. Intercept Assignments (U) 2, Spring
1967
Management of Magnetic Tape Vol. X, No. 4, Tape management (u) Fall 1965
Minimizing Wasted Space in Vol. XIV, No. File storage Infortnation Files (U) 4, Fall 1969
Need for System Approach, The Vol, VII, No. SrGINT
(U) 2, Spring 1962
Operations Research in NSA Vol. X, No. 1, Management (u) Winter 1965 Operations
Representing Data in Vol. 111, No. Data Computers (U) 1, January representation
1958
Six Characteristics of Vol. XIV, No. Information systems Information Handling Systems 3, Summer (u) 1969
Cryptologist. Can He Exist?, Vol. 11, NO. 3, Cryptologists The (U) July 1957
Curiosa Scriptorum Sericorum: Vol. XVI, No. Communications To Write But Not to 3, Summer Writing Communicate (U) 1971
What Is Good Traffic Analysis' Vol. XXIV, Traffic analysis (U) No. 4, Fall
1979
Developments in the Automatic Vol. XXIV, Communications Acquisition and Translation of No. 1, Winter Morse code Hand-Keyed Morse Code (U) 1979
Conjugate Codebooks (C') Vol. XXII, Cryptanalysis No. 3, Substitution Summer 1977
Emergency Destruction of Vol. I, No. 1, Document Documents (U) April 1956 destruction
DOCID: 3020956 9 5 9 8 T
'b\ '3)-P.L. 86-36
Author I Title Reference Keyword
Linear Approximations Using Special Fast Mathematics Continuous Functions (U) Fourier Issue,
August 1973
Designing Secure Reliable Vol. XXI, No. Computer security Software - A Methodology (LT) 4, Fall 1976 Software
International or Cross-Country Vol. I , No. 3, Cryptanalysis Depths (U) October 1956
Sinkov, Abraham Abstract Groups Defined by Generating Operators (U)
April 1960 Groups Operators
Soviet Science and Technology; Present Levels and Future Prospects (U1
Vol. IV, No. I, January 1959
Science and technology'
Soviet
Vol. XX, No. 1, Winter 1975
Collection Potential of Tropospheric Ducting as a Collection Technique, The (U)
I cxco Story, The (U) Vol. XVI, No. 4, Fall 1971
Cry ptanalysis Cryptologic history
SPECOL.: A New AND, OR, NOT Language for Use with Computers (U)
Vol. XII, No. 1, Winter 1967
Computer language
Ambiguity Reduction by Markov Analysis of TEMPEST Signals (U)
Vol. XVI, No. 1, Winter 1971
Signals TEMPEST
Mathematical Modeling of TEMPEST Channels (U)
Vol. XVI, No. 3, Summer 197 1
Signals TEMPEST
Vol. VIII, No. 3, Summer 1963
Mathematics Tail Probabilities for the Binomial Distribution (U)
Snyder, Samuel S.
ABNER: The ASA Computer Vol. XXV, Computers Part 1: Design (U) No. 2. Spring Cryptologic history
1980
ABNER: The ASA Computer Vol. XXV, Computers Part 2: Fabrication, Operation, No. 3, Cryptologic history and Impact (U) Summer 1980
Earliest Applications of the Vol. XVIII, Computers Computer a t KSA (U) No. 1,Winter
1973
DOCID: 3020956 REF IDzA398598 9
Author I Title Reference Keyword
Famous First Facts, NSA, Part Vol. XVII, Computers I: Pre-Computer Machine No. 4, Fall Cryptanalysis (U) 1972
Growing up with Computers a t Special Computers NSA (U) Council of
Learned Organization Issue, 1972
Vol. 11, No. 4, October 1957 1 Encipherment Offsets of Differences:
Summation and Difference Methods (U)
Development of High Speed Automatic Morse Translators, The (U)
Vol. I, No. 1, April 1956
Morse translators
Analytic Computer Technique for Anagramming Columnar Transposition (U)
Vol. VIII, No. 2, Spring 1963
Cipher Computer
Simple Test for Slide or Kick, A (U)
Computer-Aided Bookbreaking of Two-Part Codes (U)
Vol. VIII, No. 4, Fall 1963
Mathematics
Vol. XVII, No. 2, Spring 1972
Bookbreaking Computers
Computers and Linguists Do Mix (U)
Vol. XVI, No. 3, Summer 197 1
Computers Linguists
Frame versus Corpus (U) Vol. XVII, No. 1, Winter 1972
Bookbreaking Computers
Redundancy Exploitation in the Computer Solution of Double- Crostics (U)
Vol. VII, No. 2, Spring 1962
Computers
Repagination? (U) Vol. XVIII, No. 4, Fall 1973
Bookbreaking Computers
Under-Developed Languages, Under-Utilized Computers (U)
Vol. XX, No. 1, Winter 1975
Computers Language
Vol. XIX, No. 1, Winter 1974
Cryptanalysis Will the Real 53 Stand Up? [C)
DOCID: 3020956 TOP p 8 -50 ~ s c L o j
(b) (31-18 TJSC 798 (b) 13)-P.;. 86-36
(b)13)-P.;. 86-36
Author I Title Reference Keyword
Vol. XXIV, Cryptanalysis No. 3, Key generators
I Summer 1979
Vol. 111, No. Noise 2, April 1958
Some Formulas concerning Special Fast Bulges of Combining Functions Fourier Issue. ( u ) August 1973
Vol. XXIV, No. 2, Spring = 1979
Information Theory Applied to Vol. XXIII, Computer Data Compression No. 4, Fall (U) 1978 and
Special Mathematics and Engineering Issue, 1981- 1983
Mathematics
Cryptosy stem identification
Computers Data compression i b ) (1) (b) (3)-18 USC 1 9 8 (D) ( 3 ) -P.L. 85-36
I RAKE System for Tropospheric Val. X, No. 4, Collection Scatter, A (U) Fall 1965
Climbing Jacob's Ladder (U) Vol XII, No, Computers 3, Summer Telecipher analysis 1967
Association Factor in Winter 1961 Computers Information Retrieval, The (U) Information retrieval
Information Storage and Vol. VIII, No. Information retrieval , Retrieval (U) 4, Fall 1963
Use of the B-Coefficient in Vol. XIII, No. Information Information Retrieval, The (U) 4, Fall 1968 retrieval
Chatter Patterns: A Last Resort Vol. 11, No. 4, Chatter October 1957 Traffic
I Target in Space, A (U) Special I I Council of satellites Learned Organization Issue, 1972
DOCID: 3020956 TOPS -8598
Author I Titie Reference Keyword
Errors in High Frequency Direction Finding (U)
Voice Problem, The (U)
1 / ~ ; ~ g t h of the .ayes s o r e , he
How the Germans Broke a U.S. Code (U)
I I Some Problems and Techniques in Bookbreaking (U)
Example of Substantive Analysis, An (U)
Some Graphical Display Techniques for Fourier Analysis (U)
Technology of Future Powerful Personal Computers, The (U)
Investigations into Adult Language Learning/Acquisitions (U)
Language Levels and Cryptologic Jobs (U)
COMlNT Satellites - A Space Problem (U)
11 Library and the User, The (U)
Vol. IV, No. 1, January 1959
Special Council of Learned Organization Issue, 1972
Vol. XVII, No. 1, Winter 1972
Fall 1960
Vol. XI, No. 1, Winter 1966
Vol. XI, No. 3, Summer 1966
Vol. XXIV, No. 1 Winter 1979
Special Issue, January 1971
Direction finding
Voice communications
Mathematics
Codes Germans
Bookbreaking
Analysis Soviet
Computers Language Working aids
Computer graphics
Vol. XXV, Computers No. 3, Summer 1980
Vol. XXIV, Language acquisition No. 3, Summer 1979
Vol. XVIII, Language No. 3, Qualification standards Summer 1973
Vol. IV, No. Communications 4, October satellite 1959
Vol. XIII, No. Library 2, Spring Research 1968
DOCID: 3 0 2 0 9 5 6
Author I Title Reference Keyword
Maximum Likelihood Estimation of a Trajectory and Its Variance (U)
II Whole New World of Speech, A; Or, Maybe 1984 Will Be a Good Year After All! (U)
Fourier Modulus Method of Cage Identification (U)
I I Tunnel Diode Dynamic Logic Module, A (U)
Transient Response of Tunnel Diodes With Resistive Loading
Tiltman, John H., Brigadier
Trade-off Approach to Quality Intercept Versus Quantity Intercept, A (U)
Addendum to "A Cryptologic Fairy Tale" (U)
Development of the Additive., The (U)
Double Transposition - A Special Case (U)
Experiences 1920-1939 (U)
Some Principles of Cryptographic Security (U)
Some Reminiscences (U)
I "TUNNY" Machine and Its Solution, The (U)
Vol. XIII, No. Satellite trajectory 1, Winter 1968
Vol. XXI, No. Keyword 4, Fall 1976 recognition
April 1960 Cryptanalysis
(b) (1) Summer 1961 Computers (b) (3)-50 USC
4 0 3 (b) (3: -18 USC
Vol. VII, No. Circuits 7 9 8 1, Winter (b) (3)-P.L.
1962 86-36
Vol. XXIII, SIGINT collection No. 1, Winter and processing 1978
Vol. XVIII, Cryptanalysi~ No. 1, Winter 1973
Vol. VII, No. Cryptologic history 2, Spring Germany 1962
4, Fall 1963
Vol. XVII, Cryptanalysis No. 4, Fall 1972
Vol. XVII, Cryptologic history No. 3, Summer 1972
Vol. XIX, No. Cryptographic 3, Summer security 1974
Vol. XI, No. Cryptanalysis 3, Summer 1966
Spring 1961 Cipher machines Germany
DOCID: 3020956 REF ID:A398598 9
Keyword Author Reference Title
Voynich Manuscript Most Mysterious Manuiscript in the World"
Vol. XII, No. 3, Summer 1967 and Special Linguistics Issue I1
Status of Optical Logic Elements for Nanosecond Computer Systems (U)
Vol. VIII, No. 3, Summer 1963
Computers
Vol. VIII, No. 2, Spring 1963
Mathematics Geometric Approach to Waveform Recognition, A (U)
Vol. X, No. 2, Spring 1965
Waveform recognition
So You Want to Correlate (U)
WARSAN 11 -An Implementation of the FFT and Other Tools for Digital Signals Analysis (U)
Special Issue, January 1971
Digital signals analysis
u Tordella, Louis W
I Tunnel Diode Dynamic Logic Module, A (U1
Summer 1961 Computers Logic
Selected SlClNT intelligence Highlights (U)
Vol. XIX, No. 4, Fall 1974
SICINT
Randomization Made to Order: "Random Numbers Are Too Important to be Left to Chance"
I (U)
Special Council of Learned Organization Issue, 1972
Cryptanalysis Randomization
Some Recent Vocoder Studies a t the National Security Agency 1 (U)
Vol. XIII, No. 2, Spring 1968
Vocoders
Graph Theory (L') Vol. XII, No. 3, Summer 1967
Mathematics
Cryptologic history Germany
Unknown I GEE System - 1, The (u) Fall 1961
Unknown GEE System - 11, The (L'1 Vol. VII, No. 1 , Winter 1962
Cryptologic history Germany
Vol. VII, No. 2, Spring 1962
Unknown Cryptologic history Germany
GEE System - 111, The (C')
Author I Title Reference Keyword
Unknown
Unknown
Unknown
Unknown
Unknown
Unknown reviewer
GEE System - IV, The (U) Vol. VII, No. Cryptologic history a 3, Summer Germany
1962
GEE WHIZZER (U) Val. VIH, NO. Cryptanalysis 1, Winter 1963
Instant Expertise (U) Vol. XII, No. Buzzwords 1, Winter 1967
Preliminary Historical Report Vol. IX, No. Cryptologic history on the Solution of the "B" 2, May 1964 Machine (U)
SIGINT System Logic (U) Vol. X, No. 2, SICINT Spring 1965
- - - - -
DOCID: 3020956 rn I -8
Book Reviews: Pearl Harbor: Vol. VIII, NO. Book review Warning and Decision, Roberta 1 , Winter Cryptologic history Wohlstetter; But Not in Shume, 1963 John Toland; The Secret War, Sanche de Gramont; CIA - The Inside Story, Andrew Tully; Now It Can Be Told, Leslie R. Groves; Thinking About the Unthinkable, Herman Kahn; Strike in the West, James Daniel and John G. Hubbell (U)
Patent Matters and the Vol. X, No. 3, Inventions Technical Employee (U) Summer 1965 Patents
Vol. XXIV, No. 4, Fall
Computers Encryption
Processes for Random and Vol. XXII, Sequential Accessing in No. 4, Fall
I977 Dynamic Memories (U)
1 Upgrading Selected U.S. Codes Vol. XXI, No. and Ciphers with a Cover and 1, Winter Deception Capability (U) 1976
Report of the Second Computer Vol. XIX, No. Study Group (C) 1, Winter
1974
Dynamic memory Mathematics
Ciphers Deception
Computer use NSA
:b) (1) (b) (3)-18 3SC 798 (b) (3)-P.L. 86-36
Various
REF ID:A398598 DOCID: 3020956 ,S-
Author I Title Reference Keyword
Some Observations on Vol. XVII, Cryptanalysis Computer Aids to Indicator No. 4, Fall Recovery (U) 1972
Data Management Challenge, Vol. XVI, No. Computers 1 The (U) 2, Spring Data management
I GEE System - V, The (lj)
Computer Processing of Natural Languages (U)
Spectral Analysis and the Fast Fourier Transform (U)
Vol. VII, No. Cryptologic history 4, Fa11 1962 Germany
Special Computers Council of Language processing Learned Organization Issue, 1972
Vol. XIV, No. Mathematics 1, Winter 1969
Way the Ball Bounces, The: An Experiment in Deconvolution Filtering (U)
Note on "Logarithmic Scoring and Preliminary Testing" (U)
UNNA - An Introspective Signal Processor (U)
Way the Ball Bounces, The: An Experiment in Deconvolution Filtering (U)
I Solution of a Fractionated Monome-Dinome System (U)
I Conjugate Codebooks (U)
I Selection and Placement of Cryptanalytic Personnel (L')
Labeled Oriented Graphs Which are Onto (U)
Special Issue, Mathematics January 1971
Vol. 11, No. 4, Mathematics October 1957
Vol. XX, No. Signal processing 2, Spring 1975
Special Issue, Mathematics January 197 1
Vol. 11, No. 2, Cryptanalysis April 1957
Vol. XXII, Cryptanalysis No. 3, Summer 1977
Fall 1960 Personnel
Vol. X, No. 1, Mathematics Winter 1965
DOCID: 3020956 9 5 9 8
f k ) ' ) - I . . bh-36
Author
Wild, Norman
Title Reference Keyword --
Centralized Computer Support Special Computer systems of Field Activities (U) Council of Field sites
Learned Organization Issue, 1972
Cryptanalysis in the German Vol. IV, No. Cryptanalysis Air Force (U) 2, April 1959 German air force
Content - Addressed Memories Vol. IX, No. Computers (U) 1, Winter Memory
1964
Strategy for Program Vol. XXII, Mathematics Decomposition for a Distributed No. 4, Fall Pipeline, A (U) 1977
Introduction to Diagnosis (U) Vol. XIII, No. Cryptanalysis 3, Summer 1968
Russian Diamond, A (U) Vol. XII, No. Russian navy codes 2, Spring 1967
Introduction To APL, An (U) Vol. XVI, No. Computers 4, Fall 1971 Cryptanalysis
Fundamentals of Majority Logic Vol. IV, No. Digital circuits (U) 4, October Logic
1959
LIGHTNING Program, ~ h e k Vol. VIII, No. Computers 1, Winter 1963
New Concept in Computing, A Vol. 111, No. Computing (u) 4, December
1958
Transient Analysis ofcoaxial Vol. I, No. 2, Coaxial cables Cables Considering Skin Effect July 1956 (U)
Machine-Aided Translation - Vol. XVIII, Machine translation Where Is It Today? (U) No. 2, Spring
1973 and Special Linguistics Issue, 11
DOCID: 3020956 9 3 9 8 5 9 8
S ~ G I N T ~ ~ ~ with SACO: Vol. XXI, No. Cryptologic history
1976
Magnetic Core Memories (U) Vol. 11, No. 1, Computers January 1957 Memory
ALRIGHT - A Map Overlay Vol. XI, No. Mapping Generator (U) 2, Spring
1966
Electronic Calligraphy (U) Vol. XI, No. Calligraphy 1, Winter 1966
Representing Data in Vol. 111, No. Data I , January representation 1958
"Food for Thought" in L V H F Vol. XX, No. L V H F c ollection
"MUFF1.ER BANDAID (LVHF and Vol XX, No H F Communications Aid) (U) 3, Summer
1975
Computer Applications: The Vol. XIX, No. Computers Insatiable Appetite of the 4, Fall 1974
Education in Diagnosis (U) Vol. XIV, No. Cryptanalysis 1, Winter 1969
Wireline Modem with Harmonic Vol. XXV, Communications Distortion Equalization, A ( C ) No. 2, Spring Modems
1980 and Special Mathematics and Engineering Issue, 1981- 1983
Receiving System Analysis (U) Vol. X. No. 1, Receivers Winter 1965
DOCID: 3020956 b) ( 3 ) - 5 0 USC 4 C 3 cdg) (b) jl ) $33-18 USC '98 {D)(3]-P.;. 86-36 (b)(3)-P.L. 86-36
Author
Wray, W. D.
