An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
Innovation
WorkLifeBalance
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Search
Search
Upload Date
Upload Date
Document Date
Title
Calendar Year 1996.PDF
EXTERNAL-BROCHURE
TNW 23-1 | 2021 | Deception Research: Using Science to Reveal the Truth
German Radio Intelligence
Words and the Intelligence Value of Conversations
An Application of PTAH to the Voynich Manuscript
The Voynich Manuscript Revisited
Spacecraft Passenger Television from Laika to Gagarin
A Personal Contribution to the Bombe Story
An Application of Cluster Analysis and Multidimensional Scaling to the Question of "Hands" and "Languages" in the Voynich Manuscript
Selected SIGINT Intelligence Highlights
Some Principles of Cryptographic Security
Earliest Applications of the Computer at NSA
Addendum to "A Cryptologic Fairy Tale"
Rochford's Cipher: A Discovery in Confederate Cryptography
Report of the Second Computer Study Group
Q.E.D. - 2 Hours, 41 Minutes
Famous First Facts, NSA Part I: Pre-Computer Machine Cryptanalysis
Der Fall WICHER: German Knowledge of Polish Success on ENIGMA
The Apparent Paradox of Bayes Factors
FIRST
36
37
38
(current)
39
40
LAST