Cryptologic Quarterly Articles

Cryptologic Quarterly Articles

The following are documents from the Cryptologic Quarterly, declassified by the NSA.

Disclaimer

John H. Tiltman: A Reminiscence – Summer/Fall 1982-Vol. 1, Nos. 2-3

Computer Virus Infections: Is NSA Vulnerable? – Fall 1985-Vol. 4, No. 3

The Origination and Evolution of Radio Traffic Analysis: The World War I Era – Spring 1987-Vol. 6, No. 1

What Every Cryptologist Should Know About Pearl Harbor – Summer 1987 – Vol. 6, No. 2

Influence of US Cryptologic Organizations on the Digital Computer Industry – Fall/Winter 1987-1988 Vol. 8, Nos. 3-4

Third Party Nations: Partners and Targets – Winter 1989 – Vol. 7, No. 4

Meteor Burst Communications: An Ignored Phenomenon? – Fall 1990 – Vol. 9, No. 3

Geographic Information Systems – Fall/Winter 1991 – Vol 10, Nos. 3-4

DOS/UNIX Interoperability and Email in the Agency – Spring 1992 – Vol. 11, No.1

Solving xa=b(mod c) for x and Undecimating Recursions – Winter 1992 – Vol. 11, No. 4

The First US Government Manual on Cryptography – Winter 1992 – Vol. 11, No. 4

Telephone Codes and Safe Combinations: A Deadly Duo – Spring 1993 – Vol 12, No.1

Sub-HF Search and Acquisition – – Summer 1994 – Vol.13, No2

A World War II German Army Field Cipher and How We Broke It – Winter 1995 – Vol. 14, No. 4

Guerillas in the Mist: COMINT and the Formation of Evolution of the Viet Minh, 1941-45 – Spring 1996 – Vol. 15, No. 1

Book Review: A Century of Spies: Intelligence in teh Twentieth Century – Fall 1996 – Vol. 153, No. 3

Dealing with the Future: The Limits of Forecasting – Fall 1996 – Vol. 153, No. 3

The BS Attitudes: How Things Work in Bureaucracies – Winter 1996 – Vol. 15, No. 4

Comments

comments

,