Declassification Initiatives
Cryptologic Quarterly Articles
>> Back to List
- Disclaimer
- John H. Tiltman: A Reminiscence - Summer/Fall 1982-Vol. 1, Nos. 2-3
- Computer Virus Infections: Is NSA Vulnerable? - Fall 1985-Vol. 4, No. 3
- The Origination and Evolution of Radio Traffic Analysis: The World War I Era - Spring 1987-Vol. 6, No. 1
- What Every Cryptologist Should Know About Pearl HarborSummer 1987 - Vol. 6, No. 2
- Influence of US Cryptologic Organizations on the Digital Computer Industry - Fall/Winter 1987-1988 Vol. 8, Nos. 3-4
- Third Party Nations: Partners and Targets - Winter 1989 - Vol. 7, No. 4
- Meteor Burst Communications: An Ignored Phenomenon? - Fall 1990 - Vol. 9, No. 3
- Geographic Information Systems - Fall/Winter 1991 – Vol 10, Nos. 3-4
- DOS/UNIX Interoperability and Email in the Agency - Spring 1992 – Vol. 11, No.1
- Solving xa=b(mod c) for x and Undecimating Recursions - Winter 1992 - Vol. 11, No. 4
- The First US Government Manual on Cryptography - Winter 1992 - Vol. 11, No. 4
- Telephone Codes and Safe Combinations: A Deadly Duo - Spring 1993 – Vol 12, No.1
- Sub-HF Search and Acquisition - – Summer 1994 – Vol.13, No2
- Book Review: Chicksands: A Millenium of History - Fall 1994 - Vol. 13, No. 3
- An Introduction to a Historic Computer Document: Betting on the Future -
The 1946 Pendegrass Report - Cryptanalysis and the Digital Computer - Winter 1994 - Vol. 13, No. 4
- A World War II German Army Field Cipher and How We Broke It - Winter 1995 - Vol. 14, No. 4
- Guerillas in the Mist: COMINT and the Formation of Evolution of the Viet Minh, 1941-45 - Spring 1996 - Vol. 15, No. 1
- Book Review: A Century of Spies: Intelligence in teh Twentieth Century - Fall 1996 - Vol. 153, No. 3
- Dealing with the Future: The Limits of Forecasting - Fall 1996 - Vol. 153, No. 3
- The BS Attitudes: How Things Work in Bureaucracies - Winter 1996 - Vol. 15, No. 4