HUGE CRYPTOLOGY COLLECTION FOR SALE

  I am offering for sale my collection of more than 3,200 books, magazines, brochures, scrapbooks, and other printed matter on codes and ciphers, one of the largest and finest in private hands; and my collection of more than 24 American and foreign cipher machines,cipher devices and related items; plus more than 100 catalogues, brochures, technical manuals and other descriptive literature on cipher machines and crypto devices; more than a dozen video/audio tapes of crypto oriented TV programs, conferences, the 1935 MGM movie, Rendevous,based on H.O. Yardley’s novel, The Blond Countess, and a 1942 15-chapter serial, The Secret Code; more than 20 miscellaneous and unusual cryptologic related items including a letter dated June 14, 1796 from William Coleman, friend of Alexander Hamilton, and publisher of the New York Post, with a message concealed in an old shorthand system, and other unique items; over 70 non-military,amateur and juvenile codes,ciphers,cipher disks,crypto devices, Captain Midnight and  Orphan Annie decoders,etc.; and 16 cryptologic games and toys.I have been gathering these materials for the 60 years I have been interested in codes and ciphers, including the more than 25 years that I have been an editor of Cryptologia, the scholarly journal in the field.

  The collection, totaling thousands of items, occupies more than 230 linear feet of shelf space and fills more than 11 office file drawers. It includes a number of antiquarian books including Trithemio,Ionne Steganographia,1621,in its original vellum binding; Porta, Ioan Baptista. De Furtivis Literarum Notis,vvlgo de Ziferis, libris iiii, 1563, 228 pp.;and Bazeries, Etienne. Les chiffres secrets devoiles 1901, 277 pp.

Other items of cryptologic significance include: William F. Friedman’s 1923 Elements of Cryptanalysis, which first used that term in a book and which endowed cryptology with the terminology that the field still uses and clarified relations between cryptosystems, Friedman’s Military Cryptanalysis,a four-volume expansion that trained thousands in World War II and remains a standard work on classical (pre-public key) cryptology. But one of his greatest feats was his writing of eight Riverbank publications from 1918-1922. Acording to David Kahn’s The Codebreakers, they are“a landmark in the history of cryptology” and except for one reprint, the originals are included in this collection.

In the mid-1970s the National Security Agency planned to replace Friedman’s Military Cryptanalysis with a new hardbound, six-volume series, Military Cryptanalytics. Part I by W.F.Friedman and L.D. Callimahos,was issued in 1956, 443 pp. Part II,by L.D. Callimahos and W.F. Friedman was issued in 1959, 634 pp. These were classified Confidential and are likely the only original government hardbound copies in private hands. Part III by L.D. Callimahos was issued in 1977, 664 pp. and classified Secret and many deletions made for security reasons on the copy in our collection. An FOI law suit revealed that no further volumes were produced.

Among the many other important books are: Traité de Cryptographie by A. Lange et Soudart, Paris, 1925;
Precis De Cryptographie Moderne by C. Eyraud, 1953; Systeme Des Chiffrierens  by A. Figl,1926; Cours de Cryptographie  by Général M. Givierge, 1932; Manuale Di Crittografia by Gen. Luigi Sacco,(and one copy with his signature) 1947; Salakirjoitustaidon Perusteet (Basics of Cryptography) by R.H. Hallamaa, 1937 (Helsinki). Each of the books noted played an important role in the advancedment of cryptologic knowledge and almost all paved the way to the cryptology used in World War II

 Cipher was the U.S. Government’s first manual on cryptography, circa 1869. It contains the personal bookplate of A.W. Greely, Lieut 36th Inf, Acting Signal Officer who wrote on the flyleaf that it was the textbook in his Signal Officer class of 1869 where he was the only officer to pass the final examination. He served as Chief Signal Officer, 1887-1906, and retired as Major General.This unique 156-page text apppears to be the only one in private hands as the only other known copy is owned by the Boston Public Library.

 Books comprise much of the collection and those mentioned above are just a few of the important titles.

Cipher machines/devices include: U.S. Army M-94, whose origin can be traced back to Thomas Jefferson, reinvented by Parker Hitt in 1916 and adopted by Friedman in 1922. It is  rarely found and one sold on E-bay for $7,250. The Hagelin BC-543 is an electrically powered machine in a carrying case and has a service manual.Swiss NEMA.U.S.Army 30 Strip Cipher Device,M-138-A, a folding aluminum board with simulated strips and original carry case.Also a U.S. Army M-325, invented by William F. Friedman based on the German Enigma but never adopted for general use, probably the only copy in private hands. TST (Timmann GmbH & Co.,Germany) 1221 Pocket-Size Text Cipher Set from the mid-1990s, microprocessor controlled with C-MOS integrated circuits. A rare U.S. Army celluloid Cipher Disk, circa 1910-1920) And much more.

 The listing of books is roughly alphabetical with possibly hundreds of items not listed such as periodicals with crypto articles, U.S. Government Reports, Microfilms, 9 loose-leaf books filled with crypto patents, 23 bound volumes with various types of crypto information (mostly photocopies),dozens of file folders with crypto articles,clippings,voluminous correspondence, booklets, out-of-print crypto magazines, and much, much more.

For further information or to make an offer, please contact louk17@optonline.net
 

 The Collection

A Bibliography of Cryptography. American Mathematical Monthly, Vol. 50, 1943, pp. 345-346.

A Consumer Guide to Intelligence. Wash., D.C.: Central Intelligency Agency, 53 pp.

A Heuristic Program to Solve Simple Substitution Ciphers, 12 pp.

A New Cipher Code. Scientific American Supplement, Jan 27, 1917, p. 61.

A Secret-Code Message Machine. Literary Digest, 4/17/26, p. 22.

A Swedish Success. Breaking the German Geheimschreiber during World War II. Twelve-page booklet with English translation of excerpt from Bengt Beckman's book, Svenska Kryptobedrifter. Stockholm, Sweden: Försvarets Radivanstalt, SN-Tryck Ekerö, 1997, 12 pp.

A War Secret. Saturday Evening Post, Oct. 1926, pp. 44, 46, 74. (Xerox)

Aalto, Pentti. Notes on Methods of Decipherment of Unknown Writings and Languages. Studia Orientalia, XI, 1945, pp. 3-35.

Abrams, M.D. & H.J. Podell. Tutorial: Computer and Network Security. CA: IEEE Computer Society, 1987, 430 pp.

Accoce, P. & P. Quet. A Man Called Lucy. NY: Coward-McCann, 1967, 250 pp.
 

Adámek, Jiri. Foundations of Coding: Theory and Applications of Error-Correcting Codes with an Introduction to Cryptography and information Theory. NY: John Wiley & Sons, Inc., 1991, 336 pp.

Adleman, L.M. & R.L. Rivest. The Use of Public Key Cryptography in Communications System Design. 1978 National Telecommunications Conference, Vol. 1, pp. 26.4.1-26.4.4.

Admiral for Pacific. New York Times, 3/15/72, p. 43.

Adoption of Mechanical Cryptography in the Navy [England]. Report of the Committe appointed to advise. June 1914, Public Record Ofice, 11 pp. Photocopy.

Advanced Military Cryptography, Special Text No. 166, Army Extension Courses. Washington: USGPO, 1935, 113 pp.

Agee, P. Inside the Company-CIA Diary. NY: Stonehill Pub. Co., 1975, 640 pp.

Agent, A.N. Spies and Codes. London: Hamlyn/Octopus Children' Books, 1988, 32 pp.

Agre, Philip E. and Marc Rotenberg. Technology and Privacy: The New Landscape. Cambridge, MA: The MIT Press, 1997, 325 pp.

Agrell, W. & B. Huldt. Clio goes spying: Eight Essays on the History of Intelligence. Lund, Sweden: University of Lund, 1983, 213 pp.

Albert, Jr., Burton. Top Secret/Codes to Crack. Niles, IL: A. Whitman & Co., 1987, 32 pp.

Albert, A.A. Some Mathematical Aspects of Cryptography. November 22, 1941, 29 pp. (Unpublished paper)

Albert, Jr., Burton. More Codes for Kids. Chicago: A. Whitman & Co., 1979, 32 pp.

Albert, Jr., Burton. Code Busters. Niles, IL: Albert Whitman & Co., 1985, 32 pp.

Alberti, Leon Battista. Dello Scrivere Cifra. Trans. from Latin into Italian by Augusto Buonafalce. Torino, Italy: Galimberti Tipografia Editori, 1995, XXII + 47 pp.

Alberti, L.B. Alberti On Deciphering. A translation by C.J. Mendelsohn of the cryptanalytic portion of the manuscript treatise De Cifris of Leon Battista Alberti. 4 pp. plus 1 page notes.

Alberti, L. B. A Treatise on Cipher (reprint). Torino, Italy: Galimberti Tipografia Editori, 1997, 64 pp.

Albright, Harry. Pearl Harbor: Japan's Fatal Blunder: The True Story behind Japan's Attack on December 7, 1941. NY: Hippocrene Books, 1988, 378 pp.

Aldrich, Richard J. The Key to the South: Britain, the United States, and Thailand during the Approach of the Pacific War, 1929-1942. NY: Oxford University Press, 1993, 416 pp.

_______. Intelligence and the War Against Japan: Britain, America and the Politics of Secret Service. NY: Cambridge University Press, 2000, 500 pp.

_______. Espionage, Security and Intelligence in Britain 945-1970. Manchester, England: Manchester University Press, 1998, 262 pp.

Aldrich, Richard J., Gary Rawnsley & Ming-Yeh T. Rawnsley, eds.The Clandestine Cold War in Asia,1945-65:Western Intelligence, Propaganda and Special Operations. London: Frank Cass Publishers, 2000, 298 pp.

Alexander, D.A. Secret Codes and Decoding. NY: Padell Book Co., 56 pp.

Alexander, Martin S., ed. Knowing Your Friends: Intelligence, Inside Alliances and Coalitions from 1914 to the Cold War. London: Frank Cass Publishers,1998, 304 pp.

Allen, Robert. MENSA Secret Codes for Kids. NY: Scholastic Inc., 1999, 224 pp.

_____________. Mensa Secret Codes for Kids. NY: Barnes & Noble, 2002, 128 pp.

Allen, Thomas A. & Norman Polmar. Merchants of Treason: America's Secrets for sale, From the Pueblo to the Present. NY: Dell Publishing, 1988, 471 pp.

Allen, Thomas A. & Norman Polmar. "The Crypto Bandits." Arlington, VA: Air Force magazine, June 1989, pp. 88 92.

Allied Communications Intelligence and The Battle of the Atlantic. Chapter VI, pp. 79-91.

Allies Solved Top Nazi Code. Newsday, October 25, 1974, p. 13.

Allington, Maynard. The Fox in the Field: A World War II Novel of India. McLean, VA: Brassey's (US), 1994, 214 pp.

Alverez, David &Robert A. Graham. Nothig Sacred: Nazi Espionage Against the Vatical, 1939-1945. London: Frank Cass Publishers, 1999, 190 pp.

_______, David, ed. Allied and Axis Signals Intelligence in World War II. London: Frank Cass Publishers, 1999, 229 pp.

_________, Secret Messages: Codebreaking and American Diplomacy, 1930-1945. Lawrence, KS: University Press of Kansas, 2000, 296 pp.

Amende, Coral. The Crossword Obsession: The History and Lore of the Wrold’s Most Popular Pastime. NY: Berkley Books, 2001, 369 pp.

American History Illustrated. Three articles on Spies in the Revolution including the Church cryptogram. Vol. XXIV, No. 6, December 1989.

America’s Espionage Epidemic. Washington, DC: The Maldon Institute, 10/1/86, 59 pp.

Ameringer, Charles D. U.S. Foreign Intelligence: The Secret Side of American History. Lexington, MA: Lexington Books, 1990, 458 pp.

Amoroso, Edward. Fundamentals of Computer Security Technology. Englewood Cliffs, NJ: Prentice-Hall, 1944, 403 pp.

An Evaluation of the NBS Data Encryption Standard. Lexar Corp., 60 pp.

Anderson, J. Brass Bars. New York Post, 5/26/71.

Anderson, J.P. A Heuristic Program to Solve Simple Substitution Ciphers. N.D. 5 pp. plus Appendix, 7 pp.

Anderson, Jack. The 'Gout' In Saigon. New York Post, 4/30/71, p. 38.

Anderson, J. A Heuristic Program to Solve Simple Substitution Ciphers. 4 pp. + Appendix I & II. Also 2 pp. on flow chart for Vigenere.

Anderson, J.M. Data Security for your Personal Computer. On Computing, Winter 1980, 63-66.

Anderson, J.P. The Autotransposition Cipher. N.D., 8 pp.

Anderson, J.P. Notes on the Cryptanalysis of a Multiliteral Cipher Device. Burroughs Laboratories, Systems Dept., Research Div., 10/1/61, 7 pp.

Anderson, Ross, ed. Information Hiding: First International Workshop, Cambridge, UK, Proceedings. NY: Springer-Verlag, 1996, 351 pp.

Anderson, Ross,ed. Fast Software Encryption. NY: Springer-Verlag, 1994, 221 pp.

Anderson, Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. NY: John Wiley & Sons, 2001, 612 pp.

Andre, R.V. Pattern & Nonpattern Words of 2 to 6 Letters. Norman, OK: Raja Books, 1977.

Andreassen, Karl. Cryptology and the Personal Computer with Programming in BASIC. Laguna Hills, CA Aegean Park Press, 1986, 157 pp.

Andreassen, Karl. Computer Cryptology: Beyond Decoder Rings. Englewood Cliffs, NJ: Prentice-Hall, 1988, 268 pp.

Andree, R.V. Cryptography as a Branch of Mathematics. The Mathematics Teacher, Nov. 1952, PP. 503-509.

Andree, Richard V. Mathematical Cryptography. Notes/Text for Seminar on Cryptography. University of Oklahoma, 1974.

Andree, R.V. Cryptanalysis. Scripta Mathematica, March 1952, pp. 5-17.

Andree, Josephine & Richard V. Secret Ciphers-Textbook. Norman, OK: University of Oklahoma, 1976, 136 pp.

________________. Instructor’s Manual for Cryptarithms,Preliminary version.Norman OK: University of Oklahoma, 1976, 59 pp.

________________. Instructor’s Manual for Sophisticated Ciphers. Norman, OK: Univeristy of Oklahoma, N.D., 21 pp.

________________. Sophisicated Ciphers. University of Oklahoma, 1978, 149 pp.

Andrew, Christopher. Her Majesty's Secret Service: The Making of the British Intelligence Community. NY: Sifton/Viking, 1986, 619 pp.

Andrew, Christopher, ed. Codebreaking and Signals Intelligence. Savage, MD: Frank Cass, c/o Rowman & Littlefield Publishers, Inc., 1986, 137 pp.

Andrew, Christopher, ed. Intelligence and National Security, from Jan. 1986, Vol. 1 to date. [full run] Ilford, England: Frank Cass & Co., Ltd.

Andrew, Christopher & Oleg Gordievsky. More Instructions from the Centre: Top Secret Files on KGB Global Operations, 1975-1985. Portland, OR: Frank Cass, c/e ISBS, 1992, 130 pp.

Andrew, Jean, ed. Our Cryptograms. NY: Ace Books, 1976, 153 pp.

Andrew, Christopher. For the President's Eyes Only: Secret Intelligence and the American Presidency from Washington to Bush. NY: Harper Collins, 1995, 660 pp.

Andrew, Christopher & D. Dilkes, eds. The Missing Dimension, Governments and Intelligence Communities in the Twentieth Century. Champaign, IL: University of Illinois Press, 1984, 300 pp.

Andrews, Christopher & Jeremy Noakes. Intelligence and International Relations, 1908-1945. Exeter, England: University of Exeter, 1987, 314 pp.

Andrews, Carol. The British Book of the Rosetta Stone. NY: Barnes & Noble Books, 1991, 54 pp.

Angammane, Captain. Déchiffrement de la Cryptographie Sans Instruments Du Commandant Deltheil. Paris: Henri Charles-Lavauzelle, 1900, 37 pp.

An Historic Computer Document. The 1946 Pendergrass Report, Cryptanalysis and the Digital Computer.41 pp. With An Introduction By Colin Burke.36 pp.

Anleitung zum Bundeswehr-Handschlüssel (Reihenschieberverfehren). March 1960, 29 pp. (Xerox)

Anleitung zum Doppelwürfel-Verfahren. October 1958, 18 pp.

Anonymous (J. Rives Childs) Before The Curtain Falls. Indianapolis, IN: Bobbs-Merrill Co., 1932, 333 pp.

Answers to Frequently Asked Questions About Today's Cryptography. Redwood City, CA: RSA Laboratories, 1993, 44 pp.

Antonucci, Michael. “Code-Cracker” Harrisburg, PA: Civil War Times Illustrated, Aug. 1995, pp. 46-53, 72-75.

Appendices to the White Paper Analysis of National Policy Options for Cryptography. U.S. Dept. of Commerce, NTIA, 1980.

Application of the Elementary Theory of Numbers Upon the Theory of a Cipher Machine. 6 pp. typed, possibly a translation.

Arabic & Russian Telegraph Code. 2 pp.

Ardman, Harvey. U.S. Code-breakers vs. Japanese Code-Breakers in World War II. The American Legion Magazine, May 1972, 18-23, 38-42.

Ardman, H. The Great "Robot" Arms Race. The American Legion Magazine, Oct. 1972, 10-16.

Arensberg, Walter. The Cryptography of Dante. NY: A.A. Knopf, 1921, 494 pp.

Army Security Agency School Manual On Signal Intelligence. 20 pp.

Arndt, Christoph. Information Measures: Information and its Description in Science and Engineering. NY: Springer-Verlag, 2000, 547 pp.

Arnols, Bill. Emily Dickinson’s Secret Love: Mystery “Master” Behind Poems. Lake Worth, FL: PPB Press, 1998, 227 pp.

Arnold, W.E. Arnold's Cipher, No. 4. The Improved Railroad Telegraphic Cipher. Louisville, KY: The Standard Printing Cop., 1883, 147 pp.

Artaxerxes. Analyzing Cryptograms, 9 pp.

Arvengas, Hubert. Antoine Rossignol et le grand Chiffre de Louis XIV. Bulletin de la Societe des Sciences, Arts et Belles-Lettres du Tarn, Vol. XVI, new series, Jan-Dec. 1955, pp. 511-516.

Ascher, M. & R. Code of the Quipu. Ann Arbor: University of Michigan Press, 1981, 166 pp.

Ashley, Mike, ed. The Mammoth Book of New Sherlock Holmes Advebtures. NY: Carroll & Graf Pub., Inc., 1977, 524 pp.

Ashton, Christina. Codes & Ciphers: Hundreds of Unusual and Secret Ways to Send Secret Messages. Cincinnati, OH: Betterway Books, 1993, 110 pp.

Association des Réservistes du Chiffre. Du Bulletin, Nouvelle Séries No. 5, 1977, 60 pp. Also No. 7, 1979, 64 pp.; No. 8, 1980, 39 pp.; No. 9, 1981, 59 pp.; No. 10, 1982, 72 pp.; No. 11, 1983, 103 pp.; No. 13, 1985, 53 pp.; No. 17, 1989, 51 pp.; No. 18, 1990, 22 pp.; No. 19, 1991, 46 pp.
Association des Réservistes du Chiffre et de la Sécurité de L'information, No. 20, 1992, 47 pp.;  No. 21, 1993, 51 pp.; No. 22, 1994, 69 pp.; No. 23, 1995/96, 85 pp.; No. 24, 1996/97, 85 pp.;No. 25, 1997/98, 96 pp.; No. 26, 1998/99, 90 pp.; No. 27, 1999, 130pp.; No. 28, 2000, 140 pp. ; No. 29, 2001, 121 pp. ;

Athanasiou, T. Encryption, Technology, Privacy, and National Security. Technology Review, Aug./Sept. 1986, 56-64, 66.

Atherton, Louise. Top Secret: An Interim Guide to Recent Releases of Intelligence Records at the Public Record Office. London: PRO Publications, Public Record Office, 1993, 32 pp.

Augot, Daniel, ed. Workshop on Coding and Cryptography 2001, Proceedings. Guer, France: Co?tquidan Military Academier Publishing, 2001, 558 pp.

Auslander, Charles O. How To Construct Your Own Puzzles: It’s Much Easier than solving, More Fun, and Rewarding NY: Vantage Press, 1987, 59 pp.

Avinur, Michael. Ciphers.Published in Israel. 1976, 48 pp.

Award Radio Crypto Pact. Electronic News, Sept. 3, 1973.

Bacard, André. The Complete Privacy Handbook: A Practical Guide to E-mail Encryption, Data Protection, and PGP Privacy Software. Berkeley, CA: Peachpit Press, 1995, 274 pp.

Bach, Eric & Jeffrey Shallit. Algorithmic Number Theory, Vol. I, Efficient Algorithms. Cambridge, MA: The MIT Press, 1996, 512 pp.

Bachrach, Deborah. Pearl Harbor: Opposing Viewpoints. San Diego: Greenhaven Press, 1989, 112 pp.

Bailey, J.E. Cryptography. Encyclopaedia Britannica, 9th ed., 1877, Vol. VI, 669-671.

Bailly, Sharon. All About Notes, from Secret Codes and Special Inks to Fancy Folds and Dead Man’s Drops. Brookfield, CT: The Millbrook Press, 1995, 64 pp.