Title Reference Keyword ppppp -
Integrated and Guided Wave Special Optics Optics and Device Applications Mathematics Signals processing (U) and
Engineering Issue, 1981- 1983
Matric Recursions (U) Vol. XXII, Mathematics No. 3, Summer 1977
Vol.XXIV, Computers ( b ) ( l ) No. 4, Pal1 Encryption (b) ( 3 ) -18 USC 1979 798
Processes for Random and Val. XXII, Dynamic memory Sequential Accessing in No. 4, Fall Mathematics Dynamic Memories (U) 1977
"Fingerprinting" Code Croups Vol. XVII, Bookbreaking by Computer (U) No. 3, Computers
Summer 1973
Revision - de novo, A (U) Vol. I, No. 3, Cryptanalysis October 1956
Matrix Business: Part 11, This Vol. 111, No. Mathematics (u) 3, July 1958
This Matrix Business (U) Vol. 111, No. Cryptanalysis 2, April 1958
This Matrix Business: Part 11 Vol. 111, No. Cryptanalysis (U) 4, December
1958
Vol. x x v , No. 4, Fall
Simulation of Cryptoprinciples Special Communications (U) Council of security
Learned Organization Issue, 1972
Community Impacts on NSA Vol. XXIII, Computers Systems (U) No. 3, Data processing
Summer 1978 Networking
I Mechanical Translation (U) Vol I, No. 1, Translation April 1956
DOCID: 3020956 9 3 9 8 5 9 8 (b)c3)-P.L. F6-36
Author I Title Reference Keyword
Zoebelein, Arthur J.
Supporting the Support Facilities (U)
I Correlation of Frequency of , Appearance of Military Unit 1 Addresses to Unit Echelon and 1 Combat Readiness Status (U)
Cepstrum Vocoder, A (U)
Vol. XVIII, Computer test No. 3, equipment Summer 1973
Vol. XVII, Military addresses No. 3. Summer 1972
Special Issue, Communications January 197 1
Crisis Management in the Vol. XXII. Crisis management National Senior Cryptologic No. 1, Winter Decision making Course (U) 1977
DOCID: 3020956
NSA Technical Journal Indexed by Keyword
/
123
TOP SECHE'I' UlHRRA
Keyword
Addressing Systems
Advanced Weapons Systems
African Language
Aircraft Tracking
American Indian Language
Analog Computers
Analysis
Antenna Gain
Antennas
Reference
Vol. 11, No. 2, April 1957
Special Council of Learned Organization Issue, 1972
Vol. XI, No. 3, Summer 1966
Vol. XX, No. 1, Winter 1975
Fall 1960
Vol. VlI, No. 3, Summer 1962
Vol. XVII, No. 2, Spring 1972
Vol. XI, No. 3, Summer 1966
Vol. XXI, No. 3, Summer 1976
Vol. IV, No. 2, April 1959
Vol I., No.3, October 1956
Vol. X, No. 3, Summer 1965
Title
Assignment of Storage Space in Rapid-Access Memory Systems (U)
Computers and Advanced Weapons Systems (U)
African Language Problem a t NSA, The (U)
Asian Communist Aircraft Location Systems (U)
Phonemic Structure of Nootka, The (U)
Why Analog Computation? (U)
COMlNT Analysis and Reporting on the Developing Nations (U)
Example of Substantive Analysis, An (U)
Model 204 -The Analysts's Computer (LT)
Substantive Analysis (U)
Factors Affecting Required Antenna Gain in VHF Intercept (U)
Broadband Planar Log- Periodic Feed for the Spherical Reflector Used a t Arecibo lonospheric Laboratory (U)
Author
DOCID: 3020956
Keyword
Artificial Intelligence
Artificial Language
Astrodynamics
Astronomy
Basebands
Baudot Streams
Bayes Factors
Binary Stream
Bletchley Park
Book Review
Title Author Reference
Time Is -Time Was -Time Is Campaigne, Vol. X, No. 1, Past Computers for Howard H. Winter 1965 Intelligence (UI and
Computer and Information Science Issue
Vol. XI, No. 4, Fall 1966
Vol. XX, No. 1, Winter 1975
Vol. XIX, No. 1, Winter 1974
Vol. XXI, No. 2, Spring 1976
Vol. XXII, No. 1, Winter 1977
Vol. 11, No. 2, April 1957
Vol XII, No 1, Winter 1967
Vol. 11, No. 2, April 1957
Vol. X, No. 1, Winter 1965
Vol. VII, No. 4, Fall 1962
Vol. XXI, No.
Metalin: A Draft of a Metalanguage (U)
Geodetic Latitude and Altitude from Geocentric Coordinates (U)
Orbit Computation with the Vinti Potential and Universal Variables (U)
Orbit Fitting to Angular Data (U)
Maya Astronomical Computer, The (U)
Cornrnunications for oPeratiorj-&)
Bipolar Coding and Baseband Recovery (U)
Recurrent Events and Baudot Streams (U)
Apparent Paradox of Bayes Factors, The (U)
Distribution of the Maximum Bulge in a Flat Random Binary Stream, The (U)
Gweeks Had a Gwoupfor It, The (U) . 2, Spring
1976
Book Review: A History of Vol. IX, No. NSA General-Purpose 2, May 1964 Electronic Digital Computers (C-CCO)
Filby, P. W.
I Book Review: Basic Cryptologic Glossary (C)
Keyword
Book Review: Cloak & Lewis, Frank W. Cipher (U)
Title Author
Book Review: "Analyses of Campaigne, the Case n =3 in Algebraic Howard H. Cryptography with Involutory Key-Matrix and Known Alphabet" (Journal fur die Reine und Angewandte Mathematik) (U)
Rook Reuiew: Cryptanalysis Callimahos, of the Single Columnar Lambros D. Transposition Cipher (U)
Book Review: "IIow to Campaigne, Estimate Probabilities," Howard H. (Journal of the Institute of Mathematics a n d Its Application) ( U )
- -- --
DOCID: 3020956 REF IDzA398598 v
I
Book Review: "Involutory Campaigne, Commutants with Some Howard H . Applications to Algebraic Cryptography, I" ( Journal fiir Reine und Angewandte Mathernatik) (U)
Book Review: Lincos, Design of a Language for Cosmic Intercourse, Pa r t I (U)
Book Review: Lost Languages (L')
Book Review: Mathematical Statistics ( U )
Resolution of Linguistic 0 Book Review: Mechanical Campaigne, Howard H.
Problems (L')
Book Revlew: Military Campaigne, Cryptanalytics, P a r t I1 (U) Howard H.
125
'I'C)lJ S E C ~ U MBKA
Reference
Vol. IX, No. 3, August 1964
Vol. XI, No. 1, Winter 1966
Vol. VII, No 3, Summer 1962
Summer 1961
Vol. XII, No. 2, Spring 1967
Vol. XII, No. 1, Winter 1967
Vol. VII, No. 1, Winter 1962
Fall 1960
Vol. VII, No. 4, Fall 1962
Vol. 111, No. 4, December 1958
Vol. IV, No 4, October 1959
DOCID: 3020956
Keyword I Title Author
Book Review: Modern Probability Theory and Its Applications (U) n Book Review: Norse Medieval Cryptography in Runic Carvings ( U ) u
Reference
Fall 1960
Vol. XIII, No. 3, Summer 1968
Book Reviews. Pearl Harbor: Unknown Vol. VIII, No. Warning and Decision, reviewer 1, Winter Roberta Wohlstetter; But Not 1963 i n Shame, John Toland; The Secret War, Sanche de Gramont; CIA - T h e Inslde Story, Andrew Tully; Now It C a n Be Told, Leslie R. Groves; Thinking About the Unthinkable, Herman Kahn; Strike i n the West, James Daniel and John C. Hubbell ( U )
Book Review: Probability: An Introduction ( U )
Book Review. Recent Literature on Algebraic Cryptography ( U )
Book Review: "Some Applications of High Speed Computers to the Case n= 2 of Algebraic Cryptography," (Mathematics o f Computation), Vol. 15, No. 75
Book Review: "Some Further Campaigne, Methods in Algebraic Howard H Cryptography"; (Jaurnal o f the Mitchell Scientific Society, No. 74) (U)
Book Review: The Broken Callirnahos, Seal ( U ) Lambros D.
Book Review: TRATADO DE CRIITOCRAFIA (U)
I
Fall 1960
Vol. VII, No. 2, Spring 1962
Fall 1961
Fall 1960
Vol. XII, No. 3, Summer 1967
Vol. XI, No. 2, Spring 1966
Keyword I Title Author Reference
Bookbreaking
Buzzwords
Calligraphy
Callsign Generation
Celestial Mechanics
Book Review: "Variable Matrix Substitution in Algebraic Cryptography (U)
Bookbreaking Improvisations - Part I (U)
I Bookbreaking Improvisations - Part I1 (U)
Computer-Aided Bookbreaking of Two-Part Codes (U)
Faithful Mirror, The (U)
"Fingerprinting" Code Groups by Computer (U)
Frame versus Corpus (U)
Repagination? (U)
1 Some Problems and Techniques in Bookbreaking / IUI
Campaigne. Vol. IV, No. Howard H. 4, October
1959
-
DOCID: 3020956 - p * * 3 9 8 5 9 8 B A*
Vol. XI, No. 3, Summer 1966
Vol. XI, No. 4, Fall 1966
Vol. XVII, No. 2, Spring 1972
Vol. XIV, No 1,Winter 1969
Vol. XVII, No. 3, Summer 1972
Vol. XVII, No. 1, Winter 1972
Vol. XVIII, No. 4, Fall 1973
Vol. XI, No. 1, Winter
A 1966
Instant Expertise (U) Unknown Vol. XII, No. I , Winter 1967
Electronic Calligraphy (U) Vol. XI, No. 1, Winter 1966
"Maybe It's Related to the Phase of the Moon" (C')
Maximum Likelihood Estimation of an Orbit (U)
Vol. XVII, No. 4, Fall 1972
Fall 1961
DOCID: 3020956 -598 fb)13)-P.L. 86-36
Keyword Title
Channels (bl ( 1 ( K ( 3 - I L usc 4 J S
1 ' - l K l l ' 77P
Chi-Squares I On Comparing Two Observed Frequency Counts (U)
Channel Modeling and Code Performance Evaluation (U)
( k ( 3 - > . L . ti(-36
Chatter
Some Notes about Chi- Square (U)
Chatter Patterns: A Last Resort (U)
With Love (and Parentheses) from Peking (U)
Chinese Language
Narrow-Band Speech Security (U)
Note on Chinese Language Reform and NSA, A (U)
Cipher Equipment
Cipher Machines
Author
Wild. Norman
Reference
Vol. XXIII, No. 2, Spring 1978 and Special Mathematics and Engineering Issue, 1981- 1983
Vol. 11, No. 4, October 1957
Vol. 111, No. 2, April 1958
Vol. VIII, No. 3, Summer 1963
Vol. XXlV No. 1 Winter 1979
Vol. I, No. 2, July 1956
Vol. XII, No. 1, Winter 1967
Vol. Ill, No. 4, December 1958 and Special Linguistics Issue
Simultaneous Error Meyer, Joseph A. Vol. XIV, No. Insinuation in Electronic 1, Winter Cipher Machines (U) 1969
"TUNNY" Machine and Its Tiltman, John H., Spring 1961 Solution, The (U) Brigadier
Vol. XIII, No. Introduction t 1, Winter
1968
D o C 4 ~ & , - 3 ~ 0 & & 9 5 6 REF I D : A 3 9 8 5 9 8 9
Keyword Title Author Reference
Representative Machine Callimahos, Vol. 111, No. Cipher Systems (U) Lambros D. 1, J a n u a r y
1958
Ciphers Analytic Computer Technique fbr Anagrarnrning Columnar Transposition (U)
Attack on Blair-Huffman Encipherments, An (U)
Boer War Cipher, A (UI
Cipher Signal Phase Modulation (LT)
Cryptanalyst's Nightmare: An Oneiroic Problem and its Solution, A (U)
Callirnahos, Lambros D.
Vol. VIII, No. 2, Spring 1963
Spring 1961
Vol. X, No. 3, Summer 1965 and Vol. X, No. 4, Fall 1965
Vol. XIV, No. 2, Spring1 969
Vol. XVI, No. 4, Fall 1971
Development of the Additive, Tiltman, John H., Vol VIII, No. The (U) Brigadier 4, Fall 1963
Distribution of Letters in -1, and Vol. XIV, No. Short Messages of English, Howard H. 2, Spring1969
( T h e (U) Campaigne ib i ( 3 )
OG A New Approach to the One- Vol. XIX, NO. Time Pad, A (U) 3, Summer
1974
No, Not Again! IU) Callimahos, Vol. I, No. 1, Lambros D. April 1956
Note on a Solutionofa Vol. 1, No. 3, Polyalphabetic Dinome October 1956 System, A (U)
On Cipher (U) I I January 1960
Q.E.D.-2 Hours, 41 Minutes Callimahos, Vol. XVIII, (U) Lambros D. No. 4, Fall
Simple Homogeneity Test Vol. VIII, No. Using Log-Factors, A (U) 4, Fal l 1963
I
Tetrahedral Plugging (U) I I ~ ~ ~ ~ h N O .
DOCID: 3020956 9 9 8 ( b 8 , 3 , - i , L . 8 6 - 3 6
Keyword I Title Author Reference
Unbreakable Cipher, The (U) Campaigne, Spring 1961 Howard H.
Ciphony
Upgrading Selected U.S. Codes and Ciphers with a Cover and Deception Capability (U)
I ABC of Ciphony, The (U)
Circuits
Circuit Analysis
Civil War
Computer Automation of Circuit Analysis (U)
Analysis of a Transistor Monostable Multivibrator (U)
Development of Automatic Telegraph Switching Systems (U)
Hybrid Circuits (U)
Low Cost Process for Printed Circuits, A (U)
Modification of a Phantastron Generator, A (U)
I New Mode of Operations in Junction Transistors, A (U)
Note on "A Low Cost Process for Printed Circuits" (U)
Transient Response of Tunnel Diodes with Resistive Loading (U)
Transistor Phantastrons (U)
Rocheford's Cipher: A Discovery in Confederate Cryptography (U)
Vol. XXI, No. 1, Winter 1976
Vol. I, No. 2, July 1956 and Special Linguistics Issue
Vol. VII, No. 4, Fall 1962
Vol. IV, No. 3, July 1959
Vol. 11. No. 3, July 1957
Vol. 111, No. 1, January 1958
Vol. 11, No. 1, January 1957
Vol. IV, No. 4, October 1959
Vol. 11. No. 3, July 1957
Vol. 11. No. 3, July 1957
Vol. VII, No. 1, Winter 1962
Vol. IV, No. 2, April 1959
Gaddy, David W. Vol. XVIII, No. 4, Fall 1973
DOCID: 3020956
Keyword
Cluster Analysis
Coaxial Cables
Code
Code Generation
Code Groups
Codes
REF IDzA398598 9
I Title Author Reference
Application of Cluster D'Imperio, Mary Vol. XXIII, Analysis and E. No. 3, Multidimensional Scaling to Summer 1978 the Question of "Hands" and "Languages" in the Voynich Manuscript. An (U)
Transient Analysis of Coaxial Cables Considering Skin Effect (U)
Bookbreaking Improvisations - Part I (U)
Bookbreaking Improvisations - Part 11 (U)
Generating Random Characters on a Computer (U)
"Typewriter" Key and the Stereotype, The (U)
Bipolar Coding and Baseband Recovery (ti)
Vol. I, No. 2, July 1956
Vol. XI, No. 3, Summer 1966 and Vol. XI, No. 4, Fall 1966
Vol. XI, No. 3, Summer 1966 and Vol. XI, No. 4, Fall 1966
Vol. XII, No. 1, Winter 1967
Vol. IV, No. 4, October 1959
Vol. XII, No. I , Winter 1967
Computers -The Wailing Meyer, Joseph A. Vol. I, No. 3, Wall (U) October 1956
Don't Be Too Smart (U) El January 1960
I How the Germans Broke a Fall 1960 1 U.S. Code (U)
"It Is Obvious Tha t . . .": A Lewis, F. W. Vol. 111, No. Painless Approach to 2, April 1958 Cryptanalytic Diagnosis (U)
I Multilingual Codes (U) Vol. X, No. 4, Fall 1965
Report on the Keyword Kullback, Vol. IV, No. System, A (U) Solomon, and F. 3, July 1959
W. Lewis
DOCID: 3020956 -98
(33 ( 3 ) - P . L . 36-36
Coding
Collection
Keyword Title
Use of Production Methods in Reading Transposed Letter Codes (U)
Utilization of Code Limitations in Solving Bust Messages (U)
With Love (and Parentheses) from Peking (U)
ABC of Ciphorly, The (U)
Another Derivation of Binary Error Rates as a Function of Signal-to-Noise Power Ratio for Various Modulation Schemes (U)
Broadband Planar Log- Periodic Feed for the Spherical Reflector Used a t Arecibo Ionospheric Laboratory (U)
CATNIP: Computer Analysis - Target Networks Intercept Probability (U)
Collection of LINCOMPEX Signals (U)
Cost-Effectiveness Study of Spectrum Surveillance Systems, A (U)
Digitizer Queuing Model for FROSTING (U)
Author
u
Reference
Vol 11, No. 1, January 1957 and Special Linguistics Issue
January 1960 and Special Linguistics Issue
Vol. XII, No. 1, Winter 1967
Vol. I, No. 2, July 1956 and Special Linguistics Issue
Vol. X, No. 3, Summer 1965
Vol. X, No. 3, Summer 1965
Val. XVI, No. 1, Winter 1971
V O ~ . XVH, No. 2, Spring 1972
Vol. XIV, No. 3, Summer 1969
Vol. XIV, No.
