Donate for the Cryptome archive of files from June 1996 to the present

14 January 2012

NSA Releases 37 Cryptologic Articles


The National Security Agency released on January 11, 2012, 37 FOIA-requested articles, 36 in the Cryptologic Quarterly and one in the Cryptologic Almanac. These appear to be the 37 -- NSA does not indicate which articles are new. Corrections welcome: cryptome[at]earthlink.net. (Links go to NSA.gov)

Cryptologic Quarterly

The High-Tech Trade War with Japan: Can Anyone Win?
Spring/Summer 1986-Vol. 5, Nos. 1-2

The Essential Difference [Corrected misspelled NSA URL]
Winter 1987-Vol. 5, No. 4

With Pail and Shovel: The "Sandbox Approach" to Management and Leadership
Winter 1987-Vol. 5, No. 4

The Fiber Distributed Data Interface
Spring 1988-Vol. 7, No. 1

OJE: On the Job Enthusiasm- A Layman's Perspective
Summer 1988-Vol. 7, No. 2

Problem Encountered with the Variant Record Construct in Ada
Summer 1988-Vol. 7, No. 2

An Examination of the Possible Effects of Slavic Chauvinism on the Economic and Political Development of the Southern Soviet Periphery
Fall 1988-Vol. 7, No. 3

An Evaluation of Conventional and LDD Devices for Submicron Geometries
Spring 1989-Vol. 8, No. 1

Ten Rules to Avoid Planning Foul-Ups
Spring 1989-Vol. 8, No. 1

Volunteering: A Fresh Approach
Spring 1989-Vol. 8, No. 1

PCSE: A Design Implementation for PC Security
Summer 1989-Vol. 8, No. 2

Processor Interconnection Networks from Cayley Graphs
Fall 1989-Vol. 8, No. 3

RISC Does Windows
Fall 1989-Vol. 8, No. 3

Moscow's Realignment with Cairo: A Look at Gorbachev's New Political Thinking
Winter 1990-Vol. 8, No. 4

A Stab at A2 Criteria
Spring 1990-Vol. 9, No. 1

Radio Intelligence in Japanese and American North Pacific Naval and Air Operations
Summer 1990-Vol. 9, No. 2

The PLATFORM Network Evolution
Winter 1991-Vol. 9, No. 4

Unofficial Vocabulary
Fall/Winter 1991-Vol. 10, Nos. 3-4

Error Messages: The Importance of Good Design
Spring 1992-Vol. 11, No. 1

Book Review: Now Playing: Churchill as Pearl Harbor Villain
Summer 1992-Vol. 11, No. 2

The National OPSEC Program
Fall 1992-Vol. 11, No. 3

Facing the Post-Cold War Era
Winter 1992-Vol. 11, No. 4

Seward's Other Folly: America's First Encrypted Cable
Summer 1993-Vol. 12, No. 2

Station "C" and Fleet Radio Unit Melbourne (FRUMEL) Revisited
Summer 1993-Vol. 12, No. 2

Inference and Cover Stories
Fall/Winter 1993-Vol. 12, Nos. 3-4

Virtual Reality
Fall/Winter 1993-Vol. 12, Nos. 3-4

Doing Business Smarter: A Proposal for Consolidating NSA's Analysis and Reporting of Foreign Spaceborne Reconnaissance
Summer 1994-Vol. 13, No. 2

The Fall of the Shah of Iran: A Chaotic Approach
Winter 1994-Vol. 13, No. 4

The Golden Age of Russia
Winter 1994-Vol. 13, No. 4

Revisiting the Dispute over the Identification of "AF" as Midway
Winter 1994-Vol. 13, No. 4

The Uncertain Summer of 1945
Spring 1995-Vol. 14, No. 1

Work Force Skills and Mission Requirements Comparison System
Spring 1995-Vol. 14, No. 1

The Move, or How NSA Came to Fort Meade
Summer 1995-Vol. 14, No. 2

Paved with Good Intentions: How the Road to Somalia Turned into a Detour to Chaos
Summer 1996-Vol. 15, No. 2

Receiver Dynamics
Winter 1996-Vol. 15, No. 4

The Value of Working Longer Hours for Promotion
Winter 1996-Vol. 15, No. 4

Cryptologic Almanac

The American Revolution's One-Man National Security Agency
August 2003