Bakeless, John. Spies in the Revolution. Gettysburg: American History Illustrated, Vol. VI, No. 3, June 1971, 36-45.

______________. Turncoats, Traitors and Heroes: Espionage in the American Revolution.Philadelphia: J.B. Lippincott Co., 1959, 406 pp.

______________. Turncoats, Traitors and Heroes: Espionage in the American Revolution. NY: Da Capo Press, 1998, 406 pp.

Bakeless, Katherine & John. Spies of the Revolution. Scholastic Book Services, 1966, 220 pp.

Baker, Eugene. Secret Writing-Codes and Messages. Chicago: Children's Press, 1980, 32 pp.

Baker, Carlos. The Gay Head Conspiracy. New York: Charles Scribner's Sons, 1973, 185 pp.

Baker, Stewart A. and Paul R. Herst. The Limits of Trust: Cryptography, Government and Electronic Commerce. Cambridge, MA: Kluwer Law International, 1998, 621 pp.

Bakst, A. Mathematics, Its Magic and Mastery. Chapter 6 - There's Secrecy in Numbers. D. Van Nostrand Co., 1952, 79-101.

Ball, Desmond. Soviet Signals Intelligence (SIGINT): The Ground Stations and Systems. Canberra, Australia: Australian Nat. Univ., 1986, 38 pp.

Ball, Desmond. Signals Intelligence in the Post-Cold War Era: Developments in the Asia-Pacific Region. Singapore: Institute of Southeast Asian Studies, 1993, 144 pp.

Ball, Desmond. The Use of the Soviet Embassy in Canberra for Signals Intelligence (SIGINT) Collection. Canberra, Australia: Australian Nat. Univ., 1987, 26 pp.

Ball, Desmond. Soviet Signals Intelligence (SIGINT): The Use of Diplomatic Establishments. Canberra, Australia: Australian Nat. Univ., 1987, 110 pp.

Ball, Desmond. Soviet Signals Intelligence. Palo Alto, CA: The International Countermeasures Handbook, 1987, pp. 73-89.

Ball, Desmond. Soviet Signals Intelligence (SIGINT): Intercepting Satellite Communications. Canberra, Australia: Australian Nat. Univ., 1989, 151 pp.

Ball, Desmond. Signals Intelligence (SIGINT) in South Korea. Canberra, Australia: Australian Nat. Univ., 1995, 83 pp.

Ball, Desmond. Soviet Signals Intelligence (SIGINT): Listening to ASCEAN. Canberra, Australia: Australian Nat. Univ., 1989, 35 pp.

Ball, Desmond. Soviet Signals Intelligence (SIGINT): Vehicular Systems and Operations. Canberra, Australia: Australian Nat. Univ., 1988, 23 pp.

Ball, Desmond. Soviet Signals Intelligence (SIGINT). Canberra, Australia: Australian Nat. Univ., 1989, 159 pp.

Ball, Duncan & Ian Ball. The Spy Code Handbook: How to Make Code and Cipher Machines To Outfox Your Enemies. Pymble, Australia: Collins Angus & Robertson, 1993, 49 pp.

Ball, D.J. Allied Intelligence Cooperation Involving Australia During WW II. Australian Outlook, pp. 299-309.

Ball, Desmond. Signals Intelligence (SIGINT) in South Asia: India, Pakistan, Sri Lanka (Ceylon). Canberra, Australia: Australia National University, 1996, 111 pp.

Ball, Desmond & Robert Windrem. Soviet Signals Intelligence (SIGINT): Organization and Management. Canberra, Australia: Australian Nat. Univ., 1989, 52 pp.

Ball, Desmond. Pine Gap: Australia and the U.S. Geostationary Signals Intelligence Satellite Program. Winchester, MA: Unwin Hyman, 1988, 121 pp.

Ball, Desmond. A Suitable Piece of Real Estate. Sydney, Australia: Hale & Iremonger, 1980, 180 pp.

Ball Desmond and David Horner. Breaking the Codes: Australia’s KGB Network, 1944-1950. St. Leonardes, Australia: Allen and Unwin, 1998, 468 pp.

Ball, W.W. Rouse. Mathematical Recreations and Essays. NY: The Macmilan Co., 1962, 418 pp.

Ballard, Geoffrey. On ULTRA Service: The Story of Australia's Signals Intelligence Operations During World War II. Richmond, Australia: Spectrum Pub. Pty Ltd., 1991, 470 pp.

Bamford, James. The Puzzle Palace: A Report on NSA, America’s Most Secret Agency. NY: Houghton Miflin Co., 1982, 465 pp.

Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency: From the Cold War Through the Dawn of a New Century. NY: Doubleday, 2001, 721 pp.

Bancroft,Elizabeth, Managing Editor, Surveillant:Acquisitions and Commentary For Intelligence And Security Professionals.  Vol. 1 No. 1, July/August 1990, 24 pp.- Vol. 4, Nos. 4 & 5, 94 pp.

Banderly, Mark B. Super Cryptograms. NY: Hart Publishig Co., Inc., 1979, 96 pp.

Barak, M. The Enigma. New York: W. Morrow & Co., 1978, 240 pp.

Baran, Paul. On Distributed Communications: IX Security, Secrecy and Tamper-Free Considerations. The Rand Corporation, RM-3765=-PR, 1964, 39 pp.

Barber, E.J.W. Archaeological Decipherment. Princeton University Press, 1974, 276 pp.

Barber, P. Diplomacy: The World of the Honest Spy. London: The British Library, 1979, 143 pp.

Barber, Laurie and Cliff Lord. Swift and Sure: A History of the Royal New Zealand Corps of Signals and Army Signalling in New Zealand. Auckland, NZ: New Zealand Signals, Inc., 1996, 296 pp.

Bare Story of Britain's Code War. New York Post, October 9, 1974, p. 40.

Barger, Charles J. Radio Equipment of the Third Reich, 1933-1945. Boulder, CO: Paladin Press, 1991, 106 pp.

Barker, W. Cryptanalysis of the Single Columnar Transposition Cipher. Rutland, VT: C.E. Tuttle Co., 1961, 140 pp.

Barker, W. Cryptanalysis of the Simple Substitution Cipher With Word Divisions Using Non-Pattern Word Lists. Laguna Hills, CA: Aegean Park Press, 1975, 212 pp.

Barker, W., ed. The History of Codes and Ciphers in the U.S. During WW I. Laguna Hills, CA: Aegean Park Press, 1979, 263 pp.

Barker, W. Cryptanalysis of an Enciphered Code Problem-Where an "additive" Method of Encipherment Has Been Used. Laguna Hills, CA: Aegean Park Press, 1979, 174 pp.

Barker, W. Cryptograms in Spanish. Laguna Hills, CA: Aegean Park Press, 1985, 122 pp.

Barker, W. G. & R.E. Coffman. The Anatomy of Two Traitors. Laguna Hills, CA: Aegean Park Press, 1981, 130 pp.

Barnard, G.A. Statistical Calculation of Word Entropies for Four Western Languages. IRE-Information Theory, March 1955, 49-53.

Barker, A.J. Pearl Harbor. Ballantine Books, 1969, 160 pp.

Barker, W., ed. The History of Codes and Ciphers in the U.S. During the Period Between the World Wars. Part I, 1919-1929. Laguna Hills, CA: Aegean Park Press, 1979, 186 pp.

Barker, W. Cryptograms. Laguna Hills: Aegean Park Press, 1980, 119 pp.

Barker, W., ed. The History of Codes and Ciphers in the U.S. Prior to WW I. Laguna Hills, CA: Aegean Park Press, 1978, 159 pp.

Barker, W. Cryptanalysis of the Hagelin Cryptograph. Laguna Hills, CA: Aegean Park Press, 1977, 223 pp.

Barker, W. Cryptanalysis of Shift-Register Generated Stream Cipher Systems. Laguna Hills, CA: Aegean Park Press, 1984, 247 pp.

Baron, John. KGB: The Secret Work of Soviet Secret Agents. New York: Bantam Books, 1974, 624 pp.

Baron, John. Breaking the Ring: The Bizarre Case of the Walker Family Spy Ring. Boston: Houghton Mifflin Co., 1987, 244 pp.

Barr, Thomas H. Invitation ro Cryptology. NY:Upper Saddle River, NJ: Prentice Hall, 2002, 396 pp.

Bartlett, Bruce P. Cover-Up: The Politics of Pearl Harbor, 1941-1946. Arlington House, 1978, 189 pp.

Base, Graeme. The Eleventh Hour: A Curious Mystery. NY: Harry N. Abrams, Inc. 1989, 32 pp.

Bates, D.H. Lincoln in the Telegraph Office. New York: The Century Co., 1907, 432 pp.

Bates, D.H. A Rebel Cipher Dispatch. Harper's New Monthly Magazine, June 1898, pp. 105-109.

Bates, David Homer. Lincoln in the Telegraph Office. II-His Special Interest in the Work of the Cipher-Operator. The Century Magazine, pp. 290-306.

Bates, David Homer. Lincoln in the Telegraph Office: Recollections of the United States Military Telegraph Corps during the Civil War (reprint). Lincoln, NE: University of Nebraska, 1995, 432 pp.

Bath, Alan Harris. Tracking the Axis Enemy: The Triumph of Anglo-American Naval Intelligence. Lawrence, KS: Univerity Press of Kansas,1998, 308 pp.

Battista, Eugenio & Giuseppa Saccaro Battista. Le Macchine Cifrate Di Giovanni Fontana. Milan, Italy: Arcadia Edizioni, 1984, 168 pp.

Baudoin, Capt. R. Elements of Cryptography. Washington, DC: Army Security Agency, trans. by Capt. A.E. Highley, N.D., 211 pp.

Baudoin, Roger. Éléments de Cryptographie. Paris: Éditions A. Pedone, 1939, 336+ pp.

Baudoin, Commandant. Elements of Cryptography. Paris: Editions A. Pedrone, 1946, 263 pp. trans. from the French by F.C. Flindt.

Baudoin, R. Chiffre et Cryptographie; Le Chiffre et son Emploi Militaire. Revue de l'Armée de l'Air, Jan.-Feb. 1939, 5-22.

Baudoin, Commandant R. Éléments de Cryptographie. Paris: Editions A. Pedrone, 1946, 336 pp.

Bauer, Friedrich L. Kryptologie: Methoden und Maximen. Heidelberg, Germany: Springer-Verlag, 1993, 357 pp.

Bauer, Friedrich L. Enyzifferte Geheimnisse: Methoden und Maximen der Kryptologie. Heidelberg, Germany: Springer-Verlag, 1995, 391 pp.

Bauer, Friedrich L. Decrypted Secrets: Methods and MMaxims of Cryptology. NY: Springer-Verlag, 1997, 448 pp.

Bauer, Friedrich L. Kryptologie (Vorlesungsskriptum) München, Germany: Technische Universitat München, 1991, 201 pp.

Bauer, Maria. Foundations Unearthed. Glendale, CA Veritas Press, 1944, 65 pp.

Bausum, Henry S. and David Bausum. The Journal of Military History Cumulative Index: Vols. 1-58, 1937-1994. Lexington, VA: Society for Militry History, 1995, 507 pp.

Bazeries, Captain E. Cryptographie A 20 Rondelles-Alphabets (25 lettres par alphabet). Paris: Compte rendu de la 20e session de l'Association Francaise pour l'Avancement des Sciences (Au secrétariat de l'association, 1892) 160-165.

Bazeries, E. Cipher Secrets Unveiled. (Les Chiffres Secrets Dévoiles, 1901) trans. from the French, 70 pp.

Bazeries, Commandant E. Les Chiffres Dévoiles. Paris: Libraire Charpentier et Fasquelle, 1901, 282 pp.

Beach, Edward L. Scapegoats: A Defense of Kimmel and Short at Pearl Harbor. Annapolis, MD: Naval Institute press, 1995, 212 pp.

Beal, George. Find Out About Secret Codes and Messages. London: Treasure Press, 1990, 77 pp.

Beard, Dan. American Boys' Book of Signs, Signals and Symbols. Philadelphia, PA: J.B. Lippincott Co., 1918, 250 pp.

Beard, Wm. E. YIYKAEJR GZQSYWX. U.S. Naval Institute, Aug. 1918 pp. 1829-1836.

Beaufort, Admiral Sir Francis. Cryptography, A System of Secret Writing. London: Edward Stanford, 2 pp.

Beaulier. Le Chiffre. Paris: La Revue Des Transmissions, No. 69, May/June 1956. (Micro Fiche)

Becker, H.B. Network Security in Distributed Data Processing. Data Communications, Aug. 1977, 33-39.

Beckett, Brian. Introduction to Cryptology. Cambridge, MA: Blackwell Scientific Publications, 1988, 344 pp.

Beckhough, Harry. Secret Communications: The Hidden Source of Information Through the Ages: From the Sumerians to the Cold War. London: Minerva Press, 1995, 203 pp.

Beckman, Bengt. Svenska Krypto Bedrifter. Stockholm, Sweden: Albert Bonniere Förlag, 1997, 289 pp.

Beddoes, E.W. & J.M.K. Friend. Advances in Communications Security For Speech and Data. Conference on Communications Equipment and Systems 4-7 April 1978, pp. 411-414.

Bedini, Silvio. Thomas Jefferson and Science. Exhibition catalogue. Washington, DC: Smithsonian Institution, 1981, 16 pp.

Bedini, Silvio. Thomas Jefferson, Statesman of Science. NY: Macmillan Pub. Co., 1990, 616 pp.

Beecher, W. Laird Queries Credibility of McGovern P.O.W. Bid. New York Times, 7/18/72, p. 20.

Beecher, W. Nuclear Jets Left Taiwan Before Trip. New York Times, 2/29/72, p. 17.

Beesley, P. Secret Naval Intelligence Records: A Note for Researchers. U.S. Naval Institute Proceedings, Nov. 1978, 124-127.

Beesley, P. Very Special Intelligence. New York: Doubleday & Co., 1978, 282 pp.

Beesley, P. Ultra and the Battle of the Atlantic, The British View. Presented at Naval Symposium 10/28/77. NSA publication reprint.

Beesley, P. Room 40: British Naval Intelligence 1914-1918. London: Hamish Hamilton Ltd., 1982, 338 pp.

Beesley,Patrick.Very Special Intelligence: The Story of the Admiralty’s Operational Intelligence Centre. Mechanicsburg, PA: Stackpole Books, 2000, 296 pp.

Behrendt, Hans-Otto. Rommels Kenntnis vom Feind im Afrikafeldzug. Freiburg, Germany: Rombach & Co., 1980, 342 pp.

Behrendt, Hans-Otto. Rommel's Intelligence in the Desert Campaign, 1941-1943. London: William Kimber & Co., 1985, 256 pp.

Beker Henry & F.C. Piper, eds. Cryptography and Coding. NY: Oxford University Press, 1989, 297 pp.

Beker, H.J. & F.C. Piper. Secure Speech Communications. Orlando: Academic Press, 1985, 267 pp.

Bell, D.A. & D.U. Davies. The Protection of Data by Cryptography. Middlesex, England: National Physical Laboratory, 1978, 50 pp.

Bell Telephone Laboratories. 131B2 Printer Station Equipment For Army and Navy Installations. Jan. 1944, 68 pp.

Bell, D.A. & S.E. Olding. An Annotated Bibliography of Cryptography. England: National Physical Laboratory, NPL Report COM 100, Jan. 1978, 19 pp.

Bell, E.L. An Initial View of Ultra as an American Weapon. Keene, NH: TSU Press, 1977, 110 pp.

Bellos, David. Georges Perec: A Life in Words: A Biography by David Bellos. Boston, MA: David R. Godine, Publishers, 1993, 802 pp.

Bendikson, L. The Restoration of Obliterated Passages and of Secret Writing in Diplomatic Missives. The Franco-American Review, Winter 1937, pp. 240-256.

Bennett, Ralph. Behind the Battle: Intelligence in the War with Germany, 1939-45. London, England: Sinclair-Stevenson, 1994, 328 pp.

Bennett, Ralph. Ultra in the West. NY: Charles Scribner's Sons, 1980, 336 pp.

Bennett, Ralph. Intelligence Investigations: How Ultra Changed History. Portland, OR: Frank c/o ISBO, 1996, 203 pp.

Bennett, Gari, Learner and Link. Frago North's Code Book. NY: Grosset & Dunlop, 1978, 24 pp.

Bennett, Ralph.  Ultra and Mediterranean Strategy.  NY: William Morrow & Co., 1989, 496 pp.

Bennett, D.H. An Unsolved Puzzle Solved. Cryptologic Spectrum (?), pp. 4-15.

Bennett, W.R., Jr. Introduction to Computer Applications for Non-Science Students (BASIC). Prentice-Hall, Inc., 1976, 207 pp.

Bennett, Richard. Espionage: An Encyclopedia of Spies and Secrets. NY: Virgin Publishing, 2002, 371 pp.

Benson, Donald C. The Moment of Proof: Mathematical Epiphanies. NY: Oxford University Press, 1999. 331 pp.

Benson, Robert L. A History of U.S. Communications Intelligence during World War II: Policy and Administration. Fort Meade, MD: NSA, Center for Cryptologic History, 1997, 184 pp.

__________. The Venona Story. Fort Meade, MD: NSA, Center for Cryptologic History, 62 pp.

Benson, Robert Louis & Michael Warner, eds. Venona: Soviet Espionage and the American Response, 1939-1957. Washington: National Security Agency & Central Intelligence Agency, 1996, 450 pp.

Bentley, John. Dark Disguise. London: Hutchinson & Co., 1945, 176 pp.

Berends, A.A. Chasing Enigma: Procurement of German Army Enigma messages in the North West Europe Campaign, 1944-45. Melbourne, Australia: Ancestral Publications, 1995, 24+ pp.

Bergen, John D. Military Communications: A Test for Technology. Washington: Center for Military History, USGPO, 1986, 515 pp.

Berkel, E. Telegraphic Cryptogram. Letter to the Editor, Scientific American, 12/11/15, p. 519.

Berkeley, E.C. Deciphering an Unknown Computer Program, as Compared With Deciphering of Ancient Writing. Computers and Automation, May 1972, pp. 19-26.

Berman, R.S.A. Cryptography. Part I: An Introduction to Code and Cypher. Part II: Code and Cypher. Part III. Brooklyn, NY: Mensa Bulletin, Oct. 1973, pp. 8,12; Dec. 1073, p. 7; Jan./Feb. 1974.

Berman, J.J. & Morton H. Halperin. The Abuses of The Intelligence Agencies. Washington: Center for National Security Studies, 1975, 185 pp.

Bernhard, R. The Ullman Code. NY: Beckley Medallion Books, 1976, 250 pp.

Bernstein, T., Bhimani, A.B., Schultz, E., and C.A. Siegel. Internet Security for Business. NY: John Wiley & Sons, Inc., 1996, 452 pp.

Beth, Thomas, Frisch, Markus and G.J. Simmons. Public-Key Cryptography: State of the Art and Future Directions. NY: Springer-Verlag, 1992, 97 pp.

Bertrand, Gustave. Enigma. Paris: Librairie Plon, 1973, 295 pp.

Beth, T., ed. Cryptography: Proceedings, Burg Feuerstein, 1982. Springer-Verlag, 1983, 402 pp.

Beth, T. N. Cot & I. Ingemarsson, eds. Advances in Cryptology. NY: Springer-Verlag, 1985, 489 pp.

Beth, T., P. Heb & K. Wril. Kryptographe. Stuttgart, Germany: B.G.T. Teubner, 1983, 205 pp.

Beutelspacher, Albrecht. Cryptology. Washington: Mathematical Association of America, 1994, 156 pp.

Bianchi, Chuck. The Code Talkers. NY: Pinnacle Books, 1990, 320 pp.

Bibbens, T. & J. Lake. Comint/Sigint-Our First Line of Defense. Countermeasures, March 1977, PP. 18, 38, 48, 63.

Bidwell, Col. Bruce W. History of the Military Intelligence, Department of the Army General Staff: 1775-1941. Frederick, MD University Pub. of America, 1986, 625 pp.

Bielewicz, J.A. Secret Language. Sydney, Australia: Holt, Rinehart & Winston, 1976, 126 pp.

Bielewicz, J.N. Secret Languages. NY: Elsevier/Nelson Books, 1980, 128 pp.

Biham, Eli. Fast Systems Encryption: 4th International Workshop, FSE '97 Proceedings. Springer-Verlag, 1997, 287 pp.

Biham, Eli and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. NY: Springer-Verlag, 1993, 188pp.

Binary Codes. Pythagoras, Vol. 1, # 4, 1969, pp. 70-74.

Binder, David. German Deciphers 50 Inca Symbols. New York Times, 7/29/70.

Bird, Kai. The Color of Money: McGeorge Bundy and William Bundy: Brothers in Arms. NY: Simon & Schuster, 1998, 409 pp.

Bixler, Margaret T. Winds of Freedom: The Story of the Navajo Code Talkers of World War II. Darien, CT: Two Bytes Publishing Co., 1992, 185 pp.

Blahut, Richard E., Costello Jr., Daniel J., Maurer, Ueli and Thomas Mittelholzer, eds. Communications and Crytography: Two Sides of One Tapestry. Norwell, MA: Klauer Academic Pub., 1994, 481 pp.

Blair, Charles. Notes on Cryptography. University of Illinois, 1991, 43 pp.

Blair, C.R. A Program for Correcting Spelling Errors. Information and Control 3, 60-67 (1960).

Blair, W. Cipher. Handwritten copy of article in Rees Encyclopedia, 1807.