Experimental Approach to an
4, Fall 1969
Vol. VIII, No. Environment Study in the 4, Fall 1963 H F Band (U)
DOCID: 3020956 REF IDzA398598 9
Keyword Title Author Reference a
Vol. XX, No 2, Spring
~1%- 1975
Minimizing Noise Effects in Vol. 11, No. 2, PCM (U) April 1957
On Milking the Sacred Cow Vol. XVII, (U) No. 2, Spring
1972
Potential of Tropospheric Vol. XX, NO Ducting a s a Collection 1, Winter Technique, The ( C ) 1975
RAKE System for V O ~ . X, NO. 4, Tropospheric Scatter, A (U) Fall 1965
RF Interference Phenomenon Vol XXIIE, and Intelligence Applications No. 4, Fall (u) 1978
Security Architecture in Meyer, Joseph A., Vol. XX, No. SICINT Collection and J r . 1, Winter Processing (U) 1975
Statistical Description of the Vol. X, No. 4, Noise and Emitter Fall 1965 Environment, A (U)
Collection Management Collection Management (U) Vol. XIV, No. 1, Winter 1969
COMINT COMINT Analysis and vol. XVH, Reporting on the Developing No. 2, Spring Nations (L') 1972
COMINT Signals Trends- vof. x x v , e€w No. 2, Spring
1980
Communications Intelligence Anonymous Vol. 11, No. 2, (u) April 1957
Future Problems of Intercept Gerson, Vol. VIII, No. (u) Nathaniel C. 1, Winter
1963
Language and the C ~ M I N T Vol. XIX, No. Production Process (U) 3, Summer
1974
DOCID: 3020956 lb) ( 3 1 - P . L . 8 6 - 3 6
Keyword I Title Author Reference --
Language Files: A Basic Salemme, Arthur Vol. IV, No. 2 COMINT Aid (U) J . April 1959
COMINT Target Identification
Analysis of Sorting Techniques for Multiple Signal Intercept (U)
Communications I ABC of Cifax, The (U)
Analysis of Lexical Meaning across Cultures, An (U)
Book Review: Lincos, Design of a Language for Cosmic Intercourse, P a r t I (U)
Can We Lick the Voice Problem? f U )
Vol. XII, No. 3, Summer 1967
Vol. I, No. 2, J u l y 1956
Vol. XIU, No. 4, Fall 1968
Vol. VII, No. 1, Winter 1962
Vol. XVII, No. 3, Summer 1972
I Capture-Jammingof SICINT Meyer, Joseph A. Vol. XII, No. Targets (U) 2, Spring
1967
Cepstrum Vocoder, A (U) I Channel Modeling and Code Performance Evaluation (U)
Special Issue, January 1971
Vol. XXIII, NO. 2, Spring 1978 and Special Mathematics and Engineering Issue, 1981- 1983
COMINT - Hard Facts in the Meyer, Joseph A. Spring 1961 Cold War (U)
Communications for Vol. [I, No. 2, Operation]-: j h April 1957
Communications with Callimahos, Vol. XI, No. Extraterrestrial Intelligence Lambros D. 1, Winter (u) 1966
h 4
Computer Simulation of the Vol. XXV, Vulnerability of Frequency No. 4, Fall Hopping Communications 1980
I - - -
Systems to a Follower Jammer (U)
DOCID: 3020956 REF ID:A398598
ibl (31-P.L. 86-36 7
Keyword Title Author Reference
Cover and Deception (U)
Creation of an Artificial Ionosphere to Extend the Radio Horizon for Frequencies Below 100 MC, The (U)
Curiosa Scriptorum Serihorum: To Write But Not to Communicate (U)
Developments in the Automatic Acquisition and Translation of Hand-Keyed Morse Code ( C )
Extraterrestrial Intelligence Campaigne, Howard H.
How Can the Communications Sciences Contribute to the Study of Natural Systems? (U) I Intercept System Analysis (U)
Introduction to Magnetic Tape Recording and Its Use in Intercept Activities, An (U)
Introduction to Psycholinguistics, Paralinguistics, and Kinesics, An, (U) u Ionospheric Propagation (U) Gerson.
mand Key to the Extraterrestrial Campaigne, Messages (U) Howard H.
Vol. IV, No. 3 July 1959
Vol. XI, No. 2. Spring 1966
Vol. XVI, No. 3, Summer 1971
Vol. XXIV, No. 1, Winter 1979
Vol. XI, No. 2, Spring 1966
Vol. VIII, No. 3, Summer 1963
Vol. XI, No. 2, Spring 1966
I
Vol. I, No. 3, October 1956
Vol. XII, No 2, Spring
Vol. 111, No. 4, December 1958
Vol. XIV, No. 1, Winter 1969
135
TOP -A
DOCID: 3020956 REF IDgA398598 T-
(5) ( 3 ) -J. I , . 36-36
Keyword I Title Author Reference
! C ) (1) :k) (3)-% WSC 103 ,k) (>)-I8 :JSf: i9H (b) i . 3 ) - P . I , . 86-36
Linguistic Canonical Forms: Tools for Analytic Progress
Markov Models for Phonetic Text (U)
Noise Communication Technique for Speech (U)
1 operat ion VANGUARD
Preamble for Push-to-Tal k Ciphony, A (U)
Range Dependence on System Temperatures (U)
Role of Carrier (VCh) Telephony in Soviet World War 11 Strategic Communications (U)
Soviet Communications Journals a s Sources of Intelligence (U)
Systems Approach to Training Radiotelephone Technicians, The (U)
Wireline Modem with Harmonic Distortion Equalization, A (U)
Vol. XIII, No. 1, Winter 1968 and Special Linguistics Issue 11
Vol. XVIII, No. 1,Winter 1973
Vol. VII, No. 4, Fall 1962
Vol. I, No. 2, Ju ly 1956
Vol. XII, No. 2, Spring 1967
Vol. IV, No. 1, January 1959
Vol. XIX, No. 3, Summer 1974
Vol. IX, No. 3, August 1964
Vol. XXV No. 4.Fall 1980
Vol. XVIII, No. 1 ,Winter 1973
Vol. x x v , No. 2, Spring 1980 and Special Mathematics and Engineering Issue, 1981- 1983
DOCID: 3020956 REF IDzA398598 P
(b) : 3 ) - P . L . 86-26
Keyword Title Author Reference
Comfiunications COMINT Satellites - A Space Val. IV, No. Satellites Problem (L') 4, October
1959
Communications Simulation of Special Security Cryptoprinciples (LT) Council of
Learned Organization Issue, 1972
Communist China Red China's Drive for Vol. XVI, No. Literacy (U) 2, Spring
1971
Compilers Compiler Object Code Vol. XVII, Optimization No. 1, Winter
1972
Computer Analytic Computer Vol. VIII, No. Technique for Anagramming 2, Spring Columnar Transposition (U) 1963
FIR: A CDC 1604 Program Vol. X, No. 1, for Solution of Systems of Winter 1965 Linear Equations (U)
Insolvable Problem, An (U) Jacobs, Walter Vol. VIII, NO. W. 3, Summer
1963
Computer Cryptanalysis Solving a Playfair Cipher by Vol. XIV, No. Computer (U) 4, Fall 1969
Computer Diagnostics Reliability and Checking in Vol. 11, No. 4, Computing Systems (U) October 1957
Computer Graphics Example of Computer Vol. XXII, Graphics as Applied to Key No. 1, Winter Analysis, An (U) 1977
Inexpensive Device for January 1960
Computer Language
Pictorial Input and Output, An (U)
Some Graphical Display Techniques for Fourier Analysis (U)
APL Mechanization of Indirect Symmetry (U)
pecial Issue, anuary 1971 U 01. 0. 3, XVII,
DOCID: 3020956 REF ID:A398598 9
Keyword
Computer Operating Systems
Computer Processing
Computer Programming
Computer Security
Computer Systems
Title Author Reference -
SPECOL: A New AND. OR, NOT Language for Use with Computers (U)
OVERLORD, the Programmer's Friend: An Extension of the -
Vol. XII, No. 1, Winter 1967
Vol. XXII. No. 2, Spring
IDASYS Operating System (U) 1977
~ 1 ~ 1 ~ T C o r n p u t e r Processing Phillips, Cecil Voi. XXII, in the 1980s (U1 No. 2, Spring
Computer Graphics in an Vol. XVII, Engineering Simulation No. 2, Spring Program (U)
Help Stamp Out
0 1::: Jacobs, Walter Vol. XIV, No.
Programming (U) W. 3, Summer 1969
Introduction to Programming Vol. 11, No. 3, of a Digital Computer (U) July 1957
Programmatic Control of Vol. XVII, Parallel Processes (U) No. 2, Spring
1972
Reading a Depth by Jacobs, Walter Vol. X, No. 2, Computer (U) W. Spring 1965
RYE, an Extended Capacity Remote Access System (U)
Scaling Matrix for the Analog Computer (U)
Thoughts about Systems and Program Design (U)
Designing Secure Reliable Software - A Methodology (U)
Centralized Computer Support of Field Activities
Vol. IX, No. 2, May 1964
Vol. VII, No. 1, Winter 1962
Vol. XVIII. No. 2, Spring 1973
Vol. XXI, No. 4, Fall 1976
Special Council of
(U) Learned Organization Issue, 1972
DOCID: 3020956 -A398598
Keyward I Title Author Reference
Computer Test Equipment
Scheduling Function in a Time-Sharing Environment, The (U)
Supporting the Support Facilities (U)
Computer Working Aids
Computer Use
Computers
Report of the Second Computer Study Croup (U)
Reverse Sort Machine Listings (U)
ABNER: The ASA Computer Part 1: Design (U)
ABNER: The ASA Computer Part 2: Fabrication, Operation, and Impact (U)
Vol. XVI, No. 2, Spring 1971
Various Vol. XIX, No. 1, Winter 1974
Vol. XVIII. No. 1,Winter 1973
Snyder, Samuel Vol. XXV, S. No. 2, Spring
1980
Snyder, Samuel Vol. XXV, S. No. 3,
Summer 1980
Application of Human Factors to the Specification and Design of Interactive Computer Systems (U)
Application of Queuing Theory to Computer Systems, An (U)
APT System, The (U)
Aristocrat - An Intelligance Test for Computers (U)
Assignment Algorithm Applied to Manual Cryptosystems (U)
Association Factor in Information Retrieval, The (U)
Vol. XVIII, No. 3, Summer 1973
Vol. XXIV, No. 4, Fall 1979
Vol. XIV, No. 2, Spring 1969
Vol. XXIII, No. 3, Summer 1978
Campaigne, Vol. VII, No. Howard 2, Spring
1962
Val. XX, No. 1, Winter 1975
Winter 1961
Automatic Maintenance (U) Meyer, Joseph A. Vol. IX, No. 1, Winter 1964
DOCID: 3020956
(b) ( 3 ; - P . L . 86-36
Keyword I Title Author Reference
Birth of ATLAS I (U)
Book Review: A History of NSA General-Purpose Electronic Digital Computers
Book Review: Mechanical Resolution oTLinguistic Problems (U)
CAM I1 (U)
CAMINO (U)
Vol. XVIII, No. 1,Winter 1973
Vol. IX, No. 2, May 1964
Campaigne, Vol. 111, Howard H. No. 4.
December 1958
r l Vol. IX, No. 2, May 1964
Cleaning the Augean Stables or How Much TA Can a Computer Do? (U)
Climbing Jacob's Ladder (U)
Communications Security and Computers (U)
Community Impacts on NSA Systems (U)
Computer-Aided Bookbreaking of Two-Part Codes (U)
Computer Applications: The Insatiable Appetite of the Analyst (U)
Computer Automation of Circuit Analysis ( U )
Vol. XIII, No. 3, Summer 1968
Vol. XII, No. 3, Summer 1967
Special Council of Learned Organization Issue, 1972
Vol. XXIII, No. 3, Summer 1978
Vol. XVII, No. 2, Spring 1972
Vol. XIX, No. 4, Fall 1974
Vol. VII, No. 4, Fall 1962
DOCID: 3020956 REF IDzA398598 P
(k) i ' , - P L. 86-36
Keyword
ib) (1) i h ) (3)-50 IJSC 403 (b) (3)-P.L. 86-36
Title
Computer Processing of Natural Languages (U)
Com~ute r Processing of l~e lemet ry (U)
Computer Program Debugging: A New Era (U)
Computer Scripting (U)
Computer Sorting (E)
Author Reference
Special Council of Learned Organization Issue, 1972
Vol XIII, No. 3, Summer 1968
Vol. X111, No. 2, Spring 1968 and Special Computer and Information Sciences Issue
Vol. XXIV, No. 1 Winter 1979
Vol. XIII, No. 3, Summer 1968
Computer, There Is Thy Salemme, Arthur Vol. XVI, No. Sting! (U) J. 4, Fall 1971
Computer Transcription of Manual Morse (U)
Computerized Depth Reading (U)
Computers and Advanced Weapons Systems (U)
Computers and Linguists Do Mix (U)
Computers and Queues (U)
Vol. 111, No. 3, July 1958
Vol. XVII, No. 1, Winter 1972
Special Council of Learned Organization Issue, 1972
Vol. XVI, No. 3, Summer 1971
January 1960
DOCID: 3020956
Keyword I Title
Memories (U)
Convolutions, Cube Roots, I and Computer Cryptography (U) I Cryptanalytic Use of High- Speed Digital Computing Machines (U)
Data Management Challenge, The (U) I
Author Reference
Vol. IX, No. 1, Winter 1964
Vol. XVIII, No. 3, Summer 1973
Vol. X, No. 1, Winter 1965
Vol. IX, No. 3, August 1964
Vol. XVI, No. 2, Spring 197 1
Data Structures and Their D'Imperio, Mary Vol. IX, No. Representation in Storage. 3, August Pa r t I (U) 1964
Data Structures and Their D'Imperio, Mary Vol. IX, No. Representation in Storage: 4, Fall 1964 Par t I1 (U)
Debugging Made EasierlU) Vol. 111, No. 4, December 1958
Dialect: A Data Type fo r t he Vol. XXII, Person-Machine Interface No. 2, Spring (U) 1977
Earliest Applications of the Snyder, Samuel Vol. XVIII, Computer a t NSA (U) S. No. 1,Winter
1973
Extensible Model of a Hand Vol. XXiII, Cryptosystem, An (U) No. 1, Winter
1978
Famous First Facts, NSA, Snyder, Samuel Vol. XVII, Pa r t I: Pre-Computer ' S. No. 4, Fall Machine Cryptanalysis (U) 1972
"Fingerprinting" Code Groups by Computer (U)
I
Vol. XVII, No. 3. Summer 1972
DOCID: 3020956 TOP -98598
Keyword Title Author Reference
Foreign VS. U.S. Computers. An Appraisal (U)
Frame versus Corpus (U)
Generating Random Characters on a Computer ( C )
Special Council of Learned Organization Issue, 1972
Vol. XVII, No. 1, Winter
Vol. XII, No. 1, Winter 1967
Graceful Degradation I ( Vol XXIII, through Distributed No. 3,
Summer 1978
Growing up at NSA(U)
with Computers Eachus Joseph, Special
L 2 Council of Learned Organization
Jacobs, E. Dale Issue, 1972 Marston, Charles J. Schierlmann, Samuel S. Snyder; Moderator, Howard H. Campaigne
Human-Machine Interfaces for NSA Computer Systems (LT)
Information Theory Applied to Computer Data Compression (U)
Introduction to APL, An (U)
Introduction to Computer Binary Arithmetic, An (C)
D'Imperio, Mary E .
