Skip Public Info MenusPublic Info Menu
|
Cryptologic Quarterly Articles
- Disclaimer
- John H. Tiltman: A Reminiscence
Summer/Fall 1982-Vol. 1, Nos. 2-3
- Computer Virus Infections: Is NSA Vulnerable?
Fall 1985-Vol. 4, No. 3
- The Origination and Evolution of Radio Traffic Analysis: The World War I Era
Spring 1987-Vol. 6, No. 1
- What Every Cryptologist Should Know About Pearl Harbor
Summer 1987 - Vol. 6, No. 2
- Influence of US Cryptologic Organizations on the Digital Computer Industry
Fall/Winter 1987-1988 Vol. 8, Nos. 3-4
- Third Party Nations: Partners and Targets
Winter 1989 - Vol. 7, No. 4
- Meteor Burst Communications: An Ignored Phenomenon?
Fall 1990 - Vol. 9, No. 3
- Geographic Information Systems
Fall/Winter 1991 Vol 10, Nos. 3-4
- DOS/UNIX Interoperability and Email in the Agency
Spring 1992 Vol. 11, No.1
- Solving xa=b(mod c) for x and Undecimating Recursions
Winter 1992 - Vol. 11, No. 4
- The First US Government Manual on Cryptography
Winter 1992 - Vol. 11, No. 4
- Telephone Codes and Safe Combinations: A Deadly Duo
Spring 1993 Vol 12, No.1
- Sub-HF Search and Acquisition
Summer 1994 Vol.13, No2
- Book Review: Chicksands: A Millenium of History
Fall 1994 - Vol. 13, No. 3
- An Introduction to a Historic Computer Document: Betting on the Future -
The 1946 Pendegrass Report - Cryptanalysis and the Digital Computer
Winter 1994 - Vol. 13, No. 4
- A World War II German Army Field Cipher and How We Broke It
Winter 1995 - Vol. 14, No. 4
- Guerillas in the Mist: COMINT and the Formation of Evolution of the Viet Minh, 1941-45
Spring 1996 - Vol. 15, No. 1
- COMINT and the PRC Intervention in the Korean War
Summer 1996 - Vol. 15, No. 2
- Book Review: A Century of Spies: Intelligence in the Twentieth Century -
Fall 1996 - Vol. 153, No. 3
- Dealing with the Future: The Limits of Forecasting
Fall 1996 - Vol. 153, No. 3
- The BS Attitudes: How Things Work in Bureaucracies
Winter 1996 - Vol. 15, No. 4
|
|