Blair, Clay, Jr. Silent Victory. New York: Lippincott & Co., 1975, 1072 pp.

Blair, Clay. Hitler's U-Boat War: The Hunters, 1939-1942. NY: Random House, 1996, 809 pp.

___________. Hitler’s U-Boat War:The Hunted, 1942-1945. NY: Random House, 1998, 909 pp.

Blair, William Cipher. Rees's Cyclopedia, 1819, 32 pp.

Blake, I.F. & B.J. Walker. Computer Security & Protection Structures. Academic Press, 1977, 142 pp.

Blake, I.F., Gabriel Seroussi, and Nigil P. Smart. Elliptic Curves in Cryptography. NY: Cambridge University Press, 1999, 209 pp.

Blanc, Nero. The Crossword Murder. NY: The Berkley Pub. Group, 1999, 306 p.

Blakley, G.R. & D. Chaum. Advances in Cryptology: Proceedings of CRYPTO 84. NY: Springer-Verlag, 1985, 491 pp.

Blatman, P.J. A Feasibility Study of a Data Encryption Algorithm for Use in an Electronic Funds Transfer System. Thesis, June 1978.

Blatman, P.J. Methods of Modern Cryptanalysis. Spring 1975.

Bleakley, Jack. The Eavesdroppers. Canberra, Australia: Australian Government Publishing Service, 1992, 261 pp.

Blind Dates: How to Break the Codes on the Foods Your Buy. N.Y. State Consumer Protection Board, 1977, 50 pp.

Bloch, Gilbert. Fortitude: Histoire-et Prehistoire-de la Plus Celebre Operation D'Intoxication de las Seconde Guerre Mondiale. Paris, France: Gilbert Bloch, 1991, 61 pp.

Bloch, Gilbert. L'Autre "Ultra" "Magic": Les Decryptmente Americains Pendant La Seconde Guerre Mondiale. Paris, France: Gilbert Bloch, 1990, 40 pp.

Bloch, Gilbert. La Contribution Francaise a la Reconstitution Et au Decryptement De L'Enigma Militaire Allemande En 1931-1932. Revue Historique des Armées 1985) No. 161.

Bloch, Gilbert. Enigma Avant Ultra (1930-1940). Paris: Gilbert Bloch, 1988, 131 pp.

______________. La Contribution française à la reconstitution et au décryptement de l’Enigma militaire allemande en 1931-1932. Vincennes, France : Revue Historique Des Armées, Dec. 1985, pp. 17-25.

Bloch, Gilbert. "Enigma" Avant "Ultra" (1930-1940). 12/85 & 5/86.

Block, Jean Jacques & Daniel Temam. Decrypt' Or: 32 Jeux de Decodage. Paris, France: AFJ Sermap, 1988, 64 pp.

Blom, R. Encryption Methods in Data Networks. Reprint from Ericsson Technica No. 2, 1978.

Blom, R. An Upper Bound on the Key Equivocation for Pure Ciphers. Sweden: Linkoping University, 1979, Report LiTH-isy-I-0287, 10 pp.

Blom, R. On Pure and Related Ciphers. Sweden: Linkoping University, 1981, Internal Report LiTH-isy-1-0451, 34 pp.

Blom, R. A Lower Bound on the Key Equivocation for the Simple Substitution Cipher Applied on a Binary Memoryless Source. Sweden: Linkoping University, 1979, Report LiTH-isy-I-0288, 12 pp.

Blom, R. Information Theoretic Analyses of Ciphers. Sweden: Linkoping University, 1979, Dros. No. 41.

Blom, R. On Pure Ciphers. Sweden: Linkoping University, 1979, Report LiTH-isy-I-0286, 15 pp.

Blom, R. Bounds on Key Equivocations for Simple Substitution Ciphers. Sweden: Linkoping University, reprint from IEEE Transactions on Information Theory, Vol. IT-25, No. 1, Jan. 1979.

Blom, R. et al. Data Network Security, Part 3. A Scenario. Sweden: Linkoping University, Dept. of Electrical Engineering, 1978, 30 pp.

Blom, R. et al. Encryption Methods in Data Networks. Reprint from Ericsson Technics No. 2, 1978, 105 pp.

Blom, R. A Multiple User Secrecy System. Sweden: Linkoping University, 1979, Report LiTH-isy-I-0289, 28 pp.

Blom, R. et al. On Data Security in a Distributed Office Computer System. Sweden: Linkoping University, 1981, 47 pp.

Blum, Howard. I Pledge Allegiance ... The True Story of the Walkers'. An American Spy Family. NY: Simon & Schuster, 1989, 438 pp.

Blumenson, M. Will "Ultra" Rewrite History? Army, August 1978, pp. 42-48.

Bobbs-Merrill Co. Cipher post card and follow-up letter to promote new book, Secret and Urgent by Fletcher Pratt. 1939.

Boer War Long In History, One of its Puzzles Lingers. Sydney, OH: Linn's Stamp News, May 14, 1973, p. 14.

Boetzel, A. Methode einer Neuen Geheimschrift, Geheimtelegraphie, Geheimsprache, Geheimtelephone und Geheimdruck. Leipzig: F.A. Berger, 1900, 85 pp.

Bombaugh, C.C. Oddities and Curiosities of Words and Literature. NY: Dover Pub., 1961, 375 pp.

Bond, Raymond T., ed. Famous Stories of Code and Cipher. NY: Rinehart & Co., 1947, 342 pp.

Bond, Raymond T., ed. Famous Stories of Code and Cipher. NY: Collier Books, 1966, 383 pp.

Book Cipher System of the "Wehrmacht." English translation (13 pp.) of attached copy of 1937 (23 pp.) and 1940 (14 pp.) editions of German manual, Schlüsselanleitung für das Heftschlüsselverfahren. Berlin: 1937, 1940.

Bondi, Richard. Cryptography for Visual Basic: A Programmer’s Guide to Microsoft API. NY: John Wiley & Sons, 2000, 459 pp. Plus CD-ROM.

Borden, H.A. Cipher Codes. Scientific American Supp., Letter to Editor, 3/3/17, p. 139.

Borgmann, D.A. Beyond Language. NY: Charles Scribners' Sons, 1967, 338 pp.

Borgmann, D.A. Language on Vacation. NY: Charles Scribners' Sons, 318 pp., 1965.

Borosage, R.C. & John Marks, eds. The CIA File. NY: Grossman/Viking, 1976, 233 pp.

Borovicka, V.P. Scisle Tajne Szyfry. Warsaw: Wydawnectwo Ministertwa Obrony Narodowej, 1987, 348 pp.

Bosworth, C.E. The Section on Codes and their Decipherment in Qalqashandi's Subh Al-A' Sha. Journal of Semetic Studies, VIII (1963), 17-33.

Bosworth, B. Codes, Ciphers and Computers. Rochelle Park, NJ: Hayden Book Co., 1982, 259 pp.

Boucher, Anthony. The Case of the Baker Street Irregulars. NY: Carroll & Graf, 1986, 252 pp.

Bougon. Les dépâches chiffrées indéchiffrables. Revue Scientifique, 40(1887:2), 531-533.

Bourne, C.P. & D.F. Ford. A Study of the Statistics of Letters in English Words. Information and Control 4, 48-67 (1961).

Bowers, W.M. The Delastelle Cipher Systems, 100 pp.

Bowers, W.M. Decipherment of the Casanova Cryptogram. Casanova Gleanings, Vol. XIV, 1971, pp. 11-16.

Bowers, W.M. Practical Cryptanalysis, Vol. III, The Trifid Cipher. ACA, 1961, 54 pp.

Bowers, William. The Playfair Cipher - 21 pp., The Four Square Cipher - 18 pp., The Bifid Cipher - 61 pp., The Trifid Cipher - 55 pp., plus other articles on solving Bifids and Trifids. Typescript

Bowers, W.M. Practical Cryptanalysis, Vol. I, Digraphic Substitution. ACA, 1960, 48 pp.

Bowers, W.M. Practical Cryptanalysis, Vol. II, The Bifid Cipher, ACA, 1960, 48 pp.

Boyce, B. & G.F. Zimmer. K-7, Spies At War. NY: D. Appleton-Century Co., 1934, 312 pp.

Boyd, R.S. Our Codes Safe? L.I.Press, 6/20/71.

Boyd, Carl. Hitler's Japanese Confident: General Oshima Hiroshi and Magic Intelligence, 1941-1945. Lawrence, KS: University Press of Kansas, 1993, 271 pp.

Boyd, Colin, ed. Cryptography and Coding -- Proceedings, 5th IMA Conference, Dec. 1995. NY: Springer-Verlag, 1995, 291 pp.

_______________. Advances in Cryptology – Asiacrypt 2001. NY: Springer-Verlag, 2001, 601 pp.

Boyd, Carl. American Command of the Sea through Carriers, Codes, and the Silent Service: World War II and Beyond. Newport News, VA: The Mariners' Museum, 1995, 99 pp.

Boyer, Bruce H. The Solstice Cipher. NY: J.B. Lippincott, 1979, 312 pp.

Boyer, J.Q. R.T. Strohm & G.H. Pryor. Real Puzzles. Baltimore: The Norman, Remington Co., 1925, 271 pp.

Boyle, R.D. SINCGARS V-Secure Battlefield Communications for the 1980s. International Defense Review, 6/1977, pp. 1155-1157.

Brachet, Charles. De Nouveaux Appareils Cryptographie Pour Le Secret Des Messages. Paris: La Science et Las Vie, XLVI, 206, Aug. 1934, pp. 98-106.

Brandreth, G. Writing Secret Codes and Sending Hidden Messages. NY: Sterling Pub. Co., 1984, 128 pp.

Brands, Stepfan A. Rethinking Public Key Infrastructures & Digital Certificates: Building in Privacy. Cambridge: MA: The MIT Press, 2000, 314 pp.

Bransted, D.K., J. Gait & S. Katzke, Report of the Workshop on Cryptography in Support of Computer Security. U.S. Dept. of Commerce, NBSIR 77-1291, Sept. 1977, 61 pp.

Bransted, D.K. Data Protection Through Cryptography. Dept. of Commerce, N.B.S., Dimensions, Sept. 1975, pp. 195-197, 214-215.

Brassard, Gilles. Modern Cryptology. NY: Springer-Verlag, 1985, 114 pp.

Brawley, J.V. & Jack Levine. Equivalence Classes of Involutory Mappings. pp. 211-217.

Brassard, Gilles. Modern Cryptology: A Tutorial. NY: Springer- Verlag, 1988, 107 pp.

Brassard, Gilles, ed. Advances in Cryptology-CRYPTO '89 Proceedings. NY: Springer-Verlag Inc., 1990, 634 pp.

Brawley, J.V. & Jack Levine. Equivalence Classes of Linear Mappings With Application to Algebraic Cryptography, I & II. Duke Math Journal,Vol. 37 (1972) pp. 121-132, 133-142.

Brawley, J.V. & Jack Levine. Involutory Commutants With Some Applications to Algebraic Cryptography. Parts I & II. Berlin: Journal Fur die reine und Angewandte Mathematik, 1966-1967. Part I, pp. 20-43; Part II, pp. 1-24.

Breckinridge, S.D. The CIA and the U.S. Intelligence System. Boulder, CO: Westview Press, 1986, 364 pp.

Brémond, Charles. Les Ecritures Secrètes et Les Encres Mysterieuses dites sympathiques. Paris: Albin Michel, 48 pp.

Breton, T. & D. Beneich. Softwar. NY: Holt, Rinehart & Winston, 1986, 278 pp.

Breuer, William B. Undercover Tales of World War II. NT: Joh Wiley & Sons, Inc., 1999, 242 pp.

Brewer, A.M., ed. Abbreviations, Acronyms, Ciphers & Signs. Detroit: Gale Research Co., 1981, 323 pp.

Brickell, Ernest F. ed. Advances in Cryptology -- CRYPTO '92 Proceedings. NY: Springer-Verlag Inc., 1993, 593 pp.

Brigham, C.S. Edgar Allan Poe's Contributions to Alexander's Weekly Messenger. Worcester, MA: American Antiquarian Society, 1943, 83 pp.

Brigham, C.S. Edgar Allan Poe's Contributions to Alexander's Weekly Messenger. Folcroft Library Editions, 1973, 83 pp. Reprint of 1943 edition by American Antiquarian Society.

Brislawn, Capt. Mark G. Tactics and Techniques of Signal Communication for Infantry. Fort Monmouth, NJ: Signal School Pamphlet 19, 1929-30, 219 pp.

British Tell How They Learned Nazi Secrets. New York Times, November 10, 1974, p. 3.

Broadcaster's War Code Exposed. Radio News, November 1939, pp. 6-7, 59-61.

Brooke, M. 150 Puzzles In Crypt-Arithmetic. NY: Dover Pub., 1963, 72 pp.

Brooke-Hunt, Captain. Solution of Double Transposition, 5 pp. British War Office.

Broome, Captain Jack. Make a Signal! London, England: Putnam, 1955, 224 pp.

Brown, Anthony Cave. Bodyguard of Lies. NY: Harper & Row, 1975, 947 pp.

Brown, Anthony C. The Last Hero: Wild Bill Donovan. NY: Times Books, 1982, 891 pp.

_____________. “C:” The Secret Life of Sir Stewart Graham Menzies. NY: Macmillan Pub. Co., 1988, 530 pp.

Brown, Dan. Digital Fortress. NY: St. Martin’s Press, 1998, 372 pp.

Brown, R.L., ed. History of Italian Cipher. App. II, Vol. II, Calendar of State Papers ... in Northern Italy. London, 1867, 4 pp.

Brown, 1st Lt. Wayne M. Enigma, The Greatest Naval Captive of WW II. Shipmate, May 1982, 34-35.

Brownell, G.A. The Origin and Development of the NSA. Laguna Hills: Aegean Park Press Reprint, 1981, 98 pp.

Brumbaugh, R.S. The Most Mysterious Manuscript: The Voynich "Roger Bacon" Cipher Manuscript. Southern Illinois University Press, 1978, 175 pp.

Brumbaugh, R.S. The Solution of the Voynich "Roger Bacon" Cipher. New Haven: The Yale University Library Gazette, April 1975, Vol. 49, No. 4, 347-355.

Brumbaugh, R.S. The Voynich "Roger Bacon" Cipher Manuscript: Deciphered Map of Stars. Reprint from Journal of the Warburg and Courtauld Institutes. Vol. xxxix, 1976, pp. 137-151.

Brunner, E.R. Efficient Speech Scrambling: An Economic Solution to the Secure Voice Communication Problem. Reprint from Conference, GB, June 8-11, 1976, 4 pp.

Brunner, John W. OSS Weapons. Williamstown, NJ: Phillips Pub., 1994, 206 pp.

Bryan, W.G. Cryptographic ABC's. American Cryptogram Association, 120 pp.

Bryan, W.C. Unmasked Secrecy. Official Detective Stories, Sept. 1958, Oct. 1958, Nov.-Dec. 1958, Jan.-Feb. 1959.

Bryan, William G. Practical Cryptanalysis, Volume V, Cryptographic ABC's; Vol. II, Periodic Ciphers-Miscellaneous. ACA, 1967, 46 pp.

Bryan, W.G. Practical Cryptanalysis. Vol. IV, Cryptographic ABC's, Vol. I, Substitution and Transposition Ciphers. ACA, 1967, 46 pp.

Bryce, H. The NBS Data Encryption Standard: products and principles. Mini-Micro Systems, March 1981, pp. 111-112, 114-116.

Bryden, John. Best-Kept Secret: Canadian Secret Intelligence in the Second World War. Toronto, Canada: Lester Publishing Ltd., 1993, 390 pp.

Brzeski, Rofal. Enigma Laduje W Normandii. Warsaw: Wydownictivi Ministerstiva Obrony Narodowej, 1982, 112 pp.

Buchanan, Percy. Introductory Lessons in the Study of Japanese. NP: The Cryptographic School, ND, 124 pp. Stamped RESTRICTED on each page.

Buchmann, Johannes. Introduction to Cryptography. NY: Springer-Verlag, 2000, 281 pp.

Budge, E.A.W. The Rosetta Stone. London: British Museum, 1955, 8 pp.

Budge, Sir E.A. Wallis. Egyptian Language: Easy Lessons in Egyptian Hieroglyphics With Sign List. NY: Barnes & Noble Books, 1993 reprint, 246 pp.

Budiansky, Stephen. The Code War: The Code-Breaking Machines of World War II took data-processing technology to its very limits in the era before computers. NY: American Heritage of Invention & Technology, Summer 2000, vol. 16/no. 1, pp. 36-43.

_________. Battle of Wits: The Complete Story of Codebreaking in World War II. NY: The Free Press, 2000, 435 pp.

Bulliet, Richard. The Sufi Fiddle. NY: St. Martin's Press, 1991, 182 pp.

Buonafalce, Augusto. Giovan Battista Bellaso E Le Sue Cifre Polialfabetiche. Milano, Italy: Augusto Buonafalce, 1990, 19 pp.

Buonafalce, Augusto. Leon Battista Alberti E L'Invenzione Della Cifre Polialfabetica. Milano, Italy: Augusto Buonafalce, 1990, 132 pp.

Buranelli, V. & N. Spy/Counter Spy: An Encyclopedia of Espionage. NY: McGraw-Hill, 1982, 361 pp.

Buranelli, P. F.G. Hartawick & M. Petherbridge. The Cryptogram Book. NY: Simon & Schuster, 1928, 138 pp.

Burchard, H. Cryptanalysts on a Va. Treasure Hunt. Washington Post, 4/17/72, pp. C1-C2.

Burke, Colin. Information and Secrecy: Vannevar Bush, Ultra and the Other Memex. Metuchen, NJ: Scarecrow Press, 1994, 466 pp.    Inscribed by author.

Burleson, R.R. Cryptograms and How to Solve Them. TX: Educator Books Inc., 1972, 83 pp.

Burnett, E.C. Ciphers of the Revolutionary Period. American Historical Review, Jan 1917, pp. 329-334.

Burnett, Steve & Stephen Paine. RSA Security’s Official Guide to Cryptography. Berkeley, CA: Osborne/Mc Graw-Hill, 2001, 420 pp., plus CD-ROM.

Burnham, D. The Rise of the Computer State. NY: Random House, 1983, 273 pp.

Burton, Hal. Cracking the Code. A review of The Ultra Secret. Newsday, Nov. 27, 1974, P. 8A.

Burton, E.E. An Enhanced ADFGVX Cipher System. Dr. Dobbs Journal, Feb. 1985, pp. 48-52, 54-58, 60-62, 64-66, 68-70.

Bush, V. Pieces of the Action. NY: William Morrow & Co., 1970, Xerox copy of pp. 192-195.

Butler, J.B. Ciphers and Codes. An Cosantoir, pp. 70-74.

Butler, William S. & L. Douglas Keeney. Secret Messages: Concealment, Codes and Other Types of Ingenious Communications. NY: Simon & Schuster, 2001, 192 pp.

Butters, Lindsay. Bletchley Park: Home of Station X. Hampshire, UK: Pitkin Guides, 16 pp.

Buydos, John, comp. With David Kahn. Cryptology, LC Science Tracer Bullet. Washington: Library of Congress, Science & Technology Division, 1997, 16 pp.

Byrne, J.F. Silent Years: An Autobiography with Memories of James Joyce and Our Ireland. NY: Farrar, Straus & Young, 1953, 307 pp.

Byrne, J.F. Chaocipher-The Ultimate Elusion. J.F. Byrne, 1937, 10 pp.

Cadie, J.W. & J. Ober. The Craft of the Ancient Historian: Essays in Honor of Chester G. Starr. Lanham, MD: University Press of America, 1985, 458 pp.

Callimahos, L.D. Cryptology. Encyclopaedia Britannica, 15th edition, 1974, pp. 322-333.

Callimahos, L.D. The Legendary William F. Friedman. A lecture at the 41st annual convention of the American Cryptogram Association. NY: Pace University, August 24, 1974, 18 pp.

Callimahos, L.D. Codes and Ciphers. World Book Encyclopedia, vol. 4, pp. 605-608.

Callimahos, L.D. Communications With Extraterrestrial Intelligence. IEEE Spectrum, March 1966, pp. 155-159.

Callimahos, L.D. & W.F. Friedman. Military Cryptanalytics, Part II. Fort George G. Meade, MD: National Security Agency, 1959, 634 pp. (See listing under Friedman & Callimahos for Part 1.)

Callimahos, L.D. Military Cryptanalytics, Part III. Fort George G. Meade, MD: National Security Agency, 1977, 664 pp. (Sanitized Xerox copy)

Calvi, F. & O. Schmidt. Intelligence Secretes: Annales de L'Espionnage. Paris, France: Hachette, Inc., 1988, 309 pp.

Calvocoressi, Peter. Top Secret Ultra. Pantheon Books, 1980, 132 pp.

Calvocoressi, Peter. Top Secret Ultra (Revised edition). Kidderminster, England: 2001, 158 pp.

Calvocoressi, Peter. The Ultra secrets of Station X. London Sunday Times Weekly Review, Nov. 24, 1974, pp. 33-34.

Calvocoressi, P. When Enigma Yielded Ultra. The Secrets of Enigma. The Value of Enigma. London: The Listener. Jan. 20, 1977, 70-71; Jan. 27, 1977, 112-114; Feb. 3, 1977, 135-137.

Camp, John. The Fool's Run. NY: Henry Holt & Co., Inc., 1989, 254 pp.