Vol. XXIV No. 4 Fall 1979
Vol. XXIII, No. 4, Fall 1978 and Special Mathematics and Engineering Issue, 1981- 1983
Vol. XVI, No. 4, Fall 1971
Vol. 111, No. 2, April 1958
DOCID: 3020956 REF IDzA398598 : ( b ~ ( 3 ; - P . ! . 86-36
Keyword Title Author Reference
- Introduction to the Fast Special Issue, Fourier Transform, An (U) January 1971
LIGHTNING (U) Campaigne, Vol. IV, No. Howard H. 3, July 1959
LIGHTNING Program, The Vol. VIII, No. 1, Winter 1963
Magnetic Core Memories (U) Vol. 11, No. 1, January 1957
Mathematics and Computers Special in Cryptanalysis (U) Council of
Learned Organization Issue, 1972
i b ) (1) (b) ( 3 ) - P . L . 56-36 V O ~ . XXIv,
No. 4, Fall 1979
Model 204 -The Analyst's Vol XXI, No. Computer (U) 3, Summer
1976
MP-14: Unlimited Random Vol. XVII, Source (U) No. 3,
Summer 1972 8
On Operatorless Computers Vol. I., No. 1, (u) April 1956
Operation Babel (U) Vol. IV, No. 3, July 1959
Optimum Use of Log Weights Vol. IX, No. (U) 3, August
1964
Potential of Interactive Vol. XXV No. Computer Programs in the 3, Summer Decryption Process of SIGINT, 1980 T h e - W H B F
Program for Correcting Vol. IV, No. Spelling Errors, A (U) 4, October
1959
DOCID: 3020956 9 9 8 5 9 8
Key word I Title Author Reference
Restraining Barrier as Applied to the Biased Binary Counter (U)
Rationale for and Preliminary Implementation of HYPERCAN (High - Performance Cryptanalysis) (U)
Redundancy Exploitation in the Computer Solution of Double-Crostics (U)
Repagination? (Li)
Special Purpose Cryptanalytic Computers: State of the Art (U)
Vol. 111, No. 2, April 1958
Vol. XXIII, No. 4, Fall 1978
Vol. VII, No. 2, Spring 1962
Vol. XVIII, No. 4, Fall 1973
Vol. XXIII, No. I , Winter 1978
Status of Optical Logic Vol. VIII, No. Elements for Nanosecond 3, Summer Computer Systems (U) I I 1963
Study of Character-Handling D'Imperio, Mary Vol. XIV, No. by Computer at NSA, A (U) E. 2, Spring
1969
"Take Care of Your Pennies. Vol. 111, No. . . (U)" 1, January
Technology of Future Vol. XXV, Powerful Personal No. 3, Computers, The (U) Summer 1980
TEMAC (Text Macro D'Imperio, Mary Vol. X, No. 3, Compiler): A Machine Summer 1965 Language for Processing and Text (U) Computer
and Information Science Issue
DOCID: 3020956
Keyword
Computing
COMSEC
Cribbing Techniques
REF ID:A398598 9
I Title Author Reference
Time Is -Time Was -Time Is Campaigne. Vol. X, No. 1, Past Computers for Howard H. Winter 1965 Intelligence (U) and
Computer and Information Science Issue
Tunnel Diode Characteristic Function Generator (U)
Tunnel Diode Dynamic Logic Module, A (U)
Under-Developed Languages, Under-Utilized Computers (u) I "Word Spotter, A" (U) I Introduction to Log-Linear Models in Cryptanalysis (Ul
New Concept in Computing, A (U)
Communications Security and Computers (U)
COMSEC a t RID S i t e s R Gerson, Nathaniel C.
TEMPEST Considerations in Automatic Data Processing n Equipment Installations (U)
Weather or Not - Encrypted? I
Vol. VIII, No. 1, Winter 1963
Summer 1961
Vol. XX, No. 1, Winter 1975
Vol. IV, No. 4, October
Vol. x x v , No. 2, Spring 1980
Vol. 111, No. 4, December 1958
Special Council of Learned Organization Issue, 1972
Vol. VII, No. 4, Fall 1962
Vol. XIV, No. 1, Winter 1969
Vol. XII, No. 4, Fall 1967
Some Cribbing Techniques Vol. XXIII, (U) No. 1, Winter ( 1978
DOCID: 3020956 REF IDrA398598 w
Telecommunications from the Torn-Tape to the
.,Computer (L!)
I
Special Council of Learned Organization Issue, 1972
Keyword Title Author Reference
I Analysis of Digital Plaintext Autokey Systems. The (U)
Cryptanalysis
Apparent Paradox of Bayes Factors, The (L')
Crisis Management
Addendum to "A Cryptologic Tiltman, John H. , Vol. XVIII, Fairy Tale" (U) Brigadier No. 1, Winter
1973
Callimahos, Lambros D.
.Crisis Management in the Zoebelein, Vol. XXII, National Senior Cryptologic Arthur J. No. 1. Winter Course (U) 1977
Vol. XIV, No. 2, Spring 1969
Vol. X, No. 1, Winter 1965
Vol. XIX, No. 4. Fall 1974
Vol. XXIV, No. 3, Summer 1979
Aristocrat - An Intelligence Test for Computers (L')
Assignment Algorithm Applied to Manual Cryptosystems (U)
Bayes Marches On (L)
Birth of ATLAS I (LT)
Carnpaigne, H. Vol. VIl, No. 2, Spring
1 1962
Vol. XX, No. 1 , Winter 1975
January 1960
Vol. XVIII, No. 1,Winter 1973
(b) (11 (b) ( 3 ) - 5 0 USC 4 0 3 (b) ( 3 ) - P . L . 8 6 - 3 6
DOCID: 3020956
Keyword Title Author
Book Review: "Analyses of Campaigne, the Case n = 3 in Algebraic Howard H. Cryptography with Involutory Key-Matrix and Known Alphabet" (Journal fur die Reine und Angewandte Mathematik) (U)
Book Reuiew: Cloak & Lewis, Frank W Cipher (U)
Book Review: Cryptanalysis Callimahos, of the Single Columnar Lambros D. Transposition Cipher (U)
Book Review: Military Campaigne, Cryptanalytics, Part I1 (U) Howard H.
Capture-Jamming of SIGINT Meyer, Joseph A. Targets (U)
Reference
Vol. IX, No. 3, August 1964
Vol. VII, No. 3, Summer 1962
Summer 1961
Vol. IV, No. 4, October 1959
Vol. XII, No. 2, Spring
Classes of Rotors without Parallels (U)
Computer Generation of Unrelated Latin Squares (U)
Computerized Depth Reading (U)
Computers -The Wailing Wall (U)
Val. X, No. 4, Fall 1965
Vol. X, No. 3, Summer 1965
Vol. XVII, No. 1, Winter 1972
Meyer, Joseph A. Vol. I, No. 3, October 1956
Cryptanalysis in the German Air Force (U)
Conjugate Codebooks (U)
Coupon Collecting and Cryptology (U)
Vol. IV, No. 2, April 1959
Vol. XXII, No. 3, Summer 1977
Vol. XI, No. 4, Fall 1966
I I
Cryptanalysts Nightmare: Callimahos, Vol. XVI, No. , An Oneiroic Problem and Its Lambros D 4, ~ ~ ~ ( g $ % i -At3 usc Solution, A (U) (bi ( 3 ) - P . L . E
DOCID: 3020956 -398598
Keyword 1 Title Author Reference
Cryptanalytic Applications of Sequential Analysis (U)
Cryptanalytic Use of High- Speed Digital Computing Machines (U) I CXCO Story, The (U)
Cybernetics and Problems of Diagnostics: the Parallels between Medicine and Cryptanalysis (U)
Callimahos, Lambros D.
Vol. IX, No. 3, August 1964
Vol. IX, No. 3, August 1964
Vol. XVI, No. 4, Fall 1971
Vol. XIV, No. 1 ,Winter 1969
Double Transposition - A Tiltman, John H., Vol. XVII, Special Case (U) Brigadier No. 4, Fall
1972
I Education in Diagnosis ILJ)
Euclidean Algorithm and Distances between Wheel Settings, The (U)
Extensible Model of a Hand Cryptosystem, An (U)
Extreme Values in Cryptanalysis (U)
Vol. XIV, No. 1, Winter 1969
Vol. VIII, No. 1, Winter 1963
Vol. XXIII, No. 1, Winter 1978
Vol. IV, No. 4, October 1959
Fallacy of the One-Time-Pad Lewis, Frank W. Excuse, The (U)
Fourier iVIodulus Method of Cage Identification (u) n - Garden Paths 1 Have Lewis, Frank W. Followed (U)
GEE WHIZZER (U) Unknown
Vol. XIV, No. 3, Summer 1969
April 1960
Vol. IX, No. 3, August 1964
Vol. VIII, No. 1, Winter 1963
DOCID: 3020956
Keyword Title
German Tires and Black Cats: Estimation of Population Size (U)
Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Scaling, The (U)
I How to Choose a Good Crib (U)
International or Cross- Country Depths (U)
Introduction to APL, An (U)
Introduction to Diagnosis (U) 3
Author Reference
Vol. XIX, No. 3, Summer 1974
Vol. XXI, No. 4, Fall 1976
Vol. X, No. 4, Fall 1965
Vol. I, No. 3, October 1956
Vol. XVI, No. 4, Fall 1971
I Introduction to IBM Methods Callimahos, Vol. 11, No. 3, in Cryptanalysis. An (U) Lambros D. July 1957
Introduction to Log-Linear Models in Cryptanalysis (U)
Logarithmic Scoring and Preliminary Testing (U)
Long and Short of Single Transpositions, The (U)
Magic Digraphs (U)
I Mechanical Treatment of Fibonacci Sequences, A (U)
Method of Recovery of Fibonacci Key, A (U)
1 Mickle-Muckle Principle in Hagelin ~ r y ~ t a n a l ~ s i s , The I (LI
Vol. x x v , No. 2, Spring 1980
Vol. 11, No. 1, January 1957
Vol. XXI, No. 2, Spring 1976
Vol. XII, No. 1, Winter 1967
Vol. 11, No. 4, October 1957
Vol. I, No. 3, October 1956
Vol. IX, No. 4. Fall 1964
I Modified Normal Curves (U) Spring 1961
DOCID: 3 0 2 0 9 5 6 98598
Keyword Title Author Reference
MP-14: Unlimited Random Vol. XVII, Source (U) No. 3,
Summer 1972
Notes on Chi-square in Vol. 11. No. 3, Cryptanalysis (U) July 1957
Number of Components in Vol. IV, No. Random Linear Graph, The 2, April 1959 (U)
On Cryptanalysis and Vol. IV, No. , Redundancy (U) July 1959
On Key Analysis (U) Callimahos, Vol. XIX, No. Lambros D. 4, Fall 1974
On Tests of Sequences (U) Kullback, Vol. VII, No. Solomon, and 1, Winter
1962
On the Expected Number of Val. VIII, No. Random Stops Corresponding 1, Winter to a Given Menu (U) 1963
On the Maximization of X.AX Vol. VIII, No. over the Vertices of the Cube 1, Winter (u) 1963
Optical Data Processing - A Vol. XX, No. Cryptanalytic Perspective 3, Summer (u) 1975
Penney-Ante (U) Vol. XII, No 1, Winter 1967
Potential of Interactive Vol. XXV No. Computer Programs in the 3, Summer Decryption Process of SIGINT, 1980 The TFT3Wj
Randomization Made to Special Order: "Random Numbers Council of Are Too Important to be Left Learned to Chance" (U) Organization
Issue, 1972
DOCID: 3020956
Keyword I Title
Rationale for and Preliminary Implementation of HYPERCAN {High Performance ~ r ~ i t a n a l y s i s ) / (U) Recognition of Latin Square Equivalence Classes (U)
Recovering the Structure of a Linear Shift Register (U) I
I Revision - de novo, A (U)
Sliding Strips, Additive, Subtractive, and Minuend (U)
Solution of Additive- Minuend Busts (U)
Solution of a Fractionated Monome-Dinome System (U)
Solution of a Polyalphabetic Monome-Dinome System (U)
Author Reference
Vol. XXIII, No. 4, Fall 1978
Vol. XVI, No. 3, Summer 1971
Vol. XIV, No. 4, Fall 1969
Wray, W. D.
Solution of VEJX-0, or the Uses of Delta (U)
Some Applications of the Chi- Square Test in Cryptanalysis (U)
Some Observations on Computer Aids to indicator Recovery (U)
Lutwiniak, William
Vol. I, No. 3, October 1956
Vol. XI, No. 2, Spring 1966
Vol. 111, No. I , January 1958
Vol. 11, No. 2, April 1957
Vol. I, No. 3, October 1956
Lutwiniak, Vol. XVIII, William No. 2,Spring
1973
Callimahos, Vol. XIV, No. Lambros D. 4, Fall 1969
Vol. XVII, No. 4, Fall 1972
Some Reminiscences (U) Tiltman, John H., Vol. XI, No. Brigadier 3, Summer
1966
Something'May Rub Off! (u) Lewis, F. W. Vol. X, No. 1, Winter 1965
Text Recognition Procedure for Cryptanalysis, A (U)
Vol. XI, No. 3, Summer 1966
W E T UMBRA
DOCID: 3020956 ~n - -398598 $ b ) (31-P.I . 86-36
Key word I Title Author ReferenCe
Theory and Applications of Three-Way Multidimensional Scaling
Cry ptanalytic Personnel
Cryptographic Security
Cryptography
This Matrix Business: Part I1 (U)
Unbreakable Cipher, The (U) Campaigne, Howard H.
Use of Bayes Factors with a Composite Hypothesis (U)
What Next, Dr. Trithemiu~? Lewis, Frank W. (U)
Will the Real 53 Stand Up? (U)
Z-Flags in Hagelin Fairbanks, Cryptanalysis (U) Sydney
On the Selection of Cryptanalysts -Part I1 (U)
On the Selection of Personnel for Cryptanalysis (U)
Some Principles of Tiltman, John Cryptographic Security (U) H., Brigadier
Book Review: Recent Literature on Algebraic Cryptography (U)
Vol. XXI, No. 2, Spring 1976
Vol. XIII, No. 3, Summer 1968
Vol. 111, No. 2, April 1958
Vol. 111, No. 4, December 1958
Spring 1961
Vol. IX , No. 4, Fall 1964
Vol. XI, No. 4, Fall 1966
Vol. XIX, No. 1, Winter 1974
Vol. IX, No. 1, Winter 1964
April 1960
January 1960
Vol. XIX, No. 3, Summer 1974
Vol. VII, No. 2, Spring 1962
Book Review: "Variable Campaigne, Vol. IV, No. Matrix Substitution in Howard H. 4, October Algebraic Cryptography" (U) 1959
DOCID: 3020956
Title Author Reference
Categories of Cryptographic Lewis, Frank W. Vol. XII, No. Phenomena - With a Few 4, Fall 1967 Examples of Effect and Cause (U)
Convolutions, Cube Roots, and Computer Cryptography (UI
Vol. XVIII, No. 3, Summer 1973
De Profundis; or the ABC of Callimahos, Vol. 11, No. 1, Depth Reading (U) Lambros D. January 1957
I Generation of Permutations
Cryptologic History
(U)
Intuitive Exposition of Zierler's Method for Finding Linear Recursions, An (U)
On the Distribution of n- Digit Groups by the Sum of Their Digits (U)
Philosophy of U.S. Cryptography and Cryptographic Usage, A (U)
Recollections Concerning the Birth of One-Time Tape and u Printing-Telegraph Machine Cryptography (U)
ABNER: The ASA Computer Part 1: Design (U)
ABNER: The ASA Cbmputer Part 2: Fabrication, Operation, and Impact (U)
About NSA (U)
Boer War Cipher, A (U)
Book Review: Norse Medieval Cryptography in Runic Carvings (U)
Vol. IX. No. 2, May 1964
Vol. XIII, No. 1, Winter 1968
Vol. I, No. 2, July 1956
Vol. XII, No. 3, Summer 1967
Vol. I, No. 2, July 1956
Snyder, Samuel Vol. XXV, S. No. 2, Spring
1980
Snyder, Samuel Vol. XXV, S. No. 3,
Summer 1980
Vol. IV, No. 1, January 1959
Vol. X, No. 3, Summer 1965 and Vol: X, No. 4, Fall 1965
Vol. XIII, No. 3, Summer
Keyword I Title Author Reference
Book Reviews: Pearl Harbor: Warning and Decision, Roberta Wohlstetter; But Not in Shame, John Toland; The Secret War, Sanche de Cramont; CIA - The lnside Story, Andrew Tully; Now It Can Be Told, Leslie R. Groves; Thinking A bout the Unthinkable, Herman Kahn; Strike in the West, James Daniel and John G. Hubbell (U)
Unknown Vol. VIII, No. reviewer 1, Winter
1963
Book Review: The Broken Seal (L')
Can Cryptologic History Repeat Itself? (U)
Callimahos, Yol. XII, No. Lambros D. 3, Summer
1967
Friedman, Vol. XVIII, William F. NO. 3,
Summer 1973
I Cryptologic Fairy Tale, A
Der Fall WICHER: German Knowledge of Polish Success on ENIG~IA (L!)
Drama in Cryptologic Life (U)
Experiences 1920-1939 (U)
GEE System - I, The (U1
GEE System - 11, The (U)
GEE System - 111, The (U)
-- --
- ----- - - - -
DOCID: 3 0 2 0 9 5 6 1COE-98598
Tiltman, John H., Vol. VII, No. Brigadier 2, Spring
1962
Vol. XVI, No. 4, Fall 1971
Meyer, Joseph A. Vol. XX, No. 2, Spring 1975
Callimahos, Vol. XIX, No. Lambros D. 1, Winter
1974
Tiltman, John H., Vol. XVII, Brigadier No. 3,
Summer 1972
Unknown Fall 1961
Unknown Vol. VII, No. 1, Winter 1962
Unknown Vol. VII, N o . 2, Spring 1962
155
TOP Sh-
DOCID: 3020956
'(b) ('1-t . 1 . 86-?6
Keyword
-598
I Title Author Reference
1 GEE System - IV, The (U) Unknown
GEE System - V, The (U)
German Agent Systems of Lewis, Frank W. World War I I W
German Radio Intelligence I iui
Gweeks Had a Gwoup for It, Filby, P. W. The (U)
How the Japanese Army Water Transport Code 2468 Was Broken (U)
Introduction to Cryptology - Friedman, I, An (U) William F.
Introduction to Cryptology - Friedman, 11, An (U) William F.
Introduction to Cryptology - Friedman, 111, An (U) William F.
Introduction to Cryptology - Friedman, IV, An, (U) William F.
Introduction to Cryptology - Friedman, V, An, (L') William F.
Introduction to Cryptology - VI, An, (U)
John Dee: Consultant to Queen Elizabeth I (U)
Maya Astronomical Computer, The (U)
Midway and Yamamoto: Properly Revisited (U)
Friedman, William F.
Vol. v11, No, 3, Summer 1962
Vol. VII, No. 4, Fall 1962
Vol. VII. No. 3, Summer 1962
Vol. x x v , No. 4, Fall 1980
Vol. XXI, No. 2, Spring 1976
Vol. XVIII, No. 4, Fall 1973
Vol. IV, No. 4, October 1959
April 1960
Fall 1960
Winter 1961
Summer 1961
Fall 1961
Vol. XII, No. 4, Fall 1967
Vol. XXII, No. 1, Winter 1977
Vol. XIII, No. 3, Summer 1968
DOCID: 3020956 9 8 5 9 8 i
Keyword I Title Author Reference
Personal Contribution to the Vol. XX, No. Bombe Story, A (U) 4, Fall 1975
Precursor of Modern Vol. 111, No. Communications Intelligence 3, July 1958 (U)
Preliminary Historical Unknown Vol. 1X. No. Report on the Solution of the 2, May 1964 "B" Machine (U)
Project EXPLORER (U) Vol. XVI. No. 2, Spring 1971
Reading TUNNY (U) Campaigne, Vo!. VII, No. Howard H. 4, Fall 1962
Ib) (31-P.I. 86-36
Rocheford's Cipher: A Discovery in Confederate Cryptography (U)
Rosetta Stone and Its Decipherment, The (U)
SIGINTing with SACO: Experiences with the Rice Paddy Navy (U1
Gaddy, David W. Vol. XVIII, No. 4, Fall 1973
Callimahos, Vol. XVI, No. Lambros D. 1, Winter
1971
Vol. XXI, No. 1, Winter 1976
Vol. XXI, No. 1, Winter 1976
Solution of the Japanese Friedman, Val. XIX, No. "PURPLE" Machine, The (U) William F. 1, Winter
1974
Room 40 Compromise, The Meyer, Joseph A. Vol. XXV, (U) No. 1, Winter
1980
Cryptologist: Can He Exist?, The (Ul n Book Review: Basic Cryptologic Glossary
Book Review: Lost Languages (u) U
Vo!. 11, No. 3, July 1957
Vol. XI, No. 1, Winter 1966
DOCID: 3020956 9
Keyword Title Author Reference
Borders of Cryptology, The Vol. IV, No. (U) 4, October
1959
Elements of Shift Register Vol. XVI, No. Cryptology (U) 2, Spring I
1971
Flattening Effect, The (U) Kullback, S.
Insolvable Problem, An (U) Jacobs, Walter W.
Null Hypothesis, The (U) Campaigne, Howard H.
Probabilities of Hypotheses and Kullback-Leibler Information-Statistics in Multinomial Samples (U)
Science and Cryptology (U) Engstrom, Howard T.
Turing's Contributions to Cryptology (U)
Cryptomathematics Enumeration of the Square Permutations of the
( = (1) Symmetric Group (U)
( - (3)-13 USC 7 ~ 8
Multiple Hypothesis Testing and the Bayes factor (U)
Survey of the Distance Problem, A (U)
Vol. X, No. 1, Winter 1965
Vol. VIII, No. 3, Summer 1963
Vol. I, No. 2, J u l y 1956
Vol. I, No. 3, October 1956
Vol. 111, No. 3, July 1958
Vol. VIII, No. 3, Summer 1963
Vol. XVIII, No. 4, Fall 1973
Vol. XIX, No. 4, Fall 1974
Vol. XVI, No. 3, Summer 1971
Vol. XXIV, No. 3. Summer 1979
Vol. XVIII, No. 2,Spring 1973
DOCID: 3020956 9 3 9 8 5 9 8 ( b ) l ? ) -P.L. 86-36
Currents
Cybernetics
Author Reference
Cryptosecurity Matter Transmission (U)
Cryptosystem identification
Cryptosysterns No. 1 Winter
Cryptovariables
Thin Film Shifting Matrix, A
Communications Sciences Contribute to the Study of Natural Systems? (U)
Data Compression Information Theory Applied Vol. XXIII, to Computer Data No. 4, Fall Compression (U) 1978 and
Special Mathematics and Engineering Issue, 1981- 1983
Data Management Data Management Vol. XVI, No. Challenge, The (U) 2, Spring
1971
Data Processing AR System, The (U) Vol. XXIII, No. 3, Summer 1978
Community Impacts on NSA Vol. XXIII, Systems (U) No. 3,
Summer 1978
( b ) (1) (b) (3)-50 USC 403 (b) (3)-P.L. 86-36
DOCID: 3020956 REF ID:A398598 TFP~~~""RA
Keyword Title Author Reference
Integrated and Guided Wave Vol. XXIV, Optics and Device No. 2, Spring Applications (U) 1979 and
Special Mathematics and Engineering Issue, 1981- 1983
Optical Data Processing - A Vol. XX, No. Cryptanalytic Perspective 3, Summer (u) 1975
REDMAN Program, The (U) Vol. IX, No. 1, Winter 1964
Data Representation Representing Data in Vol. 111, No. Computers (U) 1, January
1958
Data Standardization Data Standards for SICINT Vol, XM, No. Activities - Some Conflicting 1, Winter Objectives (U) 1971
Data Standards Data Standardization and Vol. XVI, No. the Trace Factor (U) 2, Spring
1971
Databases Database Services (U) Vol. XII, No. 1, Winter 1967
Debugging Computer Program Vol XILI, No. Debugging: A New Era (U) 2, Spring
1968 and Special Computer and Information Sciences Issue
Debugging Made Easier (U) Vol. 111, No. 4, December 1958
Cover and Deception (U) Vol. IV, No. 3 July 1959
Deception
DOCID: 3020956 REF IDzA398598 --BRA
Keyword
Decision Making
Degaussing
Dictionaries
Dictionary References
Digital Circuits
Digital Data
Digital Recordings
Digital Signals Analysis
Direction finding
Distribution
Document Destruction
I Title Author
Upgrading Selected U.S. Codes and Ciphers with a Cover and Deception Capability (U)
Crisis Management in the Zoebelein, National Senior Cryptologic Arthur J. Course (LT)
Measurement of Insecurity for Imperfect Erasure, A (U)
Look a t It This Way (C )
Fast Look-up in a Threaded Dictionary (U)
Fundamentals of Majority Logic ( U )
Data Transmission Over Telephone Circuits (U)
Electrical and Magnetic Properties of Computer Tape (U)
WARSAN I1 -An Implementation of the FFT and Other Tools for Digital Signals Analysis (U)
Errors in High Frequency Direction Finding (U)
U. S. Program in Direction Finding, A (U)
Degrees of Freedom in an N- bit Frequency Distribution (U)
Emergency Destruction of Documents (U)
Reference
Vol. XXI, No 1, Winter 1976
Vol. XXII, No. 1, Winter 1977
Vol. XXII, No. 1, Winter 1977
Vol. XVIII, No. 1,Winter 1973
Vol. XVI, No. 1, Winter 1971
Vol. IV, No 4, October 1959
Vol. IV, No. 1, January 1959
Vol. IX, No. 1, Winter 1964
Specia 1 Issue, January 197 1
Vol. IV, No. I , January 1959
Gerson, Vol. X, No. 2, Nathaniel C. Spring 1965
Vol. I, No. 1, April 1956
Shinn, L. E. Vol. I, No. 1, April 1956
DOCID :
Keyword
Document Storage
Dynamic Memory
Earth Satellites
Editing
Editorials
Electricity
Electromagnetics
Electronic Warfare
Electronics
ELINT
Title
Threaded File Retrieval System (U)
Processes for Random and Sequential Accessing in Dynamic Memories (U)
Determination of Missile and Earth Satellite Trajectories from Radar Observations (U)
Operation VANGUARD
Textual Criticism and NSA (U)
Collected Editorials of Sydney Fairbanks (U)
Author Reference
Vol. XII, No. 2, Spring 1967
Vol. XXII, No. 4, Fall 1977
April 1960
Vol. I, No. 2, July 1956
Vol. XIV, No. 3, Summer 1969
Fairbanks, April 1956 - Sydney July 1959
Darlington Compound Vol. IX, No. Transistor a s a Current 4, Fall 1964 Controlled Voltage Source, A (U)
Intercept and Gerson, Vol. XX. No. Electromagnetics (U) Nathaniel C. 2, Spring
1975
Thermal Noise (U)
Intercept of USSR Missile Transmissions (U)
Borders of Cryptology, The (U)
Introduction to Semiconductor Physics and Diode Theory (U)
Gerson,
Vol. VII, No. 3, Summer 1962
Vol. IV, No. 3, July 1959
Vol. IV. No 4, October 1959
Vol. 11, No. 2, April 1957
Drawing to a Straight Flush Vol. XXI, No. - A Study in Technical 3, Summer Intelligence (U) 1976
DOCID: 3 0 2 0 9 5 6 9 9 8 5 9 8 ; ( b ) (3)-E.L. 86-36
( u ) (1) (b) (jj-53 USC 403 ( 5 : ( 3 ) - P . L . 16-36
Keyword I Title Author Reference
ELINT Collection
Encipherment
Encryption
Engineering
ENIGMA
Equipment Emanations
Future Problems of Intercept Gerson. Nathan iel C.
SELLNOW - A Man-Machine Communication System for ELINT Data (U)
Real-Time Raster (U)
Offsets of Differences: Summation and Difference Methods (U)
Solution of Hill's Basic Algebraic Methods for Enciphering Polygraphs (UI
Time-Element Scramble (U)
Vol. VIII, No. 1, Winter
Vol. IX, No. 2, May 1964 I li3 Vol. VIII, No. 4, Fall 1963
Vol. XXIV, No. 1, Winter 1979
Vol. 11, No. 4, October 1957
Vol. I, No. 2, July 1956
Vol. VII, No. 4, Fall 1962
Meyer. Joseph A. Vol. VII, No. Approach, The (U) 3, Summer
1962
Electrical Design of Random Sequence Generators (U)
Der Fall WICHER: German Meyer, Joseph A Knowledge of Polish Success on ENIGMA (Li)
Vol. IX, No. 3, August 1964
Vol. XXIV, No. 4, Fall 1979
Personal Contribution to the Bombe Story, A (U)
Standard for Evaluating the Intelligence Content of Equipment Emanations (U)
Esperanto I Language Problem a t NSA, The (U)
Vol. XX, No. 2, Spring 1975
Vol. XX, No. 4, Fall 1975
Vol. IX, No. 3, August 1964
Vol. I, No. 1, April 1956
DOCID: 3020956
Author Reference Keyword
Ethics
Title
Extraterrestrial Intelligence
Facsimile
FDM Signals
Field Sites
File Storage
Films
Filters
COMINT - Hard Facts in the Cold War (U)
Book Reuiew: Lincos, Design of a Language for Cosmic Intercourse, Part 1 (U)
Communications with Extraterrestrial Intelligence (U)
Extraterrestrial Intelligence (U)
Key to the Extraterrestrial Messages (U)
ABC of Cifax, The (U)
FDM Activity Detection (U)
Centralized Computer Support of Field Activities (U)
Minimizing Wasted Space in Information Files (U)
Deposited Films - Magnetic Elements for the Memory of the Future (U)
Parabolic "Mock" Design for an FFT - Implemented Filter Scheme (U)
Realization and Optimization of the Audio Frequency Microminiature Thin Film Band-Pass Filters (U)
Meyer. Joseph A. Spring 1961
Vol. VII, No. 1, Winter 1962
Callimahos, Vol. XI, No. Lambros D. 1, Winter
1966
Campaigne, Vol. XI, No. Howard H. 2, Spring
1966
Campaigne, Vol. XIV, No. Howard H. 1, Winter
1966
Vol. I, No. 2, July 1956
Vol. XXI, No. 1, Winter 1976
Special Council of Learned Organization Issue, 1972
Vol. XIV, No. 4, Fall 1969
Vol. I, No. 3, October 1956
Special Issue, January 1971
Vol. XIII, No. 4, Fall 1968 Special Mathematics and Engineering Issue, 1981- 1983
REF IDzA398598 DOCID: 3020956
Keyword I Title Author
Frequency
Foreign Languages
FORTRAN
Entropy of German, The (U)
Look a t It This Way (U)
Compiler Object Code Optimization (U)
Writing Efficient FORTRAN (U)
Degrees of Freedom in an N- bit Frequency Distribution (U)
Error Formula for Iterative Prefiltering Frequency Estimates, An (U)
I Mathematical Analysis of (
Frequency Hopping
Games
Garbles
Jitter in a Digital Frequency Source (U)
Realization and Optimization of the Audio Frequency Microminiature Thin Film Band-Pass Filters (U)
Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer (U)
Hoopscotch (U)
Quick Check for Transposal Garbles, A (U)
I
Reference
Vol. XVIII, No. 1,Winter 1973
Vol. XVII. No. 1, Winter 1972
Vol. XVII, No. 2, Spring 1972
Vol. I, No. 1, April 1956
Vol. I, No. 2, July 1956
Vol. XXII, No. 3, Summer 1977
Vol. VIII, No. 2, Spring 1963
Vol. XIII, No. 4, Fall 1968 Special Mathematics and Engineering Issue, 1981- 1983
Vol. x x v , No. 4, Fall 1980
Vol. XII, No. 2, Spring 1967
Vol. IV, No. 2, April 1959 and Special Linguistics Issue
DOCID: 3020956 REF 1 ~ ~ ~ 3 9 8 5 9 8 [b):?)-F.L. 66-36 6
German Code
Keyword
German Air Force
Special Felix System, The (U) Kullback, Solomon
Title Author Reference
Germans I How the Germans Broke a U.S. Code (U)
r
Cryptanalysis in the German Air Force (U)
German COMINT
Germany
Vol. IV, No. 2, April 1959
German Radio Intelligence (U)
(0) :I) (b) (13)-50 USC 4C3 (h) [ . ? ) - I 5 iJS(: l ? F
[:,-E.L,. [?6-:6>
Cryptologic Fairy Tale, A Tiltman, John H., (Ul Brigadier
I GEE System - I, The (U1 Unknown
GEE System - 11, The (U) Unknown
GEE System - 111, The (U) Unknown
GEE System - IV, The (U) Unknown
Vol. IV, No. 2, April 1959
Vol. x x v , No. 4, Fall 1980
Fall 1960
GEE System - V, The (U) I - German Agent Systems of Lewis, Frank W. World War I ITSf '
Reading TUNNY (U) Campaigne, Howard H.
Groups
Vol. VII, No. 2, Spring 1962
Fall 1961
Vol. VII, No. 1, Winter 1962
Vol. VII, No. 2, Spring 1962
Vol. VII, No. 3, Summer 1962
Vol. VII, No. 4, Fall 1962
Vol. VII, No. 3, Summer 1962
Vol. VII, No. 4, Fall 1962
"TUNNY" Machine and Its Tiltman, John H., Spring 1961 Solution, The (U) Brigadier
Vol. XVI, No. 4, Fall 1971
Abstract Groups Defined by Sinkov, Abraham April 1960 Generating Operators (U)
DOCID: 3020956
Keyword
Hagelin Machines
HF Collection
History
Human Factors
IBM
IFF
Information Analysis
Information Management
Information Retrieval
I Title Author Reference J.