Campaigne, H. Cryptanalysis, Encyclopedia of Computer Science and Technology. NY: Marcel Dekker, 1977, 434-447.

Campbell, J.P. The Ultra Revelations: The Dieppe Raid. Canadian Defence Quarterly, Vol. 6, No. 1, Summer 1976, p. 36-42.

Campbell, D. Secret Service. NY: Gloucester Press, 1988, 32 pp.

Campbell, D. Secrecy for its own sake. New Statesman, 7/23/82, 6-8

Campbell, D. & L. Melvern. America's big ear on Europe. New Statesman, July 18, 1980, pp. 10-14.

Campbell, D. Threat of the Electronic Spies. New Statesman, Feb. 2, 1979, 142-145.

Campbell, D. Whose Eyes On Secret Data? New Scientist, March 2, 1978, 593-595.

Campbell, D. Surveillance Électronique Planétaire. Paris: Éditions Alia, 2000, 169 pp.

Candela, Rosario. Cryptography Part I. NY: Cardanus Press, 1942, 28 pp.

Candela, Rosario. Isomorphism and its Applications in Cryptanalysis. NY: Cardenus Press, 1946, 31 pp.

Candela, R. Cryptography Course Notes.

Candela, R. The Military Cipher of Commandant Bazeries. NY: Cardanus Press, 1938, 137 pp.

Cantwell, John D. The Second World War: A Guide to Documents in the Public Record Office. Surrey, U.K.: Public Record Office, 1999, 224 pp.

Capocalli, Renato M. ed. Sequences: Combinatorics, Compression, Security, and Transmission. NY: Springer-Verlag, 1990, 549 pp.

Capt. L.F. Safford, Navy Codes Expert. New York Times Obituary, May 18, 1973.

Capt. A.D. Kramer, Navy Code Expert. New York Times Obit. Oct. 10, 1972.

Captured Russian 2-Digit Code. 2 pp. microfilm print (poor) T-314:150:921, T-314:150:923.

Careers at NSA. Unpaged folder, N.D.

Carey, Col. Arthur T. The Effect of Ultra on the World War II North African Campaign. US Army War College, Study Project, 1982, 53 pp.

Carle, Eric. The Secret Birthday Message. NY: T.Y. Crowell Co., 1972.

Carleial, A.B. & M.E. Hellman. A Note on Wyner's Wiretap Channel. IEEE Trans. on Information Theory, May 1977, 387-390.

Carlgren, Wilhelm M. Svensk Underrättelse Tjänst 1939-1945. Stockholm: Liber Allmänna Förlahet, 1985, 210 pp.

Carmel, Hedi, ed. Intelligence for Peace: The Role of Intelligence in Times of Peace. London: Frank Cass Publishers, 1999, 264 pp.

Carroll, J.M. Computer Security. Stoneham, MA: Butterworths, 1987, 446 pp.

Carlson, John Roy. Under Cover. NY: E.P. Dutton, 1943, 544 pp.

Carroll, John M. Secrets of Electronic Espionage. NY: E.P. Dutton & Co., 1966, 224 pp.

Carroll, James.  Firebird.  NY: E.P. Dutton, 1989, 437 pp.

Carter, Frank. Codebreaking with the Colossus Computer. Bletchley Park, England: BP Trust, Report No. 1, 1996, 20 pp.

Carter, Frank. Codebreaking with the Colossus Computer: An Account of the Methods used for Finding the K-wheel settings, including an illustration. Bletchley Park, England: BP Trust, Report No. 3, 1997, 12 pp.

Carter, Frank. Codebreaking with the Colossus Computer: Findiong the K-wheel Patterns. An account of some of the techniques used, with a full illustrative example. Bletchley Park, England: BP Trust, Report No. 4, 1997, 37 pp.

____________. The First Breaking of Enigma: Some of the Pioneering Techniques developed by the Polish Cipher Bureau. Bletchley Park, England: Bletchley Park Trust, Report No. 10, July 1999, 36 pp.

Carter, frank and John Gallehawk. The Enigma Machine and the Bombe: The Story of the Breaking of the Enigma Cipher over the period 1932-1945. Bletchley Park, England: Bletchley Park Trust, Report No. 9 revised edition, July 1999, 20 pp.

Carter, Nick. The Ultimate Code. NY: Award Books, 1975, 172 pp.

Carter, C.H. The Western Powers, 1500-1700. Chapter 6. Code, Cypher and Security, 233-259. Ithaca, NY: Cornell University Press.

Carter, Nick. The Tarlov Cipher. NY: Charter Books, 1985, 175 pp.

Cartier, General. Un Problème de Cryptographie et d'Histoire. Paris, France: Mercure De France, 1938, 334 pp.

Cartier, H. Le Service d'écoute pendant la guerre. Radioélectricité, 4(1923), 453-460, 491-498.

Cartier, H. Le Secret en radiotélégraphie. Radioélectricité, 6(1925), 444-445, 465-467; 7(1926), 6-10, 84-89, 142-144; cont'd as Télégraphie et radiotélégraphie secrète, ibidem, 7(1926), 275-278, 297-301.

Casler, Dave. The Fox Hunt Adventure. Mississippi State, MS: MFJ Enterprises, 1992, 136 pp.

Ceillier, Rémi. La Cryptographie. Paris: Presses Universitaires De France, 1958, 134 pp.

Center for Cryptologic History. Open Sources on Cryptology. Fort Meade, MD: National Security, 63 pp.

Chacko, David. The Black Chamber. NY: St. Martin's Press, 1988, 294 pp.

Chacko, David. White Gamma. NY: St. Martin's Press, 1988, 278 pp.

Chadwick, John. The Decipherment of Linear B. NY: Cambridge University Press, 1970, 164 pp.

Chadwick, John. The Decipherment of Linear B. NY: Random House, 1958, 157 pp.

Chadwick, John. The Decipherment of Linear B. NY: Cambridge University Press, 1990, 164 pp.

Chambers, R.W. Who Goes There. NY: A.L. Burt Co., 1915, 340 pp.

Chant, Christopher. The Encyclopedia of Codenames of WW II. NY: Methuen, Inc., 1988, 344 pp.

Chapman, J.W.M. The Polish Connection: Japan, Poland and the Axis Alliance. Proceedings of the British Association for Japanese Studies, v. 2, 1977.

Chapman, J.W.M. The Price of Admiralty: The War Diary of the German Naval Attache in Japan, 1939-1943, Vol. I & Vol. II. East Sussex, England: Saltire Press, Vol. I, 1982, 241 pp.; Vol. II, 1984, 382 pp.

Chapman, John W.M. Signals Intelligence Collaboration among the Tripartite Pact States on the Eve of Pearl Harbor. Oxford, England: Japan Forum, Vol. 3, No. 2 (Sept. 1991) 231-256.

Chapman, John W.M. The Price of Admiralty: The War Diary of the Naval Attache in Japan, 1939-1943, vol. IV, 10 September 1941-31 January 1942. East Sussex, England: Saltire Press, 1990, 530 pp.

Chapman, J.W.M. German Signals Intelligence and the Space War. Proceedings of the British Association for Japanese Studies, v. 4(1979) 131-149.

Chapman, Sally. Raw Data. St. Martin’s Pres, 1991, 266 pp.

Char, Ben-Zion. Two Issues in Public Key Cryptography, RSA Bit Security and a New Knapsack Type System. Cambridge, MA: The MIT Press, 1986, 78 pp.

Chase, P.E. Mathematical Holocryptic Cyphers. The Mathematical Monthly, 1(1859) 194-196.

Chasiain, D.K. Security vs. Performance. Datamation, Nov. 1973, pp. 110-111, 116.

Chaum, D. ed. Advances in Cryptology: Proceedings of Crypto '83. NY: Plenum Press, 1984, 395 pp.

Chaum, D. & W.L. Price, eds. Advances in Cryptology: Proceedings of Eurocrypt '87. NY: Springer-Verlag, 1988, 314 pp.

Chaum, D. R.L. Rivest & A.T. Sherman. Advances in Cryptology: Proceedings of Crypto '82. NY: Plenum Pub. Co., 1983, 331 pp.

Cherpak, Evelyn M., Compiler. A Guide To Archives, Manuscripts,And Oral Histories In The Naval Historical Collection. Newport, RI: Naval War College, 1987, 70 pp.

Chesson, F.W. Computers and Cryptology. Datamation, Jan. 1973, pp. 62-64, 77-81.

Chesson, F.W. Computer Cryptography - How To Decipher Secret Messages. Radio-Electronics, Dec. 1977, 48-50 pp.

Chesson, F.W. World War II's Legacy to Digital Techniques. ROM magazine, March/April 1978, pp. 92-94.

Chesson, F.W. Crypto Corner (Articles in Electronic Engineering Times) Aug. 13, 1973; Nov. 5, 1973; Jan. 14, 1974; Feb. 11, 1974; Mar. 11, 1974; April 8, 1974; July 15, 1974; Sept. 23, 1874.

Chesson, F.W. Computers and Cryptography. ROM magazine, Jan.
1978, pp. 98-99.

Chevrillon, Claire. Code Name Christine Clouet: A Woman in the French Resistance. College Station, TX: Texas A&M University Press, 1995, 221 pp.

Childs, J.R. The Voynich Manuscript Revisited. NSA Technical Journal. Special Linguistics Issue III, 1976-1978, pp. 13-16.

Childs, J.R. Vignettes, or Autobiographical Fragments. NY: Vantage Press, 1977, 216 pp.

Childs, J.R. German Military Ciphers From February To November, 1918. Technical paper of the Signal Intelligence Section, War Plans and Training Division, Office of the Chief Signal Officer, 1935, 55 pp.

Childs, J.R. The History and Principles of German Military Ciphers, 1914-1918. Paris, 1919, 212 pp.

Childs, J.R. On the Italian and South Eastern Front, 7 pp. n.d. System in Use by the Germans Between Berlin and Constantinople n.d., 6 pp. plus "A,"  6 pp., "B," 4 pp.; "C," 3 pp. & "D," 2 pp.  Experimentation With Our Code, 5/17/18, 5 pp. Trans.of a captured German Document. Instructions for Grill-Process in Ciphers. 10/23/18, 4 pp. Code Used by German Agents, 11/7/18, 3 pp.

Chiles, James R. Breaking codes was this couples career. Smithsonian,June,1987,pp.128-130,132,134,136,138,140,142,144.

Chirillo, John. Hacker Attacks Denied: A Complete Guide to Network Lockdown. NT: John Wiley & Sons, Inc., 2001 491 pp. with CD-ROM.

Chirillo, John. Hacker Attackes Revealed: A Complete Reference with Custom Security Hackig Toolkit. NY: John Wiley & Sons, Inc., 2001, 994 pp. with CD-ROM.

Chmora, Andrew & Stephen B. Wicker, eds. Error Control, Cryptology and Speech Compression. NY: Springer-Verlag, 1994, 121 pp.

Chrisman, Oscar. The Secret-Language of Childhood. Century Magazine, May 1898, Vol. 56, pp. 54-58.

Christoffersson, P. et al. Crypto Users's Handbook: A Guide for Implementation of Cryptographic Protection in Computer Systems. NY: Elvesier Science Pub. Co., Inc. 1988, 94 pp.

Churchhouse, Robert F. Codea and Ciphers: Julius Caesar, the Enigma, and the internet. NY: Cambridge Univeristy Press, 2002, 240 pp.

Churchyards of Trinity Parish In the City of New York. NY: Corporation of Trinity Church, 1969, 102 pp.

Cilley, F.H. Secret Writing, Its Principles and Methods. May 1890, 59 pp. Retyped.

Cipher Debunked But Not Decoded. New York Times, May 6, 1975, pp. 41, 54.

Cipher Messages Printed by Disk Machine. Popular Mechanics, Sept. 1933, p. 384.

Cipher Items Added. Air Force Times, 9/15/71.

Ciphers and Cipher Keys. Living Age, Vol. 33, 9/15/27, pp. 491-495.

Ciphers With Pseudo-Random Keys: A Progress Report. 5 pp.

Civil War Cipher Telegrams. Xerox copies from F.W. Chesson.

Clark, R. The Man Who Broke Purple. Little, Brown & Co., 1977, 271 pp.

Clark, J.F., Allen, W.W. & D.H. Klooster. Computers and Information Processing: Concepts and Applications. Cincinnati: South Western Pub. Co., 1990, 512 pp.

Clarke, Brig. Gen C.W. Statement for record of participation of Brig. Gen. C.W. Clarke in the transmittal of letters from Gen. G.C. Marshall to Gov. T.E. Dewey the latter part of September 1944.  14 pp.

Clarke, Thurston. Pearl Harbor Ghosts: A Journey to Hawaii Then and Now. NY: William Morrow & Co., 1991, 411 pp.

Clarke, Barry R. Puzzles for Pleasure. NY: Cambridge University Press, 1994, 118 pp.

Cleator, P.E. Lost Languages. NY: Mentor Books, 1962, 192 pp.

Clemente, Frank A. The Israeli Secret Services. New Brunswick, NJ: Transaction Books, 1996, 103 pp.

Clift, D. The Spy in the Room. NY: Mystery House, 1944, 255 pp.

Cline, M.W., ed. Teaching Intelligence in the Mid-1980s. Washington: National Intelligence Study Center, 1985, 111 pp.

Cline, M.W., C.E. Christiansen & J.M. Fontaine, eds. Scholars Guide to Intelligence Literature. Frederick, MD: University Publications of America, Inc., 1983, 236 pp.

Clodd, E. The Story of the Alphabet. D. Appleton-Century Co., 1935, 209 pp.

Cochran, Jr., A.S. The MAGIC Diplomatic Summaries: A Chronological Finding Aid. NY: Garland Pub., Inc., 1982, 139 pp.

Cochran, Jr. A.S. "Magic," "Ultra," and the Second World War: Literature, Sources, and Outlook. Military Affairs, vol. XLVI, No. 2, April 1982, 88-92.

Cochran, Jr., A.S. Protecting the Ultimate Advantage. Military History, June 1985, 42-49.

Code-Breakers' Work Presented to Library. Washington Star, 8/15/71.

Coded Cablegrams Sent By Russian Government in 1880 to Boston Resident.

Codes and Ciphers. American Mathematical Monthly, Nov. 1919, pp. 409-413.

Codes Are Fragile. Spring 3100, April 1952, pp. 10-13.

Codes Used By Spies. New York Times Magazine, 11/9/41, p. 24.

Code-Words. Compiled by Crosswords Unlimited. NY: Pinnacle Books, 1973, 160 pp.

Coe, Michael D. Breaking The Mayan Code. NY: Thames and Hudson, 1992, 304 pp.

Cohen, Frederick B. Protection and Security in the Information Superhighway. NY: John Wiley & Sons, 1995, 301 pp.

Col (Colin Leveridge). Codes and Ciphers. Gloscow, Scotland: Brown, Son & Ferguson Ltd., 1964, 30 pp.

Col. Parker Hitt, 93, Cryptology Expert. New York Times, Obituary, 5/28/71.

Coleman, S.J. Quaint Cryptograms, Curious Codes and Strange Shorthand. Douglas, England: Folklore Academy, 1962, 12 pp.

Collection of Papers Related to the "Winds Execute" Message. SRH-210. U.S. Navy, 1945, 80 pp.

Collon, August. Étude sur la Cryptographie Son emploi à la guerre et dans la diplomatie. Tome I, II, III. Brussels, Belgium: Extract from Revue de l'armée Belge, Tome I, 1899, 201 pp.; Tome II, 1902, 224 pp.; Tome III, 1905, 103 +pp.

Colomer, D. Trodomiro De Aguilar. Criptografia por el Consejero de Embajada.

Commercial Codes. Nation's Business, June 1948, 82-83.

COMMERCIAL CODE BOOKS(63 TITLES)

Acme Complete Seven Figure Code. NY: Acme Code Co., 8 pp.
Adams Cable Code. Boston, MA: Financial Publishing Co., 1925, 201 pp.
Anaconda Telegraph Code, 1958, 626 pp.
Arnold, W.E. Arnold’s Cipher No. 4. The Improved Railroad Telegraphic Cipher. Louisville, KY: The Standard Printing Co., 1883, 147 pp.
Bankers’ International Code Tables. 1929, 58 pp.
Bentley, E.L. Bentley’s Complete Phrase Code Improved. Allied Code Co., 1918.
Bentley. E.L. Bentley’s Complete Phrase Code.1909, 346 pp.
Bentley. Bentley’s Complete Phrase Code (American Edition). NY: Allied Code Co., 211 pp. plus supplement.
Bentley. Bentley’s Complete Phrase Code. London: Rose Printing Co., 1921, 291+ pp.
Bernard, D.H. The Nautical Telegraph Code Book. Glasgow: J. Brown & Son, 1907, 158 pp.
Biedermann, C.L. Bio Code. Hamburg: L. Friederichsen & Co., 1933, 24 pp.
Boe, C. Commercial Phrase and Shipping Code. Washington: Judd & Detweiler, 1927, 467 pp.
Brüel, W. Clave Telegráfica Colon de Viaje. Hamburg : Brüel & Co., 1924, 553 pp.
Clausen-Thue, W. The ABC Universal Commerical Electric Telegraphic Code. London: Eden Fisher & Co., 1883, 480 pp.
Clausen-Thue, W. Clave Telegrafica ABC. NY: American Code Co., 1915, 1511+ PP.
Clausen-Thue, W. The ABC Code, Fifth Edition. NY: American Code Co., 1923, 1485 pp.
Clave “Commerical” Con Apendice. NY: Standard Code Co., 1922, 835 pp. plus app.
Commercial Telegraph and Cable Code. NY Standard Code Co., 1916, 835 pp. plus supp.
Eldridge’s Thirteen Figure Code. NY: American Code Co., 1926, 9 pp.
Evans, J. The Evans Basic English Code. Chicago: John & Clarence Evans, 1947, 100pp.
Farquhar, C. Cosmo Cipher Words [code]. NY: American Code Co., 1913.
Fiske, A.B. Fiske’s Stock Exchange and Commodity Code. NY: Fiske-Howard Code Co., 1926, 188 pp.
General Telegraph Code. NY: Business Code Co., 1922, 1036 pp.
Hartfield, J.C. Hartfield’s “Lisbonian” Selection of Roots and Terminals Contaning 21,323 five letter words . . .[code]. NY: Hartfield Tel. Code Pub. Co., 1911.
Harvey, Henry. Harvey’s Acnos Code. NY: American Code Co., Reprint of 4th edition of 1892, 110 pp.
Krohn, C.H.C. Bischstaben-und Zahlen-Systeme für die Chiffrirung von Telegrammen, Briefen und Postkarten. Berlin, 1873.
Krohn, C.H.C. Systeme für die Chiffrirung von Telegrammen, Briefen und Telegrammen, Berlin, 320 pp/ Xerox.
Lieber, B. Franklin. Clave Telegráfica Americana De Cinco Letras De Liebler. NY : Lieber Code Co., 1911, 800 pp.
Lieber, B.F. Lieber’s Five Letter American Telegraphic Code. NY: Lieber Code Co., 1915, 800 pp.
Lombard Code Service. London: Code Services, Ltd., 1933, 19pp.
Mackay, C.H. Cable Code. NY: American Code Co., 1925, 64 pp.
Phillips, Walter P. The Phillips Code (Bi-Centennial reprint of 1925 edition). Orland Park, IL: Harwell E. West, 1975, 64+ pp.
Pocket Blank Code – Number Five. NY: American Code Co./ 1934, 64 pp.
Privare Code.London: Morgan Lyons & Co., 9 pp.
Reiss, E. “Simplex” Private Code Tables. NY : Simplex Code Co., 1910, 88 pp.
Rice Journal’s Telegraph. Crowley, LA : Signal Pub., 84 pp.
Robinson, S.L. The Robinson Telegraphic Cipher. Chicago: Grain Dealers Journal, 1897. 103 pp. plus supplement.
Robinson, S.L. The Robinson Telegraphic Cipher. Chicago: N.N., 1897, 103 pp. plus 29 pp. supplement.
Rolllins, M. Fifth Montgomery Code. London: G. Routledge & Sons, 1910, 616 pp.
Schofield, R. Schofield’s Eclectic Phrase Code. 1914, 591 pp.
Shepperson, A.B., arranger. The Standard Telegraphic Cipher Code for the Coton Trade. NY: Shepperson Pub. Co. 1915(?)
Simplex Cryptograph: A Complete Cipher for General Use. Providence, RI: Cryptograph Co., 1902, 642 pp.
Standard Railway Cipher Code. Chicago: C.G. Phillips, 1900, 63 pp.
Streffleur, M. von. Telegramm-Codex. Vienna: In Commision Bai Kael Konegen, 1900, 132 pp.
Sunderland & Megson. Lombard General Code and Whitehall Secret Cipher. London: Code Services, Ltd. XVI pp.
The 1931 International Code of Signals. American Edition. Vol. 2. For Radio Signaling. Washington: USGPO, 1933, 418 pp.
The 1931 International Code of Signals. American Edition (reprinted 1937). For Visual and Souind Signaling.Washington: USGPO, 1937, 362 pp.
The Millers’ Telegraphic Cipher. Kansas City, MO: The Southwestern Miller, 1936, 154 pp.
“Unicode”: The Universal Telegraphic Phrase-Book, London: Cassell and Co., Ltd. 1899, 358 pp. (poor copy)
Universal Trade Code. NY: Code Compilling Co., Inc., 1921, 634+ pp.
Vollers,R. Vollers’ 12 Figure-System [code]. Hamburg: R. Vollers, 1907, 12 pp.+
Western Union Telegraphic Code. NY: Western Union, 804 pp.
Western Union Telegraphic Code. NY: International Cable Directory Co., 1902, 1812 pp.
Western Union Travelers’ Cable Code. The Western Union Telegraph Co., N.D.(probably 1940s), 54 pp.
Williams, J. & J. Ribeiro. Two-In-One Code Condenser. London: Codes Ltd., 1910, 88 pp.
Wilwerth, T.C. The Atlas Paper United Telegraph Code. NY: Central Code Bureau, 1933, 979 pp.
Wilwerth, T.C. The Central 7-Figure Code Condenser. NY: Central Code Bureau, 1933, 4 pp.
Wilwerth, T.C.Codem [code book]. NY: Codem Book Co., 1921, 616 pp.
Wilwerth, T.C. Commodity Exchange Code. NY: The Central Code Bureau, 1948, 319 pp.
Wilwerth, T.C. Commerical Telegraph and Cable Code. NY: The Codem Co., 1927, 835 pp. plus supplement.
Wilwerth T.C.United Telegraph Code plus separate XYZ Code Section (40 pp.)NY: The Central Code Bureau, 1933, 979 pp.
Witthöft, J. Modelle für Privat-Codes and Schlüssel. Karlsruhe und Leipzig.
Wood, Henry E. The Ttraveller’s Code Book. Garden City, NY: Doubleday, Page & Co., 1924, 131 pp.
Yopp, William I. Yopp’s Cipher Code – Sixth Edition. Dallas: Dorsey Co., 1912, 60 pp.
Yopp, William I. Yopp’s Ciper Code – Eighth Edition. Dallas: Dorsey Co., 1921, 116 pp.
END Commerical Code Books

Committee Takes Own Advice, Names Secret Agency. Congressional Quarterly, 12/22/73, pp. 3372-3375.