Automatic Crib-Dragging Device for Hagelin Machines, An (U)
Mickle-Muckle Principle in Hagelin Cryptanalysis, The (U)
CANDEW: A Methodology for Evaluating H F Collection Potential (U)
About NSA (U)
Application of Human Factors to the Specification and Design of Interactive Computer Systems (U)
Electrical and Magnetic Properties of Computer Tape (U)
Vol. I, No. 1, April 1956
Vol. IX, No. 4, Fall 1964
Vol. XXII, No. 3, Summer 1977
Vol.lv, No. 1, January 1959
Vol. XXIV, No. 4, Fall 1979
Vol. IX, No. 1, Winter 1964
IFF: A New Branch of 1 I Vol.11, No. 4. Cryptology (U) October 1957
Cybernetics and Problems of Callimahos, Diagnostics: the Parallels Lambros D. between Medicine and Cryptanalysis ( U )
Data Standardization and the Trace Factor (U) r Scientific a n d Engineering Information Management in the Department of Defense (L')
Association Factor in Information Retrieval, The ( U )
Information Storage and Retrieval (U)
Vol. XIV, No. 1,Winter 1969
Vol. XVI, No. 2, Spring 1971
Vol. X, No. 2, Spring 1965
Winter 1961
Vol. VIII, x o . 4, Fall 1963
Use of the B-Coefficient in I Vol. XIII, No. Information Retrieval, The 4, Fall 1968 (U)
DOCID: 3020956
Key word - -
Information Storage
Information Systems
Information Theory
Information Transmission
Intercept
Title
VIDEOFILE: A New Information Storage System
Six Characteristics of Information Handling Systems (U)
I
Information Theory and the Packing of Spheres (U)
Author Reference
Vol. XIII, No. 2, Spring
Vol. XIV, No. 1 I
3, Summer I
1969
Vol. IV, No. 2, April 1959
Some Applications of Kullback. Vol. I, No. 1 Information Theory (U) Solomon April 1956
Some Notes on Information 7 1 Theory (U) I Some Properties of the Two- State First-Order Mslrkov Chain (U)
CATNIP: Computer Analysis - Target Networks Intercept Probability (U) u
Communications Intelligence (U)
Determining Intercept Assignments (U)
Extending the Radio Horizon for Intercept Purposes by Using the Moon as a Reflector ( C )
Intercept System Analysis (U) I
Anonymous
Vol. IV, No. 1,January 1959
Vol. IX, No. 4, Fall 1964
Vol. XVI, No. 1, Winter 1971
Vol. 11, No. 2, April 1957
Vol. XII, No. 2, Spring 1967
Vol. X, No. 2, Spring 1965
Vol. XI, No. 2, Spring 1966
Interference and Intercept Gerson, Vol. XVI, No. (U) Nathaniel C. 1, Winter
1971 - Recording Techniques Vol. IX, No. Affecting Total Intercept= 1, Winter
Six Point Program for
I ( 1964
Cerson, Vol. VII, No. Improved Intercept (Part I) Nathaniel C. 3, Summer (u) 1962
DOCID: 3020956 -398598 - (b) ( 3 ) - P . L . 86-36
Keywords Title Author Reference
intercept Evaluation
Intercept Sites
Interpolation
Inventions
Ionosphere
JACQUARD Machine
Jamming
Japan
Japanese Language
Japanese Military
Key
Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer (U)
Verified Intercept Predictions (U)
Wideband and the SlClNT System (U)
Evaluating Intercept Techniques (U)
Time Coordination of SIGINT Sites (U)
Note on Univariant Interpolation (U)
Patent Matters and the Technical Employee (U)
How the Japanese Army Water Transport Code 2468 Was Broken (U)
Vol. XII, No. 1, Winter 1967
Vol. VIII, No. 4, Fall 1963
Vol. XI. No. 2, Spring 1966
Vol. X u , NO. 2, Spring 1967
Vol. 111, No. 4, December 1958
Vol. X, No. 3, Summer 1965
Study ofJapanese Nominalization, A (U)
Ionospheric Propagation (U) Cerson, Vol. 111, No. Nathaniel C., and 4, December -1 1958
Polar Ionosphere, The (U) Gerson, Summer 1961 Nathaniel C.
JACQUARD -A Yates Special Fast Algorithm Machine (U) Fourier Issue,
August 1973
( Don't Be Too Smart (U)
Tetrahedral Plugging (U)
Vol. x x v , No. 4, Fall 1980
Vol. XVIII, No. 4, Fall 1973
Vol. XXIII, No. 2, Spring 1978
January 1960
Vol. VIII, No. 2, Spring 1963
DOCID: 3020956 c8 ( b l ibi (11 131-50 USC 403 , , , . (b) ( 3 ) -ie USC 798 (b) :3)-P.L. 86-36
Keywords 1 Title Author Reference I
Key Generators
~ m b i n i n g Functions in Key I Generators (U)
Keywords
Vol. XXIV, No. 3, Summer 1979
Spring 1961
Keyword Recognition
Korean War
Whole New World of Speech, u Vol. XXI, No. A; Or, Maybe 1984 Will Be a 4, Fall 1976 Good Year After All! (U)
Language
Possible Applications of Gurin, Jacob Vol. XXII, Keyword Recognition in No. 1, Winter Voice Intercept (U) 1977
Report on the Keyword Kullback, Vol. IV, No. System, A (U) Solomon, and F. 3, Ju ly 1959
W. Lewis
na ysis o exlca eaning E n Across Cultures, An (U) u Book Review: Mechanical Campaigne, Resolution of Linguistic Ifoward H. Problems (U)
Computer Scripting (U)
Language and the COMlNT Production Process (U)
Language as a Bulk Commodity (U)
Language Levels and Cryptologic Jobs (U)
Vol. XXIV No. 1 Winter 1979
Vol. XIII, No. 4, Fall 1968
Vol. 111, No. 4, December 1958
Vol. XXIV, No. 1 Winter 1979
Vol. XVIII, No. 3, Summer 1973
Vol. XIX, No. 3, Summer 1974
Vol. XX, No. 3, Summer
1 1975
Vol. XV[II, No. 3, Summer 1973
DOCID: 3020956 REF ID:A398598 9
'(b) (3)-P.L. 86-36
Keywords Title Author Reference I , . . r
Language Problem a t NSA, u Vol. I, No. 1, The (U) April 1956
Language Acquisition
Language Aids
Language Dictionaries
Language Identification
Language Modeling
Lay man's Guide to the Gurin, Jacob Vol. XXIII, Mysteries of Linguistics, A No. 1, Winter (u) 1978
Linguistic Canonical Forms: n Vol. XIII, No. Tools for Analytic Progress 1, Winter IUI 1968 and
I I 1 Special u Linguistics Issue I1
Multilingual Codes (U) Vol. X, No. 4, Fall 1965
Nest of Dragons, A: The Curin, Jacob Voice Problem (U)
Under-Developed Languages, Under-Utilized Computers (Ul
Words and the Intelligence Gurin, Jacob Value of Conversations (U)
Investigations into Adult Language LearningIAcquisitions (U)
"Trots" in Foreign Language Study (U)
Problems of Meaning in Interlingual Dictionaries (U)
Note on the English VCCCC Pat tern or Maximum Post- Vocalic Consonant Clustering in Monosyllabic English Words, A (U)
Two New Language Models (U)
I
Vol. XXI, No. 1, Winter 1976
Vol. XX, No. 1, Winter 1975
Vol. XXIII, No. 2, Spring 1978
Vol. XXIV, No. 3, Summer 1979
Vol. 11, No. 1, January 1957 and Special Linguistics Issue
Vol. 111, No. 1, January 1958
Vol. XVII, No. 1, Winter 1972
Vol. XXIV, No. 3, Summer 1979
DOCID: 3020956
Keywords
Language Processing
Language Proficiency
Language Training
Latin Squares
Learning Machines
Library
Light Reading
Linear Prediction
Linear Recursions
Linguistics
1 Title Author Reference
Natural Languages (U)
Multichannel Language Processing as a System (U)
Contextual Testing in Establishing Minimum Working Level Language Proficiency (U)
Worldwide Language Problems a t NSA (U)
Special Council of Learned Organization Issue, 1972
Vol. XVII, No. 4, Fall 1972
Vol. x x v , No. 1, Winter 1980
Vol. XIII, No. 4, Fall 1968
Computer Generation of u Vol. X, No. 3, Unrelated Latin Squares (U) Summer 1965
Learning Machines (U) Jacobs, Walter Vol. 111, No. W. 3, July 1958
Learning Machines - Part I1 Jacobs, W. W. Vol. IV, No. (U) 2, April 1959
Library and the User, The Vol. XIII, No. (U) 2, Spring
1968
Learn with BOOK (U) Vol. XI, No. 3. Summer
Error Formula for Iterative Prefiltering Frequency Estimates, An (U)
Vol. XXII, No. 3, Summer 1977
Intuitive Exposition of Vol. XIII, No. Zierler's Method for Finding 1, Winter Linear Recursions, An (U)
Layman's Guide to the
I 1 1968 Gurin, Jacob Vol. XXIII,
Mysteries of Linguistics, A No. 1, Winter (u) 1978
Theoret lcal Linguistics and Language Universals (U)
I
Vol. XXII, No. 2, Spring 1977
REF ID:A398598 DOCID: 3020956
Keywords
Linguists
Literature
Logic
LVHF Collection
Machine Language
Machine Translation
Title Author Reference
Computers and Linguists Do Mix (U)
CY-600 View of Language, A (U)
Translation of a Classic: A Gurin, Jacob Vol. XI, No. Matter of Ethics, The (U) 2, Spring
1966
Vol. XVI, No. 3, Summer 1971
Vol. XVIII, No. 3, Summer 1973
Fundamentals of Majority Logic (U)
Tunnel Diode Dynamic Logic Module, A (U)
"Food for Thought" in LVHF Reception (U)
LVHF Propagation and Collection Techniques (U)
Vol. IV, No. 4, October 1959
Summer 1961
Vol. XX, No. 4, Fall 1975
Vol. XVI, No. 4, Fall 1971
TEMAC (Text Macro D'lmperio, Mary Vol. X, No. 3, Compiler): A Machine Summer 1965 Language for Processing and Text (U) Computer
and
Machine-Aided Translation - Where Is It Today?(U)
Machine Translation (U)
Information Science Issue
Vol. XVIII, No. 2, Spring 1973 and Special Linguistics Issue, I t
Vol. XII, No. 2, Spring 1967
Some Problems in the Field Salemme, Arthur Fall 1960 of Machine Translation J. orThe Case of the Volatile Mouses (U)
DOCID: 3020956
Keywords
Maintenance
Management
Manual Morse
Mapping
Mathematicians
Mathematics
I Title Author
Automatic Maintenance (U) Meyer, Joseph A.
Mechanization Systems and a New Look a t Management and Organization (U)
Operations Research in NSA (U)
Computer Transcription of Manual Morse (U)
ALRIGHT - A Map Overlay Generator (U)
Maps and the Conversion of Gauss-Kriiger Grid Coordinates (U)
Transverse Mercator Projection, The (U)
I Some of My Best Friends Are Lewis, Frank W. Mathematicians (U)
Application of Fourier Transforms to Combiners (U)
Approximations to the Distribution Function of Sums of Independent Identically Distributed Random Variables (U)
Art of Automatic Bearing Instrumentation, The (U)
Arithmetic of a Generation Principle for an Electronic Key Generator, The (U)
Arithmetic of the Addition Generation Principle for Electronic Key Generators (U
Reference
Vol. IX, No. 1, Winter 1964
Vol. VII, No. 2, Spring 1962
Vol. X, No. 1, Winter 1965
Vol. 111, No. 3, July 1958
Vol. XI, No. 2, Spring 1966
Vol. 111, No. 1, January 1958
Vol. XXIV, No. 4, Fall 1979
Vol. IV, No. 2,April 1959
Special Fast Fourier Transform Issue, August 1973
Vol. X, No. 2, Spring 1965
Vol. XVIII, No. 4, Fall 1973
Vol. 11, No. 1. January 1957
Vol. 11. No. 3, July 1957
DOCID: 3020956 -98598
;h)13)-P.L. 86-36
Keywords I Title
Arithmetic of the Linear Generation Principle for Electronic Key Generators, The (U)
Arithmetic of the Multiplication Generation Principle in the Koken Key Generator, The (U)
( Bar Statistics, The (U1
Bar Statistics, The (U)
Bayes Marches On (U)
"Binary" System for Complex Numbers, A (U)
Book Review: "How to Estimate Probabilities," (Journal of the Institute of Mathemat~cs and its Application) (U)
Author
Campaigne, Howard H.
Book Review: "Involutory Commutants with some Applications to Algebraic Cryptography, I" (Journal fur Reine und Angewande
Campaigne, Howard H.