Compilation of Intelligence Laws and Related Laws and Executive Orders of Interest to the National Intelligence Community. Asamended through June 8, 1993. Washington: USGPO, 1993, 675 pp.

Compromise of Naval Code F-3. Washington: Chief of Naval Operations, 1925, 4 pp.

Computer Security. Washington: Mosaic, vol. 9, no. 4, July/Aug. 1978, pp. 2-10.

Computer Security. Chicago: Time-Life Books, 1986, 128 pp.

Computing Technology. A Bibliography of Selected Rand Publications. Santa Monica: The Rand Corporation, 1973, 115 pp.

COMSEC ’81 Communications Security Seminar and Exhibition. Washington, DC., 1981. Binder with speakers’ remarks and list of exhibitors with available promotional material.

Comstock, Lt. I.W. Radio Intelligence and Security. USN CSP 463, lecture delivered before Postgraduate students, 22 June 1926, 8 pp.
 

Conklin, Dr. W.H. The Conklin Cryptogram. A True Cipher. Two Xerox pages plus Conklin letter and other material.

Connell, C. The Hidden Catch. San Francisco: Interservice Pub. Co., 1981, 176 pp.

Connington, J.J. Gold Brick Island. Boston: Little, Brown and Co., 1933, 310 pp.

Conover, Lee. Gilbert Signal Engineering. New Haven, CT: A.C. Gilbert, 1920, 116 pp.

Conradus, D.A. Cryptographia Denudata: The Art of Deciphering Deduced from Principles ... The Gentleman's Magazine, 12 (1742) 133-135, 185-186, 241-242, 473-475.

Consortium for the Study of Intelligence. Resource Reports on Intelligence for Teaching Faculty. NY: National Strategy Information Center, 1985, 107 pp.

Consortium for the Study of Intelligence. Resource Reports on Intelligence for Teaching Faculty. Washington, DC: National Strategy Information Center, 1992, 38 pp.

Constantinides, G.C. Intelligence and Espionage: An Analytical Bibliography. Boulder, CO: Westview Press, 1983, 559 pp.

Contenau, Dr. G. La Cryptographie En Egypte et En Mesopotamie. Mercure De France-1-VI-1952, pp. 349-356.

Cook, C.E. Ellersick, F.W. et al. Spread-Spectrum Communications. IEEE Press, 1983, 286 pp.

Cook, MG Earle F. Electronic Black Chamber. Army, Sept. 1962, pp. 37-40.

Cook, B.F. Greek Inscriptions. Berkeley, CA: University of Cal. Press, 1987, 64 pp.

Cook, Nancy. Secret Codes: Real-World Mathematics Through Science. Reading, MA Dale Seymour Pub. c/o Addison-Wesley-Longman, 1997, 136 pp.

Cook, Terry L. Big Brother NSA and Its “Little Brothers”: The National Security Agency’s Global Surveillance Network. Bend, OR: SCM Publishers, 1998, 421 pp.

Cooke, Jean. Codes and Ciphers. East Sussex, England: Wayland (Publishers) Ltd., 1990, 32 pp.

Coon, W.E. Methods For the Suppression of Periodicity As Applied to Multiple Alphabet Ciphers. Detroit: July 1935, rev. May 1956, 169 pp.

Coon, W.E. Numerical Cipher Systems, 1955, 104 pp. Evolutionary Phases, 1954.

Cooper, Felix and Hecker, A. Frequency Distribution Charts. NY: St. John's University, 1942, 4 pp.

Cooper, K.S. Cipher Stories Puzzle Book. NY: Lewis Copeland Co., 1928, 127 pp.

Copeland, M. Beyond Cloak and Dagger. NY: Simon & Schuster, 1974, 351 pp.

Copp, Dewitt S. Sons of the Morning. NY: W.W. Norton & Co., Inc., 1992, 253 pp.

Coppard, A. Sending Secrets. London: Heinemann, 1972, 46 pp.

Coppersmith, Don. Advances in Cryptology - CRYPTO '95. NY: Springer-Verlag, 1995, 465 pp.

Coutinko, S.C. The Mathematics of Ciphers: Number Theory and RSA Cryptography. Natick, MA: A.K. Peters Ltd., 1998, 196 pp.

Cornick, Martyn & Peter Morris, compilers. The French Secret Services. New Brunswick, NJ: Transaction Publishers, 1993, 115 pp.

Coppersmith, D. & E. Grossman. Generators for Certain Alternating Groups with Applications to Cryptography. SIAM, Journal on Applied Math., Dec. 1975, pp. 624-627.

Coppersmith, Don. The Data Encryption Standard (DES) and its Strength against Attacks. Armonk, NY: IBM Journal of Research & Development, Vol. 38, No. 3, May 1994, pp. 243-250.

Corderman, Col. W. Preston. Chief, Signal Security Branch. Staff Study on OSS Cryptographic Plan. (Stamped Secret). Washington: 1/8/45, 4 pp. Photocopy.

Corré, Alan D. Anatomy of a Decipherment. Transactions, 1966, vol. 55, pp. 11-20.

Correspondence between M.E. Ohaver and others regarding Beale Ciphers. 1926, 1927, 1933, 1934, 1937.

Correspondence between H.O. Yardley and Rosario Candela. May 5, 1942.

Correspondence between Col. Parker Hitt and Puck Products. 1934-1935.

Correspondence between Robert B. Reimer [inventor of The Crypto-Set] and the Office of the Chief Signal Officer. 1937-1938.

Correspondence between M.E. Ohaver and W.F. Friedman. 1920, 1922.

Correspondence Course. Cryptanalysis of the Simple Substitution Cipher With Word Divisions. Course 201. Laguna Hills, CA: Aegean Park Press, 1982,ten lessons plus final examination.

Costas, J.P. Cryptography in the Field. Part I & II. Byte magazine, March 1979, April 1979.

Costas, J.P. Cryptography and the Pocket Calculator. Syracuse, NY: General Electric Co., 9/11/78, 36 pp.

Costello, J. The Pacific War. NY: Rawson Wade Pub., 1981, 742 pp.

Costello, John. Days of Infamy: McArthur, Roosevelt, Churchill -- The Shocking Truth Revealed: How Their Secret Deals and Strategic Blunders Caused Disaster at Pearl Harbor and the Philippines. NY: Pocket Books, 1994, 448 pp.

Costello, John. Mask of Treachery. NY: William Morrow & Co., Inc., 1988, 765 pp.

Coulas, Florian. The Writing Systems of the World. Cambridge, MA: Basil Blackwell, Inc., 1989, 302 pp.

Courtney, R.H. Jr. & M.J. Orceyre. Considerations in the Selection of Security Measures for Automatic Data Processing Systems. Washington: U.S. Dept. of Commerce, NBS Special Pub. 500-33, 1978, 24 pp.

Courville, J.B. Manual for Cryptanalysis of the Columnar Double Transposition. Author: 1986, 91 pp.

Cowen, Robert. New Cryptography to Protect Computer Data. Technology Review, December 1977, pp. 6-7, 12.

Crain, Dorothy. Ciphers For the Little Folks. Geneva, IL: Riverbank Laboratories, 1916, 73 pp.

Crain, D. Methods Pour Enseigner et Acquérir une Connaissance pratique du Chiffre Bilitere. Geneva, IL: Riverbank Laboratories, 1918, 69 pp.

Cram, Cleveland C. Of Moles and Molehunters: A Review of Counterintelligence Literature, 1977-92. McLean, VA: Center for the Study of Intelligence, CIA, 1993, 71 pp.

Crampton, C.G., ed. They Talked Navajo. Utah: University of Utah, 1971, 58 pp.

Crichton, Michael. Sphere. NY: A.A. Knopf, 1987, 385 pp.

Criptografía. Espasa: Enciclopedia Universal Ilustrada Europeo-Americana. vol. XVI, pp. 205-219.

Cronin, Daniel J. Microcomputer Data Security.  NY: Brady Comm. Co., 1986, 281 pp.

Crowe, K. Activist Writes 'Expose' of Top U.S. Spy Agency. Newsday, 7/16/72, pp. 5, 17.

Crucigramas. Buenos Aires, Argentina: Spanish puzzle magazine, March 1954, August 1954, with crypto column, Clave Secreta.

Cruickshank, C. S.O.E. in Scandinavia. NY: Oxford University Press, 1986, 292 pp.

Cryptanalysis - Nihilist Transposition Cipher. Condensation of article by Picola. N.P., N.D., 2 pp.

Cryptexpert. Secret Writing. True Detective Mysteries, 16 articles, Oct. 1936-Feb. 1938.

Cryptexpert. Secret Writing. Columns from True Detective Mysteries, Aug. 1936-Nov. 1937.

Crypto: A Cryptographic System. Introduction to Electronic Computers, Chapter 8, Using the Random Number Generator. pp. 18-24.

Cryptographic School Opens. Signal, July 1971, p. 25.

Cryptography and Data Communications. Infosystems, July 1975, pp. 28-30.

Cryptography and Cryptographic Hardware (Aug. '83 - Present). Springfield, VA: National Technical Information Service, 1993.

Cryptography and Cryptosystems (Jan. 1989-Present). Springfield, VA: National Technical Information Service, 1933.

Cryptography. Graham's Magazine, pp. 54-76.

Cryptologia, Complete Index, 1977-1988, Vols. 1-XII. Terre Haute, IN: 1989, 43 pp.

Cryptologia, Complete Index, 1977-1996, Vols. 1-XX. West Point, NY: Cryptologia, 1997, 76 pp.

Cryptology, anyone? Manhattan News, New York Telephone, April 14, 1972, p. 6.

Cryptology Collectibles. The Antique Trader, Dec. 11, 1973, pp. 56-57.

Cryptosystems Journal. Vol. 1, No. 1, May 1988 to date.

Damgård, I.B. Advances in Cryptology -- EUROCRYPT '90. NY: Springer-Verlag, 1991, 500 pp.

Cuelenaere, Alphonse. Secret Communications. A Bibliography of Secret Writing and Cryptography. Journal of Criminal Law, Oct. 1959, pp. 307-311.

Cuelenaere, A. The Use of the Ideas of "Presence" and "Mean Quadratic Frequency" for Distinguishing Between Mono- and Polyalphabetic Cryptograms, Particularly in Dutch. Revue Internationale de Criminology et de Police Technique, Jan./Feb./Mar., 1957. Trans. from the French.

Cusick, Thomas W., Cunshing Ding and Ari Renuall. Stream Ciphers and Number Theory. Amsterdam, The Netherlands: North-Holland Mathematical Library, 1998, 431 pp.

CyberLock Data Encryption. Key file encryption\decryption software package using DES as the Pseudo-Random Number Generator (PRNG) with operator’s manual. Houston, TX: Design Automation Systems Inc., 1977.

CyberLock Data Encryption Program. Houston, TX: Design Automation Systems, Inc., 1995.

d'Agapeyeff, Alexander. Codes and Ciphers. London: Oxford University Press, 1939, 160 pp.

D'Imperio, M.E. The Voynich Manuscript: An Elegant Enigma. Fort Meade, MD: NSA, 1978, 140 pp.

Dallet, G. Les écritures chiffrées et leurs applications. Revue Scientifique 40(1887:2), 289-297, 743-749.

Dam, Kenneth & Herbert Lin, eds. Cryptography's Role in Securing the Information Society. Washington, DC: National Academy Press, 1996, (draft copy) 230+ pp.

Dam, Kenneth & Herbert Lin, eds. Cryptography's Role in Securing the Information Society. Washington, DC: National Academy Press, 1996, 688 pp.

Damas, Jacques, ed. Signes Hebra?ques & Typographies. 1990, Paris, France, 108 pp.

Damgard, Ivan, ed. Lectures on Data Security. NY: Springer-Verlag, 1999, 250 pp.

Damgard, I.B., ed. Advances in Cryptology – EUROCRYPT ’90. NY Springer-Verlag, 1991, 500 pp.

Daniel, Robert E. Elementary Cryptanalysis. Seattle, WA: 1979, 30 pp.

Daniels, Peter & William Bright. The World's Writing Systems. NY: Oxford University Press, 1996, 922 pp.

Daniloff, R. A Cipher's the Key to the Treasure in Them Thar Hills. Smithsonian, April 1981, pp. 126, 128, 130, 132, 134, 136, 138, 140, 142, 144.

Darlington, W.A. The "Baby" Cipher. Ellery Queen Mystery Magazine, May 1948, pp. 81-93.

Darnell, Michael, ed. Cryptography and Coding: 6th International Conference Cirencester, UK, December 1977 Proceedings. NY: Springer-Verlag, 1997, 335 pp

Darnell, H.A. Cipher Codes. Letter to Editor, Scientific American, 8/28/15, p. 181.

Data Security Device for Use with Data. Communications News, Oct. 1972, p. 83.

Data Security Reference Guide. Abingdon, England: Sophos, 1991, 319 pp.

David, H.M. Computers, Privacy, and Security. Computer Decisions, May 1974, pp. 46, 48.

Davida, G.I. Safety In Numbers. The Sciences, vol. 21, no. 6, July-Aug. 1981, pp. 9-14.

Davies, H.N. The History of a Cipher, 1602-1772. pp. 325-329.
Davies, D.W. et al. An Evaluation of Public-Key Cryptosystems. England: Nat. Physical Lab., NPL Report CTW 1, April 1980, 31+ pp.

Davies, D.W. & W.L. Price. An Annotated Bibliography of Recent Publications on Data Security & Cryptography. England: Nat. Physical Lab., NPL Report DNACS 25/80, Jan. 1980, 16 pp.

___________________________. A Protocol For Secure Communication.NPL Report NACS 21/79. Nov. 1979, 18 pp.

Davies, Donald W., ed. Advances in Cryptology--EUROCRYPT '91 Proceedings. NY: Springer-Verlag, 1991, 556 pp.

Davies, D.W. & W.L. Price. Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer.  NY: John Wiley & Sons, 1987 (second ed.), 386 pp.

Davies, D.W. & D.A. Bell. The Protection of Data by Cryptography. England: National Physical Laboratory, NPL Report Com 98, June 1978, 50 pp.

Davies, Philip H.J. The British Secret Services. New Brunswick, NJ: Transaction Publishers, 1996, 186 pp.

Davies, W.V. Egyptian Hieroglyphs. Berkeley, CA: University of Cal. Press, 1987, 64 pp.

Davies, D.W. Tutorial: The Security of Data in Networks. Los Angeles: IEEE Computer Society Press, 1981, 241 pp.

Davies, D.W. & W.L. Price. A Protocol for Secure Communications. England: Nat. Physical Lab., NPL Report NACS 21/79, Nov. 1979, 18 pp.

Davies, D.W. & W.L. Price. Security for Computer Networks. NY: John Wiley & Sons, 1984, 386 pp.

Davis, P.J. Matrix Cryptography. pp. 331-333 from The Mathematics of Matrices, Blaisdell Pub. Co., 1965.

Davis, Chris. Death by Fire. NY: BZ Books, 1995, 412 pp.

Davis, Donald M. The Nature and Power of Mathematics. Princeton, NJ: Princeton University Press, 1993, 389 pp.

Davis, H.M. & F.G. Fasset, Jr. What You Should Know About the Signal Corps. NY: W.W. Norton & Co., 1943, 214 pp.

Davis, C.C. Secret War of Words. New York Times Book Review of The Codebreakers, Jan. 7, 1968.

Dawson, Donald A. Cryptanalysis of the Single Rotor Cipher Machine. Laguna Hills, CA: Aegean Park Press, 1996, 213 pp.

Dawson, Ed and Jovan Golic, eds. Cryptography: Policy and Algorithms, Proceedings. NY: Springer-Verlag, 1996, 325 pp.

De Gramont. S. The Secret War. NY: G.P. Putnam's Sons, 1962, 515 pp.

De Gramont, S. The Secret War. NY: Dell Books, 1963, 544 pp.

De Grandpré, A. Cryptographie Pratique. Paris: Libraire Boyveau et Chevillet, 1905, 128 pp.

De Leeuw, Karl. Cryptology and Statecraft in the Dutch Republic. Amsterdam, Netherlands: University of Amsterdam, 2000, 190 pp.

De Santis, Alfredo, ed. Advances in Cryptology – Eurocrypt ’94. NY: Springer-Verlag, 1995, 473 pp.

de Vries, M. Quantizing in Language and Cryptanalysis. 23 pp. article in Dutch and 16 pp. translation.

de Vries, M. Concealment of Information. Synthese, vol. IX, 1953, pp. 326-336.

De Millo, R. et al. Applied Cryptology, Cryptographic Protocols, and Complete Security Models. Providence: American Mathematical Society, 1983, 192 pp.

de Vries, M. Untitled bibliography. Jan./Feb. 1962, 34 pp.

de Vries, M. Quantizing in Language and Cryptanalysis. 33 pp.

de Vries, M. Unique Sequence-Identity Cipher. Sept. 1972, 14 pp.

De Long, E.K. & L.B. Kirkpatrick, Jr. The CIA - An Attack and a Reply. US News and World Report, 10/11/71, pp. 78-84.

de Neuf, D.K. Chronology of Codes. Spark Gap Times, July-Aug. 1976, pp. 8-13.

De la Torre, L. The Stolen Christmas Box. Ellery Queen's Mystery Magazine, Jan 1946, 80-96.

Deacon, Richard. A History of the British Secret Service. London: Frederick Muller Ltd., 1969, 440 pp.

Deacon, Richard. Kempei Tai: A History of the Japanese Secret Service. NY: Beaufort Books Inc., 1983, 306 p.

Deacon, Richard. Spyclopaedia. London: Macdonald & Co. Ltd., 1988, 416 pp.

Deacon, Richard. A History of the Chinese Secret Service. Taplinger, 1974, Xerox copy of pp. 468-471, 478-481.

Deakin, F.W. & G.R. Storry. The Case of Richard Sorge. NY: Harper & Row, 1966, 373 pp.

Deavours, C.A. Cryptanalytic Programs for the IBM PC. Laguna Hills, CA: Aegean Park Press, n.d., 44 pp.

Deavours, C.A. Isomorphic Analysis of the Hebern Cryptograph. December 1976, 22 pp. plus photographs.

Décryptement du Système Cryptographie du Commandant Schneider. Paris: L. Fournier, 1921, 31 pp. (Shulman's bibliography gives author as General Francois Cartier.) Paris: L. Fournier, 1921, 31 pp.

Defending Secrets, Sharing Data: New Locks and Key for Electronic Information. Congress of the U.S., Office of Technology Assessment, Summary report.Oct. 1987, 8 pp.

Deford, Frank. Love and Infamy. NY: Viking Penguin, 1993, 516 pp.

Dekel, E. SHAI: The Exploits of Hagana Intelligence. NY: Thomas Yoseloff, 1959. (Selected Xerox excerpts)

Delage, Emile. La Chiffrocryptographie. Paris: Chez Tous Les Libraires, 1900, 64 pp.

Delastelle, F. Traité Élémentaire de Cryptographie. Paris: Gauthier-Villars, 1902. Sixieme Partie-Appareils Cryptographie.

Delastelle, F. Elementary Treatise on Cryptography. Paris: Gauthier-Villars, 1902, 96 pp.(English trans., Xerox)

Delfs. Hans and Helmut Knebl. Introduction to Cryptography : Principles and Applications. NY: Springer-Verlag, 2002, 310 pp.

Deltheil, Ch. Cryptographie Universel. Paris: Revue Militaire Universelle, Oct. 1, 1892. pp. 42-53.