Reference
Vol. 11, No. 4, October 1957
Vol. 11, No. 2, April 1957
Vol. VIII, No. 2, Spring 1963
Vol. VIII, No. 4, Fall 1963
January 1960
Vol. X, No. 2, Spring 1965 and Computer and Information
lences Sc ' Issue
Vol. XII, No. 2, Spring 1967
Vol. XII, No. 1, Winter 1967
Mathematik) (U)
Book Review: Mathematical n Vol. VII, No. Statistics (ti) 4, Fall 1962
Book Review: Recent Vol. VII, No. Literature on Algebraic Cryptography (U)
175
TOP Sk--
DOCID: 3020956
Keywords I Title Author Reference
Book Review: "Some Fall 1961 Applications of High Speed Computers to the Case n= 2 of Algebraic Cryptography," (Mathematics of Computation), Vol. 15, No. 75 (U)
Book Review: "Some Further Campaigne, Fall 1960 Methods in Algebraic Howard H. Cryptography"; (Journal of the Mitchell Scientific Society. No. 74) (U)
Classes of Rotors without
. n Vol. X, No. 4, Parallels ( U ) Fall 1965
Cluster Analysis: Introduction to Models and Methods (U)
Comparison of the Efficiency of Two Methods of Estimating Certain Time Parameters, A (U)
Composition of Boolean Functions I ( U )
Composition of Boolean Functions I1 ( U )
Continued Fractions and Mills' Algorithm ( U )
Convergence Techniques for Finding Linear Approximations (U)
Cooley-Tukey Fast Fourier Transform for Base 4 and Base 4 + 2 ( U )
Cosymmetric Approximations to Combining Functions (U)
Vol. XXII, No. 2, Spring 1977
Vol. IX, No. 2, May 1964
Special Fast Fourier Issue, August 1973
Special Fast Fourier Issue, August 1973
Vol. xxv, No. 3, Summer 1980
Special Fast Fourier Issue, August 1973
Vol. XVII, No. 4, Fall 1972
Vol. XVI, No. 4, Fall 1971
I Coupon Collecting and u Vol. XI, No. Cryptology ( U ) 4, Fall 1966
DOCID: 3020956
(b)l3)-P.L. 86-36
Keywords Title Author Reference
Cryptanalytic Applications of Sequential Analysis (ti)
Distribution of C bJ (u, 13, The (c')
Elements of Shift Register Cryptology (U)
Estimating the Number of Solutions in LCF (2)lnof a System of Equations over the Integers (U)
Euclidean Algorithm and Distances between Wheel Settings, The (U)
Exact Markoff Probabilities from Oriented Linear Graphs (U)
Fast Dynamic Programming Algorithm and Its Mathematical Basis, A (U)
Vol. IX, NO. 3, August 1964
Special Fas t Fourier Issue, August 1973
Vol. XVI, NO. 2, Spring 1971
Vol. VIII, No. 3, Summer 1963
Vol. VIII, NO. 1, Winter 1963
Vol. 11. NO. 3, J u l y 1957
Vol. XXI, No. 1, Winter 1976
Finding the Best-Scoring Jacobs. Walter Vol XIV, NO. Permutation (U) W. 4, Fall 1969
FIR: A CDC 1604 Program Vol. X, No. 1, for Solution of Systems of Winter 1965 Linear Equations (U)
Flattening Effect, The (U) Kullback, Vol. X, NO. 1, Solomon Winter 1965
Fourier Analysis on Finite Vol. XXI, No. Abelian Groups (U) 3, Summer
1976
Fourier Coefficients and Special Fas t Function Decomposition (U) Fourier Issue,
August 1973
Generating Function Vol. XXII, Approach to CRETAG, A (ti) NO. 1, Winter
1977
DOCID: 3020956 REF ID:A398598 9
Keywords I Title Author Reference
Geodetic Latitude and Altitude from Geoceatric Coordinates (U)
Geometric Approach to Waveform Recognition, A (U)
Graph Theory (U)
Hill Climbing (U)
How to Visualize a Matrix (U)
In ~ e n e r a l & { - x Converges
introduction to Computer Binary Arithmetic, An (U)
I Introduction to the Fast Fourier Transform, An (U)
Introduction to the Special Issue (U)
I JACQUARD - A Yates Algorithm Machine (U)
Labeled Oriented Graphs Which Are Onto (U)
Least Squares Analysis of a Probability Matrix, The (U)
Linear Approximation Attack on an Irregularly Stepping Key Generator, A (U)
Linear Approximations and the Degree of the Function (U)
Vol. XX, No. 1, Winter 1975
Vol. VIII, No. 2, Spring 1963
Vol. XII, No. 3, Summer 1967
I Vol. X, No. 4, Fall 1965
Vol. VIII, No. 3, Summer 1963
Vol. XII, No. 1, Winter 1967
I Vol. 111, No. 2, April 1958
Special Issue, January 1971
I Special Fast Fourier Issue, August 1973
Special Fast Fourier Issue, August 1973
I Vol. X, No. 1, Winter 1965
Vol. IV, No. 1, January 1959
Special Fast Fourier Issue, August 1973
( Special Fast Fourier Issue, August 1973
DOCID: 3020956 REF ID:A398598
Keywords Title
I Linearly Induced Nonlinear ( Cycles $1
I List of Properties of Bayes- Turing Factors, A (U)
Long and Short of Single Transpositions, The (U)
Low Weight Linear Recursions in Key (U)
I Product Sequences I1 (U) I Markov Chain -The Models with the Short Memories (U)
Mathematics and Computers in Cryptanalysis (U)
Matric Recursions (U)
Matrix Business: Part 11, This (U)
Modified Normal Curves (U)
Note on Curve Fitting, A (U)
Note on "Logarithmic Scoring and Preliminary Testing" (U) I
Author Reference
ourier Issue, ugust 1973
Vol. XXII, No. 4, Fall
Vol. X, No. 2, Spring 1965
Vol. XXI, No. 2, Spring 1976
Vol. VIII, No. 1, Winter 1963
Vol. XX, No. 4, Fall 1975
Vol. XVII, No. 1, Winter 1972
Special Council of Learned Organization Issue, 1972
I Vol. XXII, No. 3, Summer 1977
Vol. 111, No. 3, July 1958
Spring 1961
I Vol. XIII, No. 4, Fa11 1968
I Vol. 11, No. 4, October 1957
DOCID: 3020956
Keywords Title
Note on Product Sequences, A (U)
On an Algorithm for Approximate Polybit Raring Using Fourier Transforms (U)
On the Minimization of Integer Quadratic Forms over Nonzero Integer Vectors (U)
On Understanding the Null Hypotheses of Test Statistics (U)
Optical Fourier Transform and Periodic Phenomena (U)
Order Statistics for Cell Counts (U)
Parity a s an Operation Checking Code (U)
Processes for Random and Sequential Accessing in Dynamic Memories (U)
Random and Algebraic Coverings of Binary Vectors (U)
Remarks concerning Substantialization (U)
Roughness of Visitations in a Markov Chain, The (U)
Author Reference
Vol. XVI, No. 2, Spring 1971
Special Fast Fourier Issue, August 1973
Vol. XXV, No. 1, Winter 1980
Vol. VIII, No. 4, Fall 1963
Vol. XVIII, No. 3, Summer 1973
Vol. XXIII, No. 4, Fall 1978
Vol. VIII, No. 3, Summer 1963
Vol. XXII, No. 4, Fall 1977
Vol. XXIII, No. 3, Summer 1978 and Special Mathematics and Engineering Issue, 1981- 1983
Vol. IX, No. 4, Fall 1964
Vol. VIII, No. 2, Spring 1963
DOCID: 3020956 ' P n P g 8 5 9 8
l~l(3)-l.L. 46-36
Keywords Title Author Reference
Scoring Function and Its Vol. XIII, No. Distribution, A (U) 4, Fall1 968
Sequential Least Squares Vol. XII. No. Estimates (U) 2, Spring
1967
Setwise Transitive Groups Vol. X, No. 2, (U) Spring 1965
Simple Test for Slide or Kick, Vol. VIII, No. A (UI 4, Fall 1963
Slow Look a t Fast Special Fast Transforms, A (U) Fourier Issue,
August 1973
Some Formulas concerning Special Fast Bulges of Combining Fourier Issue, Functions (U) August 1973
Some Properties of Sample Special Fast Bulges (U) Fourier Issue,
August 1973
Spectral Analysis and the Vol. XIV, No. Fast Fourier Transform (U) 1, Winter
1969
Strategy for Program Vol. XXII, Decomposition for a No. 4, Fall Distributed Pipeline, A (U) 1977
Strength of the Bayes Score, Vol. XVII, The (U) No. 1, Winter
1972
Survey of Bent Functions, A Special Fast (U) Fourier Issue,
August 1973
Survey of Multinomial Vol. XX, No. Estimation for Code 3, Summer Weighting, A (U) 1975
Symmetric Approximations Vol. XIX, No. to Boolean Functions (U) 3, Summer
1974
Tail Probabilities for the Vol. VIII, No. Binomial Ilistribution (U) 3, Summer
1963
DOCID: 3020956
Memory
Keywords
Tutiog's Contributions to Cryptology (ti)
Messages
Midway
Military
Variable-Length Output ~ t r i n d - ] ~ m w
Variance of the Number of Ones in a Derived Stream of Zeros and Ones (U)
Way the Ball Bounces,The : An Experiment in Deconvolutipn Filtering (U)
Assignment of Storage Space in Rapid-Access Memory Systems (U)
I CAM 11 (U)
Content - Addressed Memories (U)
Author
- Data Structures and Their D'Imperio, Mary Representation in Storage: Part I (U)
Reference 1 I
Vol. VIII, No. 3, Summer 1963
Vol. XXI, No. 4, Fall 1976
Vol. XII. No. 2, Spring 1967
Special Issue, January 1971
Vol. 11, No. 2, 1 April 1957
Vol. IX, No. 1, Winter 1 1964
Vol. IX, No. 3, August 1964
Data Structures and Their D'lmperio, Mary Vol. IX, No. Representation in Storage: 4, Fall 1964 Part I1 (U)
Magnetic Core Memories (U) Vol. 11, No. 1, ElJ anuary 1957 "It Is Obvious That . . .": A Lewis, F. W. Vol. 111, No. Painless Approach to 2, April 1958 Cryptanalytic Diagnosis (U)
Midway and Yamamoto: Properly Revisited (U)
Vol. XIII, No. 3, Summer 1968
Book Reuiew: Military Campaigne, Vol. IV, No. Cryptanalytics, Part I1 (U) Howard H. 4, October
1959
DOCID: 3020956
Keywords
Military Addresses
Military Linguists
Missile Radiation
Missile Trajectory
Modems
Modulation
Monoalphabetic Substitution
Morse
I Titte Author Reference
Correlation of Frequency of Vol. XVII, Appearance of Military Unit No. 3, Addresses to Unit Echelon Summer 1972 and Combat Readiness Status (U)
Employment of Military Gurin, Jacob Vol. XIII, No. Linguists (U) 4, Fall 1968
and Special Linguistics Issue, I1
I Intercept of USSR Missile Gerson, Vol. IV, No. Transmissions (U) Nathaniel C. 3, July 1959
Missile Trajectories (U) Vol. 11, No. 1, January 1957
Notes on Missile Terminal Ballistics (Soviet) (U)
Vol. IX, No. 1, Winter 1964
Wireline Modem with Harmonic Distortion Equalization, A (U)
Cipher Signal Phase Modulation (U)
Target in Space, A (L')
De Profundis; or the ABC of Callimahos, Depth Reading (U) Lambros D.
Vol. xxv, No. 2, Spring 1980 and Special Mathematics and Engineering Issue, 1981- 1983
Vol. XIV, No. 2, Spring1969
Special Council of Learned Organization Issue, 1972
Design and Implementation of a Digital Demodulator for Use against On-Off Keyed Signals, The (U)
Vol. 11, No. 1, January 1957
Vol. XXIII, No. 2, Spring 1978
( b ) (1) lb) (3)-50 USC 103 1b)(33-18 USC 798 (b) (3)-P.L. 86-36
DOCID: 3020956 T a -98 OGA (b) ( 3 )
Keywords
Morse Code
Morse Translators
Networking
Noise
North Vietnam
NSA
Oceanography
On-Line Processing
On-Line Systems
One-Time Pads
Operating Systems
Operations
I Title
Automatic Acquisition and Translation of Hand-Keyed Morse Code (U)
Development of High Speed Automatic Morse Translators, The (U)
Community Impacts on NSA Systems (U)
Author Reference &
Val. XXIV, No. 1, Winter 1979
Vol. I, No. 1, April 1956
Vol. XXIII, No. 3, Summer 1978
Interference and Intercept Gerson, (U) Nathaniel C
Noisy Pluggings (U)
Weather or Not - Encrypted? (U) 1
Vol. XVI, No. 1, Winter 1971
Vol. 111, No. 2, April 1958
Vol. XII, No. 4, Fall 1967
About NSA (U) Vol. IV, No. I , January 1959
Report of the Second Various Vol. XIX, No. Computer Study Group (U) 1, Winter
1974
SlGlNT Implications of Meyer, Joseph A. Vol. XI[, No. Military Oceanography (U) 4, Fall 1967
CRISP1 (U) n Vol. X, No. 1, Winter 1965
Problem Solving with On- u Special line Systems (U) Council of
Learned Organization Issue, 1972
New Approach to the One- Vol. XIX, No. Time Pad, A (U) 3, Summer
Privacy and Protection in
1971
Vol. XVIII, Operating Systems (U) No. 2, Spring
Operations Research in NSA i (U)
Vol. X, No. 1, Winter 1965
DOCID: 3020956
Keywords
Operators
Optical Receiver
Optics
Orbits
Patents
Pattern Recognition
Personnel
Phase-lock oscillators
Pattern Recognition (U1 Jacobs, Walter W.
Rotation Problem in Pattern Recognition, The (U)
Title Author Reference
Abstract Groups Defined by Sinkov, Abraham April 1960 Generating Operators (U)
Optical Receiver, The (U)
El Vol. XIII, No. 2, Spring 1968
Integrated and Guided Wave Special Optics andDevice Mathematics Applications (U) and
Engineering Issue, 1981- 1983
Intercept and Gerson, Vol. XX, No. Electromagnetics (U) Nathaniel C. 2, Spring
1975
Selection and Placement of Cryptanalytic Personnel (U) I
Linear and Quadratic Electro-Optic Effects (Pockels and Kerr Effects) (U)
Determination of Missile and Earth Satellite Trajectories from Radar Observations (U)
Patent Matters and the Technical Employee (U)
Introduction to Statistical Pattern Recognition (U)
Introduction to Electronic Phase-Lock Oscillators, An (U)
Vol. IX, No. 4, Fall 1964
April 1960
Vol. X, No. 3, Summer 1965
Vol. XXII, No. 3, Summer 1977
Winter 1961
and Special Mathematics and Engineering Issue, 1981- 1983
Vol. VII, No. 1, Winter 1962
1 Fall 1960
Vol. VIII, No. 2, Spring 1963
DOCID: 3020956
I Polar Ionosphere, The (U) Gerson, Nathaniel C.
Thin Film Thermocouple (LT)
Use of OpticaI Density Measurements of Thin Films to Determine Vapor Distributions, The (U) n
Key words
Physics
Summer 1961
Vol. VII, No. 4, Fall 1962
Title Author Reference
Vol. VIII, No. 3, Summer 1963
Analysis of Thin Film Germanium Epitaxially Deposited onto Calcium
Plain Text
Vol. VIII, No. 2, Spring 1963
Planes
PRC
Fluoride (U)
Privacy
Probability
Probability Theory
Analysis of Digital Plaintext Callimahos, Vol. XIV, No. Autokey Systems, The (U) Lambros D. 2, Spring
1969
Distribution of Letters in Vol. XIV, No. Short Messages of English, 2, Spring1969 The (U) Campaigne
Optimum Use of Log Weights (U)
IFF: A New Branch of Cryptology (U)
"Maybe It's Related to the Phase of the Moon" (U)
ABC of Cifax, The (U)
Privacy and Protection in Operating Systems (U)
Entropy of German, The (U)
Distribution of the Maximum Bulge in a Flat Random Binary Stream, The (U)
Book Reuiew: Modern Probability Theory and Its Applications (U)
Vol. IX, No. 3, August 1964
Vol. 11, No. 4, October 1957
Vol. XVII, No. 4, Fall 1972
Vol. I, No. 2, July 1956
Vol. XVIII, No. 2, Spring 1973
Vol. I, No. 2, Ju ly 1956
Vol. VII, No. 4, Fall 1962
, Fall 1960
PURPLE Machine
, b ~ ( 3 - 4 . L . 86-3h
(b) ( 3 ) - F ' . L . 86-3b
Keywords
Problem Solving
Processing
Programming
Pulses
Title Author Reference
Bsok Review: Probability: An Introduction (U)
Problem Solving with On- line Systems (U)
ABC of Ciphony, The (U)
FUZZY: An Evolutionary Model for Data Structures (U)
Programming Concepts for Verification and Security (U)
Fall 1960
Special Council of Learned Organization Issue, 1972
Vol. I, No. 2, July 1956 and Special Linguistics Issue
vol. XXIV, No. 3, Summer 1979
Vol. XXII, No. 4, Fall 1977
Application O ~ O t h s e r i o , Mary Vol XXIV, Voynich Manuscr~p , An ( No. 2, Spring
1979
Cold-Cathode Counter Tube Studv, A (U)
Error in a Capacitor-Type Totalizer (U)
Subnanosecond Instrumentation (U)
Vol. XXIV, No. 3, Summer 1979
Vol. XIX, No. 4, Fall 1974
Vol. 111, No. 4, December 1958
Vol. 111, No. 4, December 1958
Vol. IX, No. 1, Winter 1964
Solution of the Japanese Friedman, Vol. XIX, No. "PURPLE" Machine, The (U) William F. 1, Winter
1974
Keywords I Title Author Reference
Qualification Standards
Queues
Queuing Theory
Radio
Radio Intercept
Radio Waves
Randomization
Random Variables
Receivers
Reciprocal Alphabets
Recording
Language Levels and Cryptologic Jobs (U)
Computers and Queues (U)
Application of Queuing Theory to Camputer Systems An (U)
Digitizer Queuing Model for FROSTING (L')
Did Alexander Popov Invent Radio? (U) I I One Model for an Artificial Ionosphere (U)
Antipodal Propagation [U) Gerson, Nathaniel C.
Randomization Made to Order: "Random Numbers Are Too Important to be Lefi to Chance" (U)
Approximation of Central Limits
Receiving System Analysis (U)
Reciprocal Alphabets and Kullback, Friedman Squares (U) Solomon
Electron Beam Recording for Wideband Analog Signals (U)
Introduction to Magnetic Tape Recording and Its Use in Intercept Activities, An (U)
Vol. XVIII, No. 3, Summer 1973
January 1960
Vol. XIV, No. 2, Spring 1969
Vol. XIV, No. 4, Fall 1969
Vol. XI, No. 2, Spring 1966
Vol. IV, No. 1, January 1959
Special Council of Learned Organization Issue, 1972
Vol. IV, No. 4, October 1959
Vol. X, No. 1, Winter 1965
Vol. 111, No. 1, January 1958
Vol. XIV, No. 3, Summer 1969
Vol. I, No. 3, October 1956
DOCID: 3020956
Rocket Motion I Rocket Motion and Newton's Fall 1960 Second Law (U)
Keywords
Rosetta Stone Rosetta Stone and Its Callimahos, Vol. XVI, No. Decipherment, The (U) Lambros D. 1, Winter
1971
Title Author Reference
Russian
Recording Techniques Affecting Total Intercept
This Is a Recording? (t')
Reporting
Research
Russian Grammar
Russian Language
Vol. IX, NO. 1, Winter 1964
Vol. XVIII, No. 2,Spring 1973
COMINT Analysis and Reporting 17 Vol. XVII, on the Developing Nations (U) No. 2, Spring
1972 (b) (1, (b) (3) -50 USC
Library and the User, The (U) Vol. XIII, No. 4 0 3 2, Spring (b) ( 3 , -18 usc 1968 7 9 8
(b) ( 3 ) - P . L . Research a t NSA (U) Campaigne, Val. XIII, No. 6-36
Howard H. 2, Spring 1968
Can We Lick the Voice Problem. n Vol. XVII, (U) No. 3,
Summer 1972
Computer, There Is Thy Sting! Salemme, Arthur Vol. XVI, No. (u1 J . 4, Fall 1971
Tour of Same Russian Salemme, Arthur Vol. XIV, No Translation Traps, A (U) J. 4, Fall 1969
7 The Case for Bad Grammar I Vol. IX, No. (u) 2, May 1964
and Special Linguistics Issue
I Are the Russir~ns Gaining Salemme, Arthur Spring 1961 Wordwise? IC )
--
DOCID: 3020956
Title
Characteristic Features of the Russian Language of the Last Decade (U)
Few Tricks of the Trade for the Translator of Russian, A (U)
Russian Navy Codes
Russian Translation
Russian Transliteration
Sampling
Satellite Tracking
Satellite Trajectory
Science
Science and Technology
Security
I Language Files; A Basic COMINT Aid (U)
Author Reference
Salemme, Vol. XI, No. Arthur. J. 4, Fall 1966
Salemme, Arthur Vol. IV, No. 2 J. April 1959
Spoken Russian: The Other Girvan, William Vol. XIV, No. Grammar (U) H. 3, Summer
1969
Russian Diamond, A (U) Vol. XII, No. 2, Spring 1967
PPM Telemetry Simulator (U) Fall 1960
"False Friends" of the Vol. XVI, No. Translator in the English and 4, Fall 1971 Russian Languages: A Translation from the Russian of V. V. Akulenko (U)
Handle With Care: Russian Salemme, Arthur Vol. XII, No. Transliteration (U) J. 4, Fall 1967
Random Walks with l-l Vol. 111, No. Restraining Barrier as Applied 2, April 1958 to the Biased Binary Counter (U)
Times of Shadow Passage for u Vol. VIII, No. Earth Satellites (U) 3, Summer
1963
Maximum Likelihood Vol. XIII, No. Estimation of a Trajectory and 1, Winter Its Variance (U) 1968
Science and Cryptology (U) Engstrom, Vol. 111, No. Howard T. 3, July 1958
Soviet Science and Technology Sinkov, Abraham Vol. IV, No. Present Levels and Future 1, January Prospects (U) 1959
Vol. XI, No. 1, Winter 1966
DOCID: 3 0 2 0 9 5 6 3 9 8 5 9 8
Shift Registers
Keywords
SIGINT Collection and Processing
SIGINT Productivity
Title Author Reference
Security Architecture in SIGINT Collection and Processing (U)
Narrow-Band Speech Security (U)
Combining Functions in Key Generators (U1
Cycles from Nonlinear Shift Registers (U)
Vol. 111, No. 4, December 1958 and
Perpetuation of Bias in Shift Register Devices (U)
Special Linguistics Issue
I Need for System Approach, The
Meyer, Joseph A,. Vol. XX, No. Jr . 1, Winter
1975
Spring 1961
Special Mathematics and Engineering Issue, 1981- 1983
Vol. XIV, No. 4, Fall 1969
Vol. VII, No. 2, Spring 1962
Vol. XXV No. 3, Summer 1980
Meyer, Joseph A. Vol. XI, NO. 1, Winter 1966
Selected SlClNT Intelligence Tordella, Louis Vol. XIX, No. Highlights (U) W 4, Fall 1974
1 SrCINT System Logic (u) Unknown
Trade-off Approach to Quality Intercept versus Quantity Intercept, A (U)
Third Revolution: Prospects for Continued SIGINT Productivity, The (U)
Vol. X, No. 2, Spring 1965
Vol. XXIII, No. 1, Winter 1978
Vol. XIII, No. 3, Summer 1968
REF IDzA398598
Keywords Title Author Reference
SIGINT Reporting Trends, Developments, and Oliver, Donald B. Vol. XXI, No. Pressures in SICINT Reporting 1, Winter Today (U) 1976
UTIL of English: A Study of the Vol. XVII, Quality of SICINT Product (U) No. 4, Fall
1972
Signal Analysis Vol. IX, No. 2, May 1964
i
Signal Identification Automatic Signal Identification Special Issue, January 1971
Use of Special Identification Vol. XII, No. Techniques (SIT) in the SQlution 4, Fall 1967 of Specific SICINT Problems, The (U)
Signal Processing MICROCOMPUTER: General- Vol XXII, Purpose Signal Process, The (U) No. 2, Spring
1977
UNNA - An Introspective Signal Vol. XX, No. Processor (U) 2, Spring
1975
Signal Theory Generalizations of "Maximum- Vol. XXIV, Entropy" (Pattern) Analysis (C) No. 2, Spring
1979
Signal-to-Noise Ratio Another Derivation of Binary Vol. X, No. 3, Error Rates as a Function of Summer 1965 Signal-to-Noise Power Ratio for Various Modulation Schemes (U)
ARC of Ciphony, The (U) Vol. I, No. 2, July 1956 and Special Linguistics issue
Ambiguity Reduction by Vol. XVI, No. Markov Analysis of TEMPEST 1, Winter Signals (U) 1971
Signals
DOCID: 3020956 REF ID:A398598
Keywords Title -
Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System (U)
Collection of LlNCOMPEX Signals (U)
Design and Implementation of a Digital Demodulator for Use against On-Off Keyed Signals, The (U)
Electron Beam Recording for Wideband Analog Signals (U)
Evaluating Intercept Systems (U)
Experimental Approach to a n Environment Study in the HF Band (U)
Extending the Radio Horizon for Intercept Purposes by Using the Moon a s a Reflector (U)
Investigation of Techniques for the Analysis of the M-803-3 Vocoder (L')
Mathematical Modeling of TEMPEST Channels (U)
Multipath Differential Doppler Data (U)
Recovery of Pre-Detection Signals in the Optical Receiver (U)
Representation of Signals on Orthonormal Bases, The (U)
Response of a Non-Linear Device to an Emitter Environment in the High Frequency Spectrum, The (U)
Author Reference
'01. x l l , s o . , Fall 1967
'01. XVII, lo. 2, Spring 972
701. XXIII, lo. 2, Spring 978
101 XIV, No. , Summer 969
701 IX, No. ., Fall 1964
'01. VIII, No. , Fall 1963
rol. X, NO. 2, $ring 1965
701. XX, No. , Fall 1975
701. XVI, No. , Summer 97 1
101. XXI, No. , Summer 976
Tot. XIII, No. ., Fall 1968
'01. IX, No. , Winter 964
101 VIII, No. 1, Winter 1963
DOCID: 3020956
Keywords
Signals Analysis
Signals Processing
Title Author - - -
Spread Spectrum System Jamming Response (U)
Study of Hourly Correlation of Trans-Horizon VHF-UH F Signals and Meteorological
I Conditions (U)
Correlation and Power Spectra of Randomly Sampled and Held Signals (U)
Frequency Analysis of a Set of HarmonicaIIy Related Tones (U)
Reference Patternsfor Nearest Neighbor Rule (U)
Integrated and Guided Wave Optics and Device Applications (U)
Teletype Processing in the FROSTING System (U)
Software I Designing Secure Reliable Software - A Methodology (U)
Signals Trends
FUZZY: An Evolutionary Model for Data Structures (U)
COMINT Signals Trends 7SX%(iM
Programming Concepts for Verification and Security (U)
Reference
Vol. XXII, No. 3. Summer 1977
Vol. XIV, No. 2, Spring 1969
Vol. XIV, No. 2, Spring 1969
Vol. XVI, No. 1, Winter 1971
Vol. XXII, No. 1, Winter 1977
Special Mathematics and Engineering Issue, 1981- 1983
Vol. XVIII, No. 2, Spring 1973
Vol. x x v , No. 2, Spring 1980
Vol. XXI, No. 1, Winter 1976
Vol. XXI, No. 4, Fall 1976
Vol. XXIV, No. 3, Summer 1979
Vol. XXII, No, 4, Fall 1977
DOCID: 3020956 'P -598
Keywords I Title
Software Maintenance Software Maintenance -The I Other Side of Acquisition (U)
Software Acquisition Work Breakdown Structure: A Better Implementation to Manage Software Overruns (U)
Software Support
Software Engineering
South America
Program Complexity Measure, A (U)
Soviet
( i s (11 (h; ;3) -5-1 lJ:;(: 41-13 (hj (-:)-I? U6C 73U
CAPER Software Support System, The (U)
Author Reference
Vol. xxv, No. 4, Fall 1980
Vol. XXIII, No. 3, Summer 1978
Vol. XXI, No. 4, Fall 1976
I
Vol. XXII, No. 2, Spring 1977
Human-Machine Interfaces for D'Imperio, Mary Vol. XXIV NSA Computer Systems (U) E. No. 4 Fall
1979
I German Agent Systems of Lewis, Frank W. World War II-CG)
CAPER Software Support System, The (U)
Database Services (U)
I Example of Substantive Analysis, An (U)
Investigation of Techni ues for lhTYz9, Soviet Communications Journals as Sources of Intelligence (u) U
Vol. VII, No. 3, Summer 1962
Vol. XXII, No. 2, Spring 1977
Vol. XII, No. 1, Winter 1967
Vol. XI, No. 3, Summer 1966
Vol. XX, No. 4, Fall 1975
Vol. IX, No. 3, August 1964
Soviet Science and Technology; Sinkov, Abraham Vol. IV, No. Present Levels and Future 1, January
1959
Soviet Leadership Vol. XXV No. 4.Fall 1980
Soviet Navy Soviet Navyod 1 Vol. XVI, No. A COMSEC 4, Fall 1971
'I'urnlng Polnt (U
DOCID: 3020956
Keywords I Title Author Reference
Soviet Telemetry Computer Processing of Soviet Telemetry (U)
Soviets
Space Flights
Spanish Cryptography
Spanish Language
10)(3)-50 USC 403 lb) (3)-18 USC 798 ib)(3)-P.L. 86-36
Role of Carrier (VCh) Telephony in Soviet World War I1 Strategic Communications (U)
Spacecraft Passenger Television from Laika to Gagarin (U)
Book Review: TRATADO DE CRrPToCRAFIA (U)
I Anglicisms in Puerto Rico (U) I
Vol. XIX, No. 3, Summer 1974
Vol. XXI, No. 2, Spring 1976
Vol. XI, No. 2, Spring 1966
Speaker Identification
Speech
Speech Privacy
Speech Scanning
Spread Spectrum
Sputnik
Stirling Numbers
Vol. XIII, s o . 1, Winter 1968
Vol. XIV, No 4, Fall 1969
Vol. XVIII, No. 1,Winter 1973
Vol. VII, No. 4, Fall 1962
Vol. XX, No. 4, Fall 1975
Vol. XXV No. 1 Winter 1980
Vol. XXII , No. 3, Summer 1977
Vol. 111, No. 2, April 1958
Vol. 111, No. 1, January 1958
DOCID: 3020956 REF ID:A398598
Keywords
Storage
Strategic Warning
Switching Systems
Tape Management
Tape Storage
Technical Intelligence
Telecipher Analysis
Telemetry Processing
Teleprinter Cipher Analysis
TEMPEST
Reference
Vol. I, No. 3, October 1956
Vol. I., No. 1, April 1956
Vol. XVIII, No. 3, Summer 1973
Vol. 11. No. 3, July 1957
Vol. X, No. 4, Fall 1965
Vol. XXII, No. 1, Winter 1977
Vol. XXI, No. 3, Summer 1976
Vol XII, No. 3, Summer 1967
Vol XX, No. 3. Summer 1975
Vol. I, No. 1, April 1956
Vol. XVI, No. 1, Winter 197 1
Vol. XII, No. 4, Fall 1967
Vol. XVI, No. 3, Summer 1971
Vol. XIV, No. 1, Winter 1969
Title
Deposited Films - Magnetic Elements for the Memory of the Future (U)
On Operatorless Computers (U)
Strategic Warning. An Intelligence Gap that NSA Might Fill (U)
Development of Automatic Telegraph Switching Systems (U)
Management of Magnetic Tape 7f3-
Measurement of Insecurity for Imperfect Erasure, A (U)
Drawing to a Straight Flush - A Study in Technical Intelligence (u)
Climbing Jacob's Ladder (U)
Genesis of Mobile Magoo, The (U)
Simplified Exposition of a New Cycle Search Technique (L')
Ambiguity Reduction by Markov Analysis of TEMPEST Signals (U)
Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System (U)
Mathematical Modeling of TEMPEST Channels (U)
TEMPEST Considerations in Automatic Data Processing Equipment Installations (U)
Author
DOCID: 3020956
Keywords I Title
Testing Contextual Testing in Establishing Minimum Working Level Language Proficiency (U)
Thin Film Analysis Introduction to the Methods of Thin Film Analysis, An (U)
Traffic
Traffic Analysis
Training
Transcription
Transistors
Translation
I Introduction to Traffic Analysis (U)
Net Reconstruction - A Basic Step in Traffic Analysis (U)
Some Thoughts concerning Traffic Analysis Mechanization (U1
Traffic Analysis on Soviet Data Transmission (U)
I What is Good Traffic Analysis?
Systems Approach to Training Radiotelephone Technicians, The (U)
Computer Transcription of Manual Morse (U)
Analysis of a Transistor Monostable Multivibrator (U)
CAMINO (U)
Computer, There Is Thy Sting! I (U) I Few Tricks of the Trade for the Translator of Russian, A (U)
Author
Chatter Patterns: A Last Resort (U)
Cleaning the Augean Stables or How Much TA Can a Computer Do? (U)
Reference
Vol. xxv, No. 1, Winter 1980
Summer 1961
Vol. 11, No. 4, October 1957
Vol. XIII, No. 3, Summer 1968
Callimahos, Vol. 111, No. Lambros D. 2, April 1958
n Vol. 111, No. 3, Ju ly 1958
Vol. XI, No. 3, Summer 1966
Vol. XIII, No. 1, Winter 1968
Vol. XXIV, No. 4, Fall 1979
Vol. XVIII, No. 1,Winter 1973
Vol. 111, No. 3, July 1958
Vol. IV, No. 3, July 1959
Vol. XII, No. 3, Summer 1967
Salemme, Arthur Vol. XVI, No. J. 4, Fall 1971
Salemme, Arthur Vol. XI, No. J . 4, Fall 1966
DOCID: 3020956 REF ID:A398598
Keywords
Translation Errors
Transmission
Transmitters
Turing Machine
VHF Intercept
Video
Viet Minh Cover Terms
Title
Freedom in Translation (U) I
Mechanical Translation (U)
Mokusatsu: One Word, Two Lessons (U)
Some Contributions towards a Course in COMINT Translation t U)
Author Reference - -
Vol. XXI, No. 3, Summer 1976
Vol1, No. 1, April 1956
Vol. XIII, No. 4, Fall 1968 and Special Linguistics Issue, I1
Vol. XVI, No. 3, Summer 197 1
Tour of Some Russian Salemme, Arthur Vol. XIV, No. Translation Traps, A (U) J . 4, Fall 1969
Translation of a Classic: A Matter of Ethics, The (U)
Chaco: A Horrible Example (U)
Data Transmission over Telephone Circuits (U)
Gurin, Jacob Vol. XI, No. 2, Spring 1966
Vol. XVIII, No. 3, Summer 1973
Vol. IV, No. 1, January 1959
Antipodal Propagation (U) Gerson, Vol. IV, No. Nathaniel C. I, January
1959
Insolvable Problem, An (U)
Factors Affecting Required Antenna Gain in VHF Intercept (U)
VIDEOFILE: A New Information Storage System (U)
Jacobs, Walter W.
Vol. VIII, No. 3, Summer 1963
Vol I., No.3, October 1956
Vol. XIII, No. 2, Spring 1968
Viet Minh Cover Terms and Caddy, David W. Vol. IV, No. Their Solution (U) 3, July 1959
and Special Linguistics Isssue
DOCID: 3020956
Ib) ( 3 ) - F . L . 86-56
Keywords I Title
Vocabulary
Vocoders
Vietnam
Thrusts and Boggles of Outrageous Escalation, The: A V O C A B U U R Y SURVEY ATTHE NATIONAL WARCOLLEGE (U)
Project EXPLORER (U)
Some Recent Vocoder Studies a t the National Security Agency
Voice Intercept
Voice Problem
Voynich Manuscript
Waveform Recognition
Author Reference
Vol. XVI, No. 2, Spring 1971
! Vol. XIII, No. 2, Spring 1968
Vol. XIII, No. 2, Spring 1968
Vol. XII, No. 4, Fall 1967
1 Learned Organization Issue, 1972
Possible Applications of Gurin, Jacob Vol. XXII, Keyword Recognition in Voice No. 1, Winter Intercept (U) 1977
Nest of Dragons, A: The Voice Gurin, Jacob Problem (U)
Application of Cluster Analysis D'lmperio, Mary and Multidimensional Scaling E. to the Question of "Hands" and "Languages'yn the Voynich Manuscript, An (U)
Application o ( l o the D'Imperio, Mary Voynich Manuscript, An (U) E.
Voynich Manuscript Revisited, The (U)
Voynich Manuscript, The: "The Tiltman,.John H. Most Mysterious Manuscript in Jr . , Brigadier the World" (U)
So You Want to Correlate (U)
Vol. XXI, No. 1 , Winter 1976
Vol. XXIII, No. 3, Summer 1978
Vol. XXIV, No. 2, Spring 1979
Vol. XXI, No. 3, Summer 1976
Vol. XII, No. 3, Summer 1967 and Special Linguistics Issue I1
Vol. X, No. 2, Spring 1965
DOCID: 3020956 -8598
Keywords
Waves
Weather
Working Aids
Writing
Wullenweber Systems
Title Author Reference - -
Error in a Capacitor-Type rotalizer (U)
Weather: Its Role in Communications Intelligence [U)
Computer Scripting (U)
Curiosa Scriptorum Sericorum: To Write But Not to Communicate (U)
U. S. Program in Direction Finding, A (U)
Gerson, Nathaniel C
Vol. 111, No. 4, December 1958
Vol. 111, No. 3, July 1958
Vol. XXIV, No. 1 Winter 1979
Vol. XVI, No. 3, Summer 197 1
Vol. X, No. 2, Spring 1965
(b) ( 3 ) - P . L . 0 6 - 3 6