Demarest, A.A. A Critical Analysis of Yuri Knorozov's Decipherment of the Maya Hieroglyphics. New Orleans: Middle American Research Institute, Tulane University, 1976, 12 pp.

Denning, D.E. A Lattice Model of Secure Information Flow. Communications of the ACM, May 1976, vol. 19, no. 5, pp. 236-243.

Denning, D.E. Cryptography and Data Security. Reading, MA: Addison-Wesley, 1982, 400 pp.

____________. Information Warfare and Security. NY: ACM Press Books, 1999, 522 pp.

Denniston, Robin. Churchill's Secret War: Diplomatic Decrypts, The Foreign Office and Turkey, 1942-44. NY: St. Martin's Press, 1997, 208 pp.

Department of the Navy, Naval Education and Training Program, Rate Training Manual and Nonresident Career Course, Naval Education and Training Program. 1981, 499 pp. plus assignments and score sheets.

Designs, Codes and Cryptography: An Internationmal Journal. Special issue dedicated to Dr. Gustavus Simmons. Hingham, MA: Kluwer Academic Publishers, Vol. 7, Nos. 1/2, Jan 1996, 174 pp.

Desmedt, Yvo G., ed. Advances in Cryptology -- CRYPTO '94 Proceedings. NY: Springer-Verlag, 1994, 439 pp.

Desnoyers, C.H. Cryptanalytic Essay. Solution of problem 166 published in Elementary Cryptanalysis. 1967, 28 pp.

Detectograms and Other Puzzles. NY: Scholastic Book Services, 1969, 96 pp.

Deuel, Leo. The Treasure of Time. Cleveland: The World Pub. Co., 1961, 318 pp.

Deutsch, Dr. H.C. The Historical Impact of Revealing the Ultra Secret. Parameters, Journal of the US Army War College, vol. VII, No. 3. 1977, pp. 16-32.

Devlin, Keith. Mathematics: The New Golden Age. NY: Penguin Books, 1988, 287 pp.

Devlin, Keith. All the Math That's Fit to Print: Articles from The Manchester Guardian. Washington, DC: The Mathematical Association of America, 1994, 330 pp.

Devos, J.P. Les Chiffres De Philippe II (1555-1598) Et Du Despacho Universal Durant Le XVII Siècle. Brussels: Royal Academy of Belgium, 576 pp., 1950.

Dewar, Colonel Michael. The Art of Deception in Warfare. NY: Sterling Pub. Co., Inc., 1990, 224 pp.

Dewdney, A.K.  The Turing Omnibus, 61 Excursions in Computer Science.  NY: Computer Science Press, 1989, 415 pp.

Dewdney, A.K.  The Magic Machine: A Handbook of Computer Sorcery. NY: W.H. Freeman & Co., 1990, 357 pp.

Dexter, Colin. The Way Through The Woods. NY: Crown Publishers, 1992, 296 pp.

Di Mona, Joseph. The Benedict Arnold Connection. London: Billing & Sons Ltd., 1978, 271 pp.

Dickson, S.B. Coded Limericks. NY: Simon and Schuster, 1925, 125 pp.

Die Entwicklung der Deutschen Funkschlüsselmaschne: Die Enigma, 9 pp.

Die Geschichte der HAGELIN-Cryptos. 64 pp.

Diffie, Whitfield. Bibliography of the Literature of Cryptography. 10 pp.

Diffie, W. & M.E. Hellman. New Directions in Cryptography. Reprint from IEEE Transactions on Information Theory, Nov. 1976, pp. 644-654.

Diffie, W. The Outlook for Computer Security. Mini-Micro Systems, Oct. 1978, pp. 42-44.

Diffie, W. & M.E. Hellman. Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE, March 1979.

Diffie, Whitfield and Susan Landau. Privacy on the Line: The Politics of Wiretapping and Encryption. Cambridge, MA: The MIT Press, 1998, 342 pp.

Di Flippo, Paul. Cipher: A Port Shannon Rock-n-Roll Mystery. San Jose, CA: Cambria Pub., 1997, 533 pp.

D’Imperio, M.G. The Voynich Manuscript: An Elegant Enigma. Fort Meade, MD.: NSA, 1978, 140 pp.

Ding, C., Pei, D. and A. Salomaa. Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography. River Edge, NJ: World Scientific Pub. Co., 1996, 213 pp.

Dirigo, M.K. The Black Chamber. G-Man, Jan. 1939, pp. 98-103.

Disappeared or Defected. Life, Aug. 15, 1960, p. 33. (Brief story on Martin & Mitchell)

Dixon, Franklin W. The Mystery of Cabin Island. NY: Grosset & Dunlap, 1999 printing, 178 pp.

Doane, Michael. City of Light. NY: A.A. Knopf, 1992, 324 pp.

Doblhofer, E. Voices in Stone. NY: Collier Books, 1971, 327 pp.

Donini, Rear Admiral Luigi. I Servizi Crittografici Delle Marine Britannica E Italiana. Rome: Rivesta Marittima, vol. 116, no. 1, 1985, pp. 69-94.

Donnelly, I. The Great Cryptogram. Chicago: R.S. Peale & Co., 1888, 998 pp.

____________. The Great Cryptogram. Kela, MT: Kessinger Pub., reprint of 1888 edition, 998 pp.

Donoughue, Carol. The Mystery of the Hieroglyphs: The Story of the Rosetta Stone and the Race to Decipher Egyptian Hieroglyphics. NY: Oxford University Press, 1999, 48 pp.

Dorland, M. The Double-Cross Circuit. NY: Grosset & Dunlap, 1978, 222 pp.

Dorwart, Jeffrey M.  Conflict of Duty: The U.S. Navy's Intelligence Dilemma, 1919 1945. Annapolis, MD: Naval Institute Press, 1983, 262 pp.

Downes, Donald. The Scarlet Thread: Adventures in Wartime Espionage. NY: The British Book Centre, 1953, 207 pp.

Douglas, Gregory. Gestapo Chief: The 1948 Interrogation of Heinrich Müller, Vol 1. San Jose, CA: R. James Bender Pub., 1995, 288 pp.

Douglas, Gregory, Gestapo Chief: The 1948 Interrogation of Heinrich Müller, Vol 2. San Jose, CA: R. James Bender Pub., 1997, 272 pp.

_______________. Gestapo Chief: The 1948 Interrogation of Heinrich Muller, Vol 3. San Jose, CA: R. James Bender Pub., 1998, 286 pp.

Doyle, A.C. The Adventure of the Dancing Men. 92 pp.

Doyle, A.C. The Adventure of the Dancing Men and Other Sherlock Holmes Stories. Mineola, NY: Dover Pub., 1997, 76 pp.

Doyle, A. Conan. The Complete Sherlock Holmes. Garden City, NY: Garden City Pub. Co., Inc., 1938, 1323 pp.

______________. The Valley of Fear. NY: Book-of-the-Month-Club, 1944, 320 pp.

Dr. Dobb’s Essential Books on Cryptography and Security. San Mateo, CA: Dr. Dobb’s Journal, 1998, 12 books on CD-Rom.
 

Drea, Edward J. Defending the Driniumar: Covering Force
Operations in New Guinea, 1944. Ft. Leavenworth, KS: U.S. Army Command & General Staff College, 1984, 182 pp.

Drea, Edward J. Reading Each Other's Mail: Japanese Communications Intelligence, 1920-1941. Lexington, VA: The Journal of Military History, Vol. 55, No. 2, April 1991, 185-205.

Drea, Edward J. MacArthur's Ultra: Codebreaking and the War Against Japan, 1942-1945. Lawrence, KS: University Press of Kansas, 1991, 296 pp.    Inscribed by author.

Dribin, Daniel M. Construction of all Involutory Matrices of a Given Order. NSA Technical Library, 23 Aug. 1949, 1 pp.

Drosnin, Michael. The Bible Code. NY: Simon & Schuster, 1997, 264 pp.

Drucker, Johannes. The Alphabetic Labyrinth: The Letters in History and Imagination. NY: Thames and Hudson Inc., 1990, 320 pp.

Drummey, Joseph P. The Phoenix Society: Its Beginning and First Ten Years. History of the beginnings and first ten years of the organization for National Security Agency retirees.Annapolis Junction, MD: The Phoenix Society, 1985, 33 pp. (See Phoenician listing for copies of its the Society’s publication.

Du Bois, M. C. Fun With Fractional Morse Ciphers. ACA, 1966, 16 pp.

Dudeney, Henry E. 300 Best Word Puzzles. NY: Charles Scribner's Sons, 1968, 172 pp.

Dudman, R. Captain Who Broke Japanese Codes. St. Louis Post-Dispatch, May 18, 1958, p. 13. ($100,000 award to L.F. Safford)

Dulles, Allen, ed. Great True Spy Stories. NY: Harper & Row, 1968, 393 pp.]

Dulles, Allen. The Craft of Intelligence. NY: Signet Books, 1965, 256 pp.

Dumas, L. Ribadeau.  Les Decryptemente de la Machine Enigma Des Armees Allemandes

Dunn, H.H. Electrical Machine Can Make Eleven Million Codes. Popular Mechanics, Dec. 1922, 849-850.

Dyer, F.C. The Information Stealers. The Man From Uncle Magazine, Jan. 1968, 86-110.

Eastern Puzzlers' League. A Key To Puzzledom. NY: William W. Delaney, 1906, 145 pp.

Eckler, A. Ross. Making the Alphabet Dance: Recreational Wordplay. NY: St. Martin's Press, 1996, 277 pp.

______________. The National Puzzlers’ League: The First 115 Years. NY: The National Puzzlers’ League, 1998, 381 pp.

Eckler, A.R. Levine's Isomorph  Dictionary. Word Ways, Feb. 1972, pp. 3-8, 44, 49.

Eco, Umberto.  Foucault's Pendulum. NY: Harcourt Brace Jovanovich, Inc. 1989, 641 pp.

Editorial. Spy Planes. Newsday, 3/28/73, p. 46.

Editors of the Army Times. A History of the U.S. Signal Corps. NY: G.P. Putnam's Sons, 1961, 192 pp.

Editors of Time Life Books. WW II: Time Life Books History of the Second World War. NY: Prentice Hall Press, 1989, 496 pp.

Edwards, Daniel J. OCAS-On-Line Cryptanalytic Aid System. Massachusetts Institute of Technology, May 1966, 54 pp. (Thesis on cryptology)

Edwards, E.C. Cipher Codes and Their Uses. Scientific American, 7/3/15, p. 9.

Eftimiades, Nicholas. Chinese Intelligence Operations. Annapolis, MD: Naval Institute Press, 1994, 169 pp.

Ehresmann, Julia M.  Geneva, Illinois: A History of its Times and Places.  Geneva: Geneva Public Library District, 1985, 442 pp.

Electronic Countermeasures. Aviation Week & Space Technology, Feb. 21, 1972. (Special report using entire issue)

Elementary Cipher Solution. Washington: Chief of Naval Operations, 1930.

Elias, P. Coding and Information Theory. Reviews of Modern Physics, vol. 31, no. 1, Jan. 1959, pp. 221-226.

Elliot, Major Stuart R. Scarlet to Green: A History of Intelligence in the Canadian Army 1903-1963. Toronto: Canadian Intelligence & Security Association, 1981, 769 pp.

Elliott and Elliott. Instant Word Finder. Philadelphia, PA: Braceland Brothers, Inc. 1959, 352 pp.

Enever, Ted. Britain's Best Kept Secret: Ultra's Base at Bletchley Park. Gloucestershire, England: Alan Sutton Pub., Ltd. 1994, 90 pp.

Ellis, K.L. British Communications and Diplomacy in the Eighteenth Century. Institute of Historical Research Bulletin, Nov. 1958, pp. 159-167.

Enigma, 1930-1940. The Method and History of Solving the German Machine Cipher (An Outline). Translated from the Polish by Alfred Piechowisk, July 26, 1974, 6 pp.

Ensign, Eric S. Lt. USCG. Intelligence in the War at Sea, 1920-`933. Springfield, VA: US Dept. of Commerce, National Technical Information Service, 2001, 92 pp.

Enterline, James.Cryptography in the Yale Vinland Map.Terrae Incognitae: The Journal for the History of Discoveries, Vol. XXIII, 1991, pp. 13-27.

Ephron, H.D. Mycenaean Greek: A Lesson in Cryptanalysis. Minos, vol. 7, 1961, pp. 63-100.

Ephron, H.D.  Hygieia Tharso and Iaon: The Phaistos Disk. Harvard Studies in Classical Philology, pp. 1-99.

Ephron, H.D. The Jeson Tablet of Enkomi. Harvard Studies in Classical Philology, LXV, 39-107.

Epstein, Sam & Beryle. The First Book of Codes and Ciphers. NY: Franklin Watts Inc., 1956, 62 pp.DJ

Ernst, Thomas. “Schwarzweibe Magie: Der Schlussel Zum dritten Buch der Steganographia des Trithemius.” Daphnis’ Zeitschrift fur Mittlere Deutsche Literatur. Band 25 – 1996 Heft 1. Amsterdam: Editions Rodopi B.V., 1996, 205 pp.

Erickson, C. Encryption-An Ancient Art Enhanced by LSI. Fairchild Journal of Semiconductor Jan./Feb. 1979, pp. 4-11.

Espionage: The Eavesdropper. Newsweek, 5/31/65, pp. 21-22.

Evans, Bob, Nicola Butler and Eddie Gonçalves. The Campus Connection: Military Research on Campus. London, England: Student C.N.D., 1991, 96 pp.

Evans Jr., A. & W. Kantrowitz. A User Authentication Scheme Not Requiring Secrecy in the Computer. Communications of the ACM, Aug. 1974, 437-442.

Examples of Intelligence Obtained From Cryptanalysis. Army Security Agency, 1946, 11 pp.

Expert on Codes Explains His Aim. New York Times, 7/19/72.

Eyraud, C. Precis Cryptographie Moderne. Paris: Editions Raoul Tari, 1953, 308+ pp.

Eyraud, C. Precis de Cryptographie Moderne. Translation from the French by Steven M. Taylor of material from the Appendix. 28 pp.

Eyraud, C. Miscellaneous Cipher Devices. Translation of section of Precis de Cryptographie Moderne by Papken Sassouni. 14 pp.

4th Star for Gen. Phillips. New York Times, 8/5/73.

Eyraud, C. Cryptographs and Cipher Machines. Translation of Chapter XI of Precis de Cryptographie Moderne. 22 pp.

Eyraud, C. Precis de Cryptographie Moderne. Paris, 1959, 335 pp. plus tables.

Fabyan, G. Hints to the Decipherer of The Greatest Work Of Sir Francis Bacon. Riverbank Laboratories, 1916, 15 pp.

Fabyan, George. The Bi-Formed Alphabet Classifier and Directions for Use of Classifier. Geneva, IL: Riverbank Laboratories, 1916, 2 pp.

Fabyan, G. The Keys For Deciphering the Greatest Work of Sir Francis Bacon. Riverbank Laboratories, 1916, 100 pp.

Fabyan, George. The First of Twelve Lessons in the Fundamental Principles of the Baconian Ciphers. Geneva, IL: Riverbank Laboratories, 1916, 16 pp.

Fahn, Paul. Answers to Frequently Asked Questions About Today's Cryptography. Redwood City, CA: RSA Laboratories, 1993, 52 pp.

Fäk, V. Cryptographic Protection of Files in an "Automated Office" System. Linköping University, Sweden, Internal Report, 1980, 16 pp.

Fäk, V. Loops as Building Blocks for Computer One-Way Functions. Dept. of Electrical Engineering, Linköping University, 1979, 11 pp.

Famed Code Cracker Accused of Selling Out to the Japanese. Sioux City Journal, 3/15/67, p. 13.

Fanwick, Charles. Computer Safeguards: How Safe Are They? SDC magazine, July-Aug. 1967, pp. 26-29.

Farago, Ladislas. Spymaster. NY: Warner Paperback Library, 1972, 284 pp.

Farago, Ladislas. The Broken Seal. NY: Bantam Books, 1968, 464 pp.

Farago, L. Burn After Reading. NY: Walker & Co., 1961, 319 pp.

Farago, L. The Broken Seal. NY: Random House, 1967, 439 pp.

Farago, L. War of Wits. NY: Funk & Wagnalls Co., 1954, 379 pp.

Farago, L. The Game of the Foxes. NY: David McKay Co., 1972, 696 pp.

Farley, Gloria. The Vikings Were Here. Heavener Ledger Press, Dec. 1970, reprint of 8 pp. section on Runestones.
Farquhar, C. Cosmo Cipher Words [code]. NY: American Code Co., 1913.

Faulkner, N. The Secret of the Simple Code. Doubleday & Co. 1965, 206 pp.

FDR's Diary Code Broken. Boston Herald Traveler, 1/21/72, p. 29.

Feely, Joseph Martin. Roger Bacon's Cypher. Rochester: Joseph Martin Feely, 1943, 50 pp.

Feigenbaum, Joan, ed. Advances in Cryptology--CRYPTO '91 Proceedings. NY: Springer-Verlag, 1992, 485 pp.

Feistel, H. Cryptographic Coding For Data-Bank Privacy. IBM Research RC2827, March 18, 1970, 56 pp.

Feistel, H., W. A. Notz & J.L. Smith. Cryptographic Techniques for Machine to Machine Data Communications. IBM Research Report RC3663, 1971, 34 pp.

Feistel, H. Cryptography and Computer Privacy. Scientific American, May 1973, pp. 15-23.

Feldman, A.E. Secret Code Machies: The Inside Story. Hicksville, NY: Popular Communications, 5/1989, pp. 30-32.

Fell, B. Saga America. NY: Times Books, 1980, 425 pp.
606.

Fenichal, R.M. Data Communications Encryption. 1978 Nat. Telecommunications Conference, Vol. 1, pp. 26.2.1-26.2.5

Fell, B. America B.C. NY: Quadrangle/New York Times Book Co., 1976, 312 pp.

Fenn, Herbert K. Commander, U.S. Navy. Ciphers. U.S. Naval Academy, Post Graduate School, 1937, 181 pp.

Ferguson, T. Private Locks, Public Keys and State Secrets: New Problems in Guarding Information with Cryptography. Cambridge, MA: Program on Information Resources Policy, Harvard University, 1982, 99 pp.

Fernandez, E.B., R.C. Summers & C. Wood. Database Security and Integrity. Reading, MA: Addison Wesley, 1981, 320 pp.

Ferris, John, ed. The British Army and Signals Intelligence During the First World War. Wolfeboro Falls, NH: Alan Sutton Pub. Inc., 1992, 359 pp.

Ferris, John. Before "Room 40": The British Empire and Signals Intelligence, 1898-1914. London: The Journal of Strategic Studies, Vol. 12, No. 4, December 1989, 432-457.

Few Secrets Now Elude Sky Satellite Spy Net. Newsday, May 19, 1975, pp. 4, 30.

Field Artillery Signal Communications. Fort Sill, OK: The Field Artillery School, 1937, Book 182, 361 pp.

Fielding, A. The Tall House Mystery. NY: H.C. Kinsey & Co., 1933, 305 pp.

Fields, Sidney. Quick-Eyed Cryptanalyst. Only Human Column, New York Daily News, Sept. 5, 1974, p. 87.

Fiellman, Robert W. Computer Solution of Cryptograms and Ciphers. Systems Research Center, Case Institute of Technology, 43 pp.

Figl, A. Systeme Des Chiffrierens. Graz, Austria: 1926, 243 pp. plus inserts.

_______. English translation (Xerox copy). Systems of Cryptography, 297 pp.

Finch, J.H. & E.G. Dougall. Computer Security: A Global Challenge. Amsterdam: North-Holland, 1985, 580 pp.

Findler, N.V. Programming Games and Cryptanalysis on Digital Computers. N.D., 2 pp.

Finnegan, J.P. Military Intelligence: A Picture History. Arlington, VA: USAINSCOM, 1985, 187 pp.

________________. Military Intelligence: A Picture History. Second edition. Washington, USGPO, 1992, 195 pp.

________________ and Romana Danysh. Military Intelligence. Washington, DC: USGPO, 1998, 457 pp. plus 71 pages of Heraldic items.

Fischel, Edwin C. The Secret War for the Union: The Untold Story of Military Intelligence in the Civil War. Boston, MA: Houghton Mifflin, 1996, 734 pp.

Fischer, Steven Roger. Glyphbreaker. NY: Copernicus/Springer-Verlag, 1997, 234 pp.

Fites, P.E., M.P.J. Kratz & A.F. Brebner. Control and Security of Computer Information Systems. NY: Computer Science Press, 1989, 298 pp.

Fitts, Lt. Col. R.E. The Strategy of Electromagnetic Conflict. Los Altos, CA: Peninsula Pub. Co., 1980, 283 pp.

Fitz-Hugh, M. Jerry and the Bacon Puppy. Riverbank Laboratories, 1916, 24 pp.

Fitzgerald, P. The Knox Brothers. Coward, McCann Geoghegan, 1977, 294 pp.

__________, The Knox Brothers.(Revised ed.) Washington: Counterpoint, 2000, 288 pp.

Fitzgerald, Colonel Stephen K. Magic and Ultra in the China-Burma-India Theater. Carlisle Barracks, PA: U.S. Army War College, 1991, 76 pp.

FitzGibbon, C. Secret Intelligence in the Twentieth Century. Stein and Day, 1977, 350 pp.

Flannery, Sarah with David Flannery. In Code: A Mathematical Journey. London: Profile Books Ltd., 2000, 271 pp.

Flato, L. NSA's Computer Story. Datamation, March 1978, pp. 207-208, 212.

Flem-Ath, R. Canadian Security and Intelligence, A Bibliography 1945-1985. University of Victoria, Professor R.H. Roy, 1986, 47 pp.

Flesch, Herbert, Waldemar Werther & Michael van der Meulen. Enigma-Analyse. Germany: 63 pp.

Flesch, Herbert. Papers and correspondence with Eric Hüttenhain, 23 pp.

Flicke, W.F. War Secrets In The Ether, Vol. I (Parts I & II), 1977, 124+ pp.

____________.  Vol. II (Part III). Laguna Hills, CA: Aegean Park Press, 1977, 305+ p.

Flicke, W.F. War Secrets In The Ether, Part I & II. Washington: NSA, 1953, 271 pp.

Focus on Solutions. Cryptanalytic Computer Sciences, Inc. 16 pp. brochure on management services corporation.

Foerstel, Herbert N. Secret Science: Federal Control of American Science and Technology. Westport, CT: Praeger Pub., 1993, 222 pp.

Follet, K. The Key to Rebecca. William Morrow & Co., 1980, 381 pp.

Fontaine, Judith M. Teaching Intelligence in the Mid-1990s: A Survey of College and University Courses on the Subject of Intelligence. Washington, DC: National Intelligence Center, 1992, 124 pp.

Ford, Warwick. Computer Communications Security: Principles, Standard Protocols and Techniques. Englewood Cliffs, NJ: PTR Prentice Hall, 1994, 494 pp.

Foote, Alexander. Handbook For Spies. Garden City, NY: Doubleday & Co., 1949, 273 pp.

Ford, Corey. A Peculiar Service. Boston: Little Brown & Co., 1965, 358 pp.

Förteckning över Y. Gyldéns boksamling. 7 pp. listing 84 items.

Fosburgh, Lacey. World's Oldest Song Reported Deciphered. New York Times, March 6, 1974, pp. 1, 18.

Foster, C.C. Cryptanalysis for Microcomputers. Rochelle Park, NJ: Hayden Book Co., 1982, 333 pp.

Fowler, Mark & Radhi Parekh. Codes & Ciphers. Tulsa, OK: Educational Development Corp., 1995, 48 pp.

Fowler, Mark, Sarah Dixon and Radhi Parekh. The Usborne Book of Superpuzzles. Tulsa, OK: Educational Development Corp., 1994, 144 pp.

Fox, Barry and Jeremy Wall. "Colossal Adventure." [About Colossus decrypting SZ-40 messages] London, England: New Scientist, May 10, 1997, pp. 38-43.

Franco, Arnold C. Code to Victory: Coming of Age in World War II. Manhattan, KS: Sunflower University Press, 1998, 238 pp.

Frank, Richard B. Guadalcanal: The Definitive Account of the Landmark Battle. New York: Random House Inc., 1990, 800 pp.

Franke, H.W. Die Geheime Nachricht. Frankfurt am Main: Umschau-Verlag, 1983, 208 pp.

Franksen, O.I. Mr. Babbage's Secret, The Tale of a Cypher -and APL. Birkerod, Denmark: Strandbergs Forlay, 1984, 320 pp.

Franson, Paul. Scrambled Data Baffles Thieves. Electronic, 1/17/72, pp. 87-88.

Fraser, John A. III. The Use of Encrypted, Coded and Secret Communications is an “Ancient Liberty” Protected by the United States Constitution. University of Virginia, Virginia Journal of Law and Technology (2Va,J.L.& Tech.2),Fall 1997, 37 pp.

Freadhoff, Chuck. Codename: Cipher. NY: Walker and Co., 1991, 240 pp.

Freedman, Maurice. Unravelling Enigma: Winning the Code War at Station X. South Yorkshire, U.K.: Pen & Sword Books Ltd., 2000, 190 pp.

Freeman, R.A. The Best Dr. Thorndyke Detective Stories (includes The Moabite Cipher). NY: Dover Pub., 1973, 274 pp.

Freeman, Tom & James P. Delgado. Pearl Harbor Recalled: New Images of the Day of Infamy. Annapolis, MD: Naval Institute Press, 1991, 160 pp.

Freemantle, B. The Blind Run. NY: Bantam Books, 1986, 257 pp.

Freidel, H.E. Chifferboken En Orientering i hemlig skrift. Göteborg, Sweden: Ewald Elanders Bokförlag, 1947, 45 pp.

Frequently Asked Questions from Archives: sci.crypt. August 23, 1993, 21 pp.

Friedman, W.F. Elementary Military Cryptography. Aegean Park Press, 1976, 86 pp.

Friedman, W.F. Advanced Military Cryptography. Aegean Park Press, 1976, 113 pp.

Friedman, W.F. A Brief History of the Signal Intelligence Service. 18 pp., June 29, 1942.

Friedman, W.F. Expansion of the Signal Intelligence Service From 1930 to 7 December 1941. 1945.

Friedman, W.F. The Principles of Indirect Symmetry of Position in Secondary Alphabets and their Application in the Solution of Polyalphabetic Substitution Ciphers. Washington: USGPO, 1935, SIS, OCSO, 21 pp.

Friedman, W.F. Field Codes Used by the German Army During the World War. Technical Paper of the SIS. Washington: USGPO, 1935, 98 pp.

Friedman, W.F. Elements of Cryptanalysis. Washington: USGPO, 1924, 157 pp.

Friedman, W.F. Military Cryptanalysis, Par I. Laguna Hills, CA: Aegean Park Press, 1980, 149 pp.

Friedman, W.F. History of the Use of Codes. Laguna Hills, CA: Aegean Park Press, 1977, 80 pp.

Friedman, W.F. Elements of Cryptanalysis. Laguna Hills, CA: Aegean Park Press, 1976, 172 pp.

Friedman, W.F. Edgar Allan Poe, Cryptographer. American Literature Vol. VIII, No. 3, Nov. 1936.

______________. Reprint of Poe article given to H.L. Langen by Friedman who signed the cover with a note, 14 June 1959.

Friedman, W.F. Certain Aspects of "Magic" in the Cryptological Background of the Various Official Investigations Into The Pearl Harbor Attack. Special Research History, 1956, 74 pp.

Friedman, W.F. Analysis of a Mechanico-Electrical Cryptograph. Part I, Section I, pp. 1-21.

Friedman, W.F. Solving German Codes in World War I. Laguna Hills, CA: Aegean Park Press, 1977, 152 pp.

Friedman, W.F. Jacques Casanova De Seingalt, Cryptologist. Casanova Gleanings, Vol. IV, 1961, pp. 1-12.

Friedman, W.F. Military Cryptanalysis: Part I, Monoalphabetic Substitution Systems. Office of the Chief Signal Officer, 1941, 142 pp.

Friedman, W.F. Military Cryptanalysis: Part II, Simpler Varieties of Polyalphabetic Substitution Systems, 1938, 120 pp.

Friedman, W.F. Military Cryptanalysis:  Part III, Simpler Varieties of Aperiodic Substitution Systems, 1939, 119 pp.

Friedman, W.F. Military Cryptanalysis: Part IV, Transposition and Fractionating Systems, 1941, 189 pp.

Friedman, W.F. Codes and Ciphers. Encyclopaedia Britannica, pp. 920-927.

Friedman, W.F. Analysis of a Mechanico-Electrical Cryptograph, Part II. Washington: USGPO, 1935, 128 pp.

Friedman, William F. Shakespeare, Secret Intelligence, and Statecraft. Philadelphia, PA: Proceedings of the American Philosophical Society, Oct. 11, 1962, pp. 401-411.

Friedman, W.F. Six Lectures on Cryptology. NSA, April 1963, 182 pp.

Friedman, W.F. Shakespeare, Secret Intelligence, and Statecraft. Proceedings of the American Philosophical Society, Oct. 1962, pp. 401-411.

Friedman, William F. International Radiotelegraph Conference of Washington: 1927. Washington: USGPO, 1928, 80 pp.

Friedman, W.F. American Army Field Codes in the American Expeditionary Forces During the First World War. Washington: USGPO, 1942, 273 pp.

Friedman, W.F. SRH-159, Preliminaery Historical Report on the Solution of the “B” Machine. (10 pp.)

Friedman, W.F. & L.D. Callimahos. Military Cryptanalytics, Part I. Washington, DC: National Security Agency, 1956, 443 pp.

Friedman, William F. RIVERBANK LABORATORIES PUBLICATIONS

Publication No.15. A Method of Reconstructing the Primary Alphabet From a Single One of the Series of Secondary Alphabets. Department of Ciphers.Riverbank. Geneva, Ill., 1917, 9 pp.

Publication No.16. Methods for the Solution of Running-Key Ciphers. Department of Ciphers. Riverbank. Geneva, Ill. 1918. 42 pp.Cover inscribed Hitt 1918.(Captain Parker Hitt)

Publication No. 17. An Introduction to Methods for the Solution of Ciphers. Department of Ciphers. Riverbank. Geneva, Ill. 1918, 46 pp.

Publication No. 18. Synoptic Tables for the Solution of Ciphers and A Bibliography of Cipher Literature. Department of Ciphers. Riverbank. Geneva, Ill. 1918.16 pp. Cover inscribed Capt. H.L. Baldwin 1933.

Publication No. 19. Formulae for the Solution of Geometrical Transposition Ciphers. Riverbank.Department of Ciphers. Geneva, Ill. 1918.24 pp. Cover inscribed Capt. H.L. Baldwin 1933.

Publication No. 20. Several Machine Ciphers and Methods for their Solution. Department of Ciphers.Riverbank. Geneva, Ill., 58 pp. plus Synoptic Tables for the Star Cipher (14 PP.)

Publication No. 21. Methods for the Reconstruction of Primary Alphabets. Department of Ciphers. Riverbank. Geneva, Ill.14 pp. Cover inscribed Capt. H.L. Baldwin 1933.

Publication No. 22. The Index of Coincidence and Its Application in Cryptography. Paris, France. 87 pp.1922. (Xerox copy)

Appendix tho(sic)Publication No. 22. An Application of the Science Statistics to Cryptography. Paris, France. 8 pp., 1922. (Xerox copy)

Publication No. 50. The Production and Detection of Messages in Concealed Writing and Images. Department of Ciphers. Riverbank. Geneve, ILL.1918 20 pp.

Publication No. 75. Memorization Methods. Specifically Illustrated in Respect to their Applicability to Codes and Topographic Material. Department of Ciphers. Riverbank. Geneva, Ill. 50 pp.

Synoptic Tables for the Star Cipher. Department of Ciphers. Riverbank.Geneva, ILL. 1918. 26 tables plus cover sheet. 27 pp.

The Riverbank Publications.Reprinted by Aegean Park Press, Laguna Hills, CA.92653, 1979.

Volume 1: Publications No. 15, 16, 17, 18.

Volume 2: Publications No. 19, 20, 21.

Volume 3: Publication  No. 22.

Friedman, W.F. & E.S. Friedman. A Review of Studies in Villon, Vaillant and Charles D'Orleans by Ethel Seaton. Medium Aevum, XXVII, 3, 1958, pp. 194-198.

Friedman, W.F. & E.S. Friedman. Acrostics, Anagrams & Chaucer. Philological Quarterly, Jan. 1959, pp. 1-20.

Friedman, W.F. & E.S. Friedman. The Shakespearean Ciphers Examined. Cambridge, England: University Press, 1957, 303 pp.
Inscribed by the authors.

Friedman, W.F. & C.J. Mendelsohn. The Zimmerman Telegram of Jan. 16, 1917 and its Cryptographic Background. Laguna Hills, CA: Aegean Park Press, 1976, 33 pp.

Friedman, W.F. & C.J. Mendelsohn. Notes on Code Words. American Mathematical Monthly, Aug. 1932. 394-409.

The Friedman Legacy: A Tribute to William and Elizebeth Friedman. National Security Agency, Center for Cryptologic History, Sources in Cryptologic History November 3, 1992, 282 pp.

Friedman, T.D. & L.J. Hoffman. Execution Time Requirements for Encipherment Programs. Communications of the ACM, Aug. 1974, pp. 445-449.

Friedrich, J. Extinct Languages. NY: Philosophical Library, 1957, 182 pp.

Friedrich, Johannes. Extinct Languages. NY: Barnes & Noble Books, 1993 reprint, 182 pp.

Frost, Mike. As told to Michel Gratton. Spyworld: Inside the Canadian and American Intelligence Establishments. Toronto, Canada: Doubleday Canada Ltd., 1994, 280 pp.

Fuchida, Mitsua & Masatake Okumiya. Midway: The Battle That Doomed Japan. NY: Ballantine Books, 1968, 222 pp.

Fumy, Walter, ed. Advances in Cryptology -- Eurocrypt '97 Proceedings. NY: Springer-Verlag, 1997, 509 pp.

Fumy, W. & H.P. Reiss. Kryptographie: Entwurf und Analyse Symmetrischer Kryptosysteme. Munich, W. Germany: R. Oldenbourg, 1988, 311 pp.

Gaddy, David W. Essential Matters: A History of the Cryptographic Branch of the People's Army of Viet Nam, 1945-1975. Fort George G. Meade, MD: Center for Cryptologic History, NSA, 1994, 195 pp.

Gaddy, D.W. Rochford's Cipher: A Discovery in Confederate Cryptography. NSA Technical Journal, Vol. XVIII, No. 4, Fall 1973.

Gaddy, D.W. William Norris and the Confederate Signal and Secret Service. Maryland Historical Magazine, Vol. 70, No. 2, Summer 1975, pp. 167-188.

Gaddy, D.W. Secret Communications of a Confederate Navy Agent plus typed follow-up for Spring issue. Manuscripts, Vol. XXX, No. 1, Winter 1978, pp. 49-55.

Gage, M. An Extract Taken From Dr. Rees's New Eyclopedia on the article Cipher. Norwich, England, 1809, 23 pp.

Gaines, Helen F. Elementary Cryptanalysis. Boston: American Photographic Publishing Co., 1943, 230 pp.

Gaines, H.F. Cryptanalysis. Dover Pub., 1956, 237 pp.

Gait, J. Maintenance Testing for the DES. NBS-SP 500-61. Nationa Bureau of Standards, 1980, 29 pp.

Gaj, Krzysztof. Szyfr Enigmy: Metody Zlamania. Warsaw, Poland: Wydawnectiva Komunikaeji I Lacznosci, 1989, 184 pp.

Galbraith, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. NY: J. Wiley and Sons, 2000, 400 pp.

Gallagher, Gary W., ed. Fighting for the Confederacy: The Personal Recollections of General Edward P. Alexander. Chapel Hill, NC: The University of North Carolina Press, 1989, 664 pp.

Galland, J.S. An Historical and Analytical Bibliography of the Literature of Cryptology. Evanston, IL: Northwestern University, 1945, 209 pp.

Gallehawk, John. Convoys and the U-boats. Bletchley Park, England: BP Trust, Report No. 7, 1997, 48 pp.

_____________. How the Enigma Secret Was Nearly Revealed. Bletchley Park, England: Bletchley Park Trust, Report No. 11, Oct. 1998, 28 pp.

______________. Some Polish Contributions in the Second World War. Bletchley Park, England: Bletchley Park Trust, Report No. 15, July 1999, 24 pp.

Gallup, Mrs. E.W. The Bi-Literal Cypher of Sir Francis Bacon. Detroit: Howard Pub. Co., 1900, 368 pp.

Gallup, Elizabeth Wells. The Tragedy of Anne Boleyn.  Geneva, IL: Riverbank Laboratories, 1916, 147 pp. plus Appendix.

Gallup, Capt. A. Handbook of Military Signaling. D. Appleton & Co., 1893, 78 pp.

Ganley, M.J. Cryptography and Coding III. NY: Oxford University Press, 1993, 377 pp.

Gannon, Michael. Operation Drumbeat: The Dramatic True Story of Germany's First U-boat Attacks Along the American Coast in World War II. NY: Harper & Row, 1990, 490 pp.

____________. Black May: The Epic Story of the Allies Defeat of the German U-Boats in May 1943. NY: HarperCollins, 1998, 492 pp.

Garden, N. The Kids' Code and Cipher Book. NY: Holt, Rinehart and Winston, 1981, 164 pp.

Gardner, Martin. Time Travel and Other Mathematical Bewilderments. NY: W.H. Freeman & Co., 1988, 295 pp.

Gardner, Martin. Penrose Tiles to Trapdoor Ciphers. NY: W.H. Freeman & Co., 1988, 311 pp.

Gardner, Martin. Penrose Tiles to Trapdoor Ciphers ... and the Return of Dr. Matrix. Washington, DC: The Mathematical Association of America, 1997, 319 pp.

Gardner, Martin. On the Practical Uses and Bizarre Abuses of Sir Francis Bacon's Biliteral Cipher. Scientific American, Nov. 1972, pp. 114-118.

Gardner, Martin. Codes, Ciphers and Secret Writing. NY: Simon & Schuster, 1972, 96 pp.

Gardner, Martin. Knotted Doughnuts and Other Mathematical Entertainments. NY: W.H. Freeman & Co., 1986, 278 pp.

Gardner, W.J.R. Decoding History: The Battle of the Atlantic and ULTRA. Annapolis, MD: Naval Institute Press, 1999, 263 pp.

Garfield, Simon and Gene Spafford. Web Security and Commerce. Sebastopal, CA: O'Reilly and Assoc. Inc., 1997, 483 pp.

Garis, Howard R. Buddy and the G-Man Mystery or A Boy and a Strange Cipher. NY: Cupples & Leon Co., 1944, 212 pp.

Garlinski, J. The Enigma War. NY: Charles Scribner's Sons, 1980, 219 pp.

Garrett, Paul. Making, Breaking Codes: An Introduction to Cryptology. NJ: Prentice-Hall, Inc. 2000, 524 pp.

Garrison, W.A. & C.V. Ramamoorthy. Privacy and Security in Data Banks. Austin, TX: University of Texas, Tech. Memo. 24, Nov. 2, 1970, 114 pp.

Garro, H.M. Tratado de Criptografia. Lima, Peru: Libreria Studium, 1958, 231 pp.

Gauer, Albertine. A History of Writing. NY: Cross River Press, 1992, second ed., 236 pp.

Gebhard, L.A. Evolution of Naval Radio-Electronics and Contributions of the Naval Research Laboratory. Washington: USGPO, 1979, 448 pp.

Geffe, P.R. Polygram Encipherment Techniques. 10/29,60, 34 pp.

Geffe, P.R. Secrecy Systems Approximating Perfect and Ideal Secrecy. Proceedings of the IEEE, 1965, Sept., pp. 1229-1230.

Geffe, P.R. How To Protect Data With Ciphers That are Really Hard to Break. Electronics, 1/4/73, pp. 99-101.

Geffe, P.R. Ciphers With Pseudo-Random Keys: A Progress Report, 5 pp.

Geffe, P.R. The Compactocrat: A Shannon Transducer with Simple Substitution, 6 pp.

Geheim-Schriften! Munich, Germany:   Kinder-Kolleg im Franz Schneider Verlag, 1973, 48 pp.

Gelb, I.J. Records, Writing and Decipherment. Cleveland: Visible Language, Vol. VIII, No. 4, Autumn 1974, pp. 293-318.

Geheimer Wetter- und Seeschlüssel der Kriegsmarine. Teil 2, Watterkurzschlüssel. (Secret Weather and See Cipher of the Navy. Part 2, Short Weather Code. Berlin: Oberkommando de Kriegsmarine, 1942, 22 pp.

Geheimnisse, die unbedingt geheim bleiben Mussen, 3 pp.

Gen J.O. Mauborgne Dies; Chief Signal Officer of the Army. Obituary, New York Times, 1/8/71.

General Solution for the ADFGVX Cipher System. Technical Paper of the SIS. Washington, USGPO, 1934, 18 pp.

General to Head Security Unit. New York Times, 4/28/72, p. 46.

Generalidades sobre Criptografia, artilce by Major Jose Pedrosa Coutinho de Castro Serrao. Lisbon: Revista Militar, Aug-Sept 1965, pp. 462-484.

George C. Marshall Research Library Newsletter. Friedman Cryptologic Collection Given to Marshall Library. Vol. IX, No. 3, Spring, 1971, 4 pp.

George, W. Surreptitious Entry. San Francisco: Interservice Pu. Cp., 1981, 214 pp.

Gerber, John. Secret Language of War. Facts, Feb. 1944, pp. 13-18.
Gerber, John C. Ciphers In War. Facts, May 1944, pp. 100-103.

German Codes and Ciphers. Copy of Chapter VII from Strother's Fighting Germany's Spies. pp. 134-157.

German Field Ciphers of the First World War. Dover Plains, NY: Goodwin Trading Co., 6 pp.

Gerrard, R.J. & R. McKay. The "Intelligence" Gane of Spy Cases & Problems. NY: Pobert McBride & Co., 1935, 217 pp.

Gersho, Allen, ed. Advances in Cryptography, A Report on Crypto '81. Santa Barbara, CA: University of California, 1982, 156 pp.

Ghosh, Anup K. Security & Privacy for E-Business. NY: John Wiley & Sons, 2001.

Gibson, Walter B. ed. The Fine Art of Spying. NY: Grosset & Dunlap, 1965, 243 pp.

Gilbert, E.N. An Outline of Information Theory. Bell Telephone System Monograph 3025, 1958, 7 pp.

Gilbert, E.N. Information Theory After Eighteen Years. Bell Tel Sys. Monograph 5186, 1966, 7 pp.

Gilbert, E.N., F.J. MacWilliams & N.J.A. Sloane. Codes Which Detect Deception. Bell System Technical Journal, March 1974, pp. 405-424.

Gilbert, Martin. The Second World War, A Complete History. NY: Henry Holt and Co., Inc., 1989, 846 pp.

Gilbert, James L. and John P. Finnegan. U.S. Army Signals Intelligence in World War II: A Documentary History. Washington, DC: USGPO, 1993, 237 pp.

Gilbert,E.N. & E.F. Moore. Variable-Length Binary Encodings. Bell System Technical Journal, July 1957, pp. 933-967.

Gilgert, E.N. F.J. MacWilliams & N.J.A. Sloane. Codes Which Detect Deception. Murray Hill, NJ: Bell Telephone Labs, 3/19/93, 31 pp.

Gilmore, Ken. The Secret Keepers. Popular Electronics, Aug. 1962, pp. 41-44, 102, 104.

Giskes, H.J. London Calling North Pole. London: William Kimber, 1953, 208 pp.

Given, D.W. Poland's Priceless Seed. The Retired Officer, June 1979, pp. 24-25.

Givierge, Ge, Marcel. Course In Cryptography, trans from the French by Office of the Chief Signal Officer. Washington: USGPO, 1934, 164 pp.

Givierge, M. Les Machines a cryptographier er leur applications dans la telegraphie sans fil. Le Genie Civil 81(1922:2), 218-220.

Givierge, Gen. M. Cours De Cryptographie. Paris: Edition Berger-Levrault, 1932, 304 pp.

Giverge, General Marcel. Course in Cryptography. Paris, 1932. Translated from the French by H.F. Gaines and A.M. Scott, 242 pp.

Giverge, M. Col. Cryptographic Machines and Their Applications in Wireless Telegraphy. Le Genie Civil, Sept, 2, 1922, 8 pp.

Giverge, M. Col. Problems of Code. Revue Militare Francaise, Paris, 1924. Extracted from Signal Corps Bulletin, May 1926, 24 pp.

Giverge, M. Col. Le Chiffre. Ecole De Perfectionnement des Officiers de Reserve de Penthieve. Conference, Feb. 6, 1927, 24 pp.

Givierge, Marcel. Primières Notions de Cryptographie (Extrait du Cours de Cryptographie) Paris: Éditions Berger-Levrault, 1935, 32 pp.(Xerox)

Givierge, Col. Marcel. Le Chiffre. Ecole De Perfectionnement des Oficiers de Reserve de Penthièvre. Conference faite le 6 Fevrier 1927. 24 pp. (Poor Xerox)

Glayman, M. Un Modele d'espase vectoriel et son utilisation pour coder et decoder un message. Journal of Structural Learning, Jan 1968, pp. 9-15.

Gleason, Andrew M. Elementary Course in Probability for the Cryptanalyst. Laguna Hills, CA: Aegean Park Press, 1985.

Gleason, Norma. Cryptograms and Spygrams. NY: Dover Pub., 1981 112 pp.

Gleason, Norma. Fun With Codes and Ciphers Workbook. Mineola, NY: Dover Pub., 1987, 43 pp.

Gleason, Norma. The Germans surrender! Decoder got the message. The Lapeer County (Michigan) Press, June 6, 1973, p. 1-B.

Glydén, Yves. Chifferbyraernas Insntser J Världskriget Till Lands. Stockholm: Miliärlitteraturföreningens förlag, 1931, 139 pp.

Goddard, Eldridge & Thelma. Cryptdyct. Marion, IA: 1976, 272 pp.

Goddard, Eldridge & Thelma. Cryptokyt II: Non-Pattern Five Letter Word List. Marion, Iowa: Cryptokyt, 1977, 64 pp.

Goddard, Eldridge & Thelma. Cryptokyt I: Non-Pattern Nine Letter Word List. Marion, Iowa:1977, 28 pp.

Godson, Roy, ed. Comparing Foreign Intelligence: The U.S., the USSR. The U.K. & the Third World. Elmsford, NY: Pergamon Press, 1988, 157 pp.

Goerge, W. Surreptitious Entry. San Francisco: Interservice Pub. Co., 1981, 214 pp.

Goheen, H. A Cryptographic Machine. Iowa Academy of Science, Vol. 60, 1953, pp. 489-491.

Goldreich, Oded. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. NY: Springer-Verlag, 1999, 182 pp.

_______________. Foundations of Cryptography: Basic Tools. NY: Cambridge University Press, 2001, 372 pp.

Goldstein, Donald M. & Katherine V. Dillon, eds. The Pearl Harbor Papers: Inside the Japanese Plans. McLean, VA: Brassey's (US), 1993, 384 pp.

Goldwasser, Shafi. Advances in Cryptology: Proceedings of Crypto '88. NY: Springer-Verlag, 1990, 591 pp.

Gollman, Dieter, ed. Fast Software Encryption, Third International Workshop, Cambridge, UK, February 1996, Proceedings. NY: Springer-Verlag, 1996, 218 pp.

Golomb, S.W. Shift Register Sequences. SanFrancisco: Holden-Day, Inc., 1967, 224 pp.

Gonzalez,-Crussi, F. On The Nature of Things Erotic. NY: Harcourt Brace Jovanovich, 1988, 197 pp.

Gooch, John, ed. Decisive Campaigns of the Second World War. Portland, OR: Frank Cass & Co. Ltd. c/o International Specialized Book Services Ltd., 1990, 198 pp.

Good, I.J. Pioneering Work On Computers at Bletchley. Invited lecture at the National Physical Laboratory, Teddington, Middlesex, April 28, 1976, 23 pp.

Good, I.J. A.M. Turing's statistical work in World War II. Great Britain: Biometrika, (1979) 66, 393-396.

Good, I.J. Some Future Social Repercussions of Computers. England: International Journal of Environmental Studies, Vol. 1, pp. 67-79.

Goode, George E. Protecting Data Links With Security Program. Communications News, Dec. 1971, pp 34-35.

Goode, George E. New Developments in Data and Voice Security. Paper OTC1726 presented at Offshore Technology Conference, Houston, TX, April 29-May 2, 1973, 14 pp.

Gordon, Don E. Electronic Warfare: Elements of Strategy and Multiplier of Combat Power. NY: Pergamon Press, 1981, 181 pp.

Gordon, Cyrus H. The Decipherment of Minoan. Natural History, Nov. 1963, pp. 22-31.

Gordon, A. The Cipher. Pyramid Books, 1966, 205 pp.

Gordon, Cyrus H. Riddles in History. NY: Crown Pub., 1974, 188 pp.

Gordon, Cyrus H. Forgotten Scripts. NY: Basic Books, 1982, 226 pp.

Gores, Landis. Princetonians in the Ultra Service. Princeton Alumni Weekly, May 27, 1975, pp. 10-13.

Gouazé, L.Y. Needles and Haystacks: The Search for Ultra in the 1930's. Naval Postgraduate School, Thesis, 1983, 85 pp.

Goulden, J.C. Truth Is The First Casualty. Chicago: Rand McNally & Co., 1969, Xerox copy of pp. 100-123, 201-202.

Grady, Frank J. and Rebecca Dickson. Surviving the Day: An American POW in Japan. Annapolis, MD: Naval Institute Press, 1997, 274 pp.

Graff, Jon C. Cryptography and E-Commerce. NY: John Wiley & sons, Inc., 2001, 222 pp.

Grant, N. Neil Grant's Book of Spies and Spying. England: Kestrel Books, 1975, 160 pp.

Graham, L.A. The Surprise Attack in Mathematical Problems. Chpater 11 - Codes and Ciphers. NY: Dover Pub., 1968, pp. 28-32.

Granatstein, J.L. & David Stafford. Spy Wars: Espionage and Canada from Gouzenko to Glasnost. Toronto: Key Porter Books, Ltd., 1990, 276 pp.

Grant, Eleanor A. The Kids' Book of Secret Codes, Signals, an Ciphers. Philadelphia: Running Press Book Pub., 1989, 80 pp.

Grant, R.G. MI5/MI6: Britain's Security and Secret Intelligence Services. New York: W.H. Smith Pub., 1989, 192 pp.

Graysmith, R. Zodiac. NY: St. Martin's Press, 1986, 337 pp.

Grayson, William C. Chicksands: A Millennium of History. Crofton, MD: Shefford Press, 1992, 330 pp.

Greenfield, Jonathan. Distributed Programming Paradigms with Cryptography Applications. NY: Springer-Verlag, 1994, 182 pp.

Greenfield, Gary R.  Cryptography, The Art and Science of Cipher Design.  Richmond, VA: University of Richmond, 1987, N.P.

Greenwald,Ken. The Lost Adventures of Sherlock Holmes: Based on the Original Radio Plays by Denes Green & Arthur Boucher. (Includes “The Case of the Baconian Cipher.” NY: Barnes & Noble, Inc., 1993 reprint, 199 pp.

Gribble, Jr., Lt. Colonel G. Dickson. Ultra: Its Operational Use in the European Theater of Operations,1943-1945. Carlisle Barracks, PA: U.S. Army War College, 1991, 80 pp.

Griffin, W.E.B. Behid the Lines. NY: Jove Publications, 1996, 559 pp.

Grignetti, M.C. A Note on the Entropy of Words in Printed English. Information and Control 7, 1964, pp. 304-306.

Groh, Lynn. The Culper Spy Ring. Philadelphia: Westminster Press, 1969, 144 pp.

Grombach, John V. The Great Liquidatior. Garden City, NY: Doubleday & Co., Inc., 1980, 408 pp.

Gross, Hans. Ciphers and Other Secret Writings. Chapter XV from Criminal Investigation, John Adam & J.C. Adam. England: Sweet & Maxwell, Ltd., 1934, pp. 398-413.

Gross, Hans. Handbuch fuer Untersuchungsrichter. 1914. English translation of chapter, "Different Systems of Cipher." (Xerox)

Grossman, E.R. & B. Tuckerman. Analysis of a Feistel-like Cipher Weakened by having no Ritating Key. IBM Report RC-6375, 1977, 33 pp.

Grossman, Edna & Don Coppersmith. Generators for Certain Alternating Groups with Applications to Cryptography. IBM Report RC 4741, Feb. 26, 1974, 10 pp.

Grossman, Edna. Group Theoretic Remarks On Cryptographic Systems Based On Two Types of Addition. IBM Report RC 4742, Feb. 26, 1974.

Groth, E.J. Generation of Binary Sequences With Controllable Complexity. IEEE Transactions on Information Theory, May 1971, pp. 288-296.

Grube, H. Neue Moglichkeiten Zahlungsanwersungen Im Bankbetriebe Sicherzustellen. Berlin-Karlshorst, 12 pp.

Gudgin, Peter. Military Intelligence: The British Story. NY: Sterling Publishing Co., Inc. 1989, 156 pp.

Guidelines (Draft) For Implementing and Using the NBS Data Encryption Standard (Proposed). The Institute for Computer Sciences & Technology, NBS, Nov. 10, 1975.

Guild, Capt. George R. Flag Signalists' Handbook. Menasha, WI: George Banta Pub. Co., 1919, 68 pp. plus message pad.

Guild, Nicholas. The Linz Tattoo. NY: McGraw-Hill Book Co., 1986, 503 pp.

Guillen, M. Automated Cryptography. Science News, Vol 110, No. 12, Sept. 18, 1976, pp. 188-190.

Guillou, Louis C. and Jean-Jacques Quisquater, eds. Advances in Cryptology - EUROCRYPT '95. NY: Springer-Verlag, 1995, 416 pp.

Guilmain, J. A Note on the "Arabesques" in the Diatessaron, Florence, Bibl. Laur., Orient. 81. Art Bulletin, March 1873, pp. 38-39. (see newspaper story under refernce Mason, B.)

Gunsom, Jonathan and Martin Coombe. The Merlin Mystery. NY: Warner Books, Inc., 1998, 48 pp.

Gunther, Christoph G., ed.  Advances in Cryptology    Eurocrypt '88.  NY: Springer Verlag New York, 1988, 473 pp.

Gustring, Bertel R. Ciphers and Ciphering Machines. The Bulletin, American Society of Swedish Engineers, Oct. 1941, pp. 6-9.

Gyldén, Yves. The Contribution of the Cryptographic Bureaus in the World War. Laguna Hills, CA: Aegean Park Press, 1978, 87 pp.

Gyldén, Yves. The Contribution of the Cryptographic Bureaus in the World War. Reprinted from Signal Corps Bulletins, Nos. 75-81, Nov. 1933-Nov. 1934. USGPO, 1935, 87 pp.

Gyldén, Yves. History of Decryptment. Revue Internationale de Criminalistique, No. 5, No. 2, 1930, 12 pp.

Gyldén, Yves. Autokey Systems With the Saint-Cyr Ruler. Revue Internationale de Criminalistique. No. 1 & 2, 1933, 18 pp.

Gyldén, Yves. Chiffrebyraernas Insatser I Världaskriget Till Lands. Stockholm: Militarlitteraturtöreningens förlag, 1931, 139 pp.

Gyldén, Yves. The Contributions of the Cryptographic Bureaus in the World War. Washington: Trans. by Military Intelligence Division, War Dept. and published in The Signal Corps Bulletin, Nos. 75-81, 1933-1934. Typescript, 135 pp.

Gyldén, Yves. Analysis, From  the Point of View of Cryptanalysis, of "Cryptographer Type C-36," Provided with 6 Key Wheels, 27 Slide Bars, The Letter Having Movable Projections, Single or Multiple. Trans. from the French, Stockholm, May 9, 1938, 21 pp.

Gyldén, Yves. Analysis of Model C-36 Cryptgraph From the Viewpoint of Cryptanalysis. Stockholm: trans. from the French. Feb. 26, 1936, 20 pp.

Gyldén, Yves. Cryptographic articles (7).

Hackwell, W. John. Signs, Letters, Words: Archaeology Discovers Writing. NY: Charles Scribner's Sons, 1987, 65 pp.

Hafner, Katie & John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. NY: Simon & Schuster, 1991, 368 pp.

Hagelin, Boris. Die Geschichte der Hagelin-Cryptos. Zug, Switzerland: Crypto AG, 1979, 64 pp.

Hagelin, Boris. The History of the Hagelin-Cryptos. Translation, 63 pp.

Hagelin, Boris. The Story of the Hagelin-Cryptos. Zug, Switzerland: Crypto AG, 1981, 58 pp.

Hagen, Nicky. Secret Power: New Zealand's Role in the International Spy Network. Nelson, NZ: Craig Patton Pub., 1996, 299 pp.

Hake, Ted. Hake’s Price Guide to Character Toy Premiums. Timonium, MD: Gemstone Publishing, Inc., 1996, 616 pp.

Haldane, R.A. The Hidden World. London: Robert Hale & Co., 1976, 207 pp.

Hall, Marie Bauer. Introductory Comments to: "Inquiry Into The Nature of Space and of Life In Space." Long Beach, CA: Veritas Press, 24 pp.

Hall, Parnell. Last Puzzle and Testament. NY: Bantam Books, 2000, 339 pp.

Hall, Richard. The Secret State. Cassell Australia, Ltd., 1978, 252 pp.

Hall, Manly P. The Secret Teachings of All Ages: An Encyclopedic Outline of Masonic, Hermetic, Qabbalistic and Rosicrucian Symbolical Philosophy. Los Angeles: The Philosophical Research Society, Inc., 1988, 245 pp.

Hallamaa, R.H. Salakirjoitustsidon Perusteet (Basic Cryptography). Helsinki, Finland: Tekijan Kustantame, 1937, 97 pp. (Xerox).

Hallamaa, R. Salakirjoitustaidon Perusteet (Basics of Cryptography). Helsinki, Finland: Tekijän Kustantame, 1937, 97 pp.

Halperin, M.H. The Most Secret Agents. The New Republic, July 26, 1975, pp. 12-13.

Halterm J.C. Top Secret Projects of World War II. NY: Wanderer Books/Simon & Schuster, 1978, 192 pp.

Hamel, Georg. The Kryha Ciphering Machine - A Mathematical Opinion, 1929, 14 pp.

Hamel, G. Anwendung der Elementaren Zahlentheorie auf die Theorie einer Chiffrier-Maschine. Aus den Sitzungsberichten der Berliner Mathematischen Geselischaft, 1927 ?, pp. 94-110.

Hamilton, Charles. In Search of Shakespeare: A Reconnaissance into the Poet's Life and Handwriting. NY: Harcourt, Brace Jovanovich, 1985, 271 pp.

Hamm, Diane L. Military Intelligence: Its Heroes and Legends. Washington: USGPO, 164 pp.

Hammer, Carl. How Did TJB Encode B@? Invited paper, Beale Cypher Symposium, 4/15/72, 11 pp.

Hammer, Carl. Signature Simulation and Certain Cryptographic Codes. Invited paper, Third Annual Simulation Symposium, Jan. 14, 1970, 26 pp.

Hammer, Carl. Memorandum # 6, The Beale Cypher. Jan. 25, 1972, 6 pp. plus 7 page list of Beale Cypher Study Committee Members.

Handel, Michael I., ed. Intelligence and Military Operations. Portland, OR: Frank Cass ISBS, 1990, 464 pp.

Handschlüsselverfahren. German pages with English translation, Manual Cipher System, 12 pp.

Haney, Al. Operation Primrose ... A Matter of Piracy. NY: Vantage Press, Inc., 1992, 263 pp.

Hanson, Dick. The Incursion. NY: Little, Brown & Co., 1987, 263 pp.

Hardeman, L.J. Information Theory After 25 Years: Applications Begin to Pay Off. Electronics, May 10, 1973, 100-106.

Hardie, Bradford. 16 isolated pages of his crypto experience in the U.S. Army.

Hardie, Bradford, Cryptographer's Way. 1967, 94 pp.

Hardy, Darel W. and Walker, Carol L. Applied Algebra: Codes, Cipher and Discrete Algorithms. NJ:Upper Saddle River, Prentice Hall, 2003, 420 pp.

Harmon, Jim. Radio & TV Premiums: A Guide to the History and Value of Radio and TV Premiums. Iola, WI: Krause Pub., 1997, 256 pp.

Harnett, Richard M. Wirespeak: Codes and Jargon of the News Business. San Mateo, CA: Shorebird Press, 1977, 174 pp.

Harper, Stephen. Capturing Enigma: How HMS Petard Seized the German Naval Codes. NY: Sutton Pub. Co., 1999, 180 pp.

Harris, Ruth R. The "Magic" Leak of 1941 and Japanese-American Relations. Pacific Historical Review, Feb. 1981, pp. 77-96.

Harris, Frances A. Solving Simple Substitution Ciphers. A.C.A., 1959, 44 pp.

Harris, W.R. Intelligence and National Security. A Bibliography with Selected Annotations. Part I-Introduction. Part II-A Critique of the Literature. Cambridge, MA: Harvard University, 1968, XCII pp.

Harris, Robert. Enigma, NY: Random House, 1995, 320 pp.

Harris,Stephen M. British Military Intelligence in the Crimean War 1854-1856. London: Frank Cass Publishers, 1999, 182 pp.

Harris III, Charles H. and Louis R. Sadler. The Border and the Revolution: Clandestine Activities of the Mexican Revolution: 1910-1920. Silver City, NM: High-Lonesome Books, 1988, 142 pp.

Harrison, Payne. Black Cipher. NY: Crown Publishers, Inc., 1994, 337 pp.

Hartcup, Guy. The Effect of Science on the Second World War. NY: St. Martin’s Press, 2000, 214 pp.

Hartley, Major R. and Captain W. Horsefield. Esential Basic German Military Terms. Aldershot, UK, Gale & Polden Ltd., 1944,67 pp.

Hartswick, F.G. Solving Code Problems. The Illustrated Detective Magazine, Feb. 1932, pp. 72, 114, 132.

Hartswick, F.G. Almost Perfect Cipher System. Esquire, April 1936, pp. 88, 140.

Haskell, David. Score One For Vikings. Newspaper story on Runes found in Maine. Long Island Press, 10/31/71.

Haslach, Robert D. Nishi No Kaze Hare (West Wind, Clear), The Watch on Japan, Cryptography and Intelligence, Dutch East Indies vs Japan, 1932-1942. Manuscript, 1984, 416 pp.

Haslack, Robert D. Nishi No Kaze, Hare. Weesp, The Netherlands: Unieboek B.V., 1985, 224 pp.

Hassard, J. Cryptography in Politics. North American Review, Vol. 128, March 1879, 315-325.

Haswell, J. Spies and Spymasters. NY: Thomas and Hudson, 1977, 176 pp.

Haswell, J.H. Secret Writing. Century Magazine, Nov. 1912, pp. 83-92.

Hatch, David A. with Robert Louis Benson. The Korean War: The SIGINT Background. Fort Meade, MD: NSA, 2000, 18 pp.

Hauser, Thomas. The Hawthorne Group. NY: Tom Doherty Associates, Inc. 1993, 342 pp.

"Havana Moon." Uno, Dos, Cuarto: A Guide to the Numbers Stations. Lake Geneva, WI: Tiare Pub., 1987, 73 pp.

Hawcock, David & Patrick Mac Allister. Puzzle Power! Multidimensional Codes, Illusions, Numbers, and Brainteasers. Boston: Little, Brown and Co., 1994, 10 pp.

Hawtin, Jeff. Secret Messages: A Collection of Puzzles Using Codes and Ciphers. Jersey City, NJ: Parkwest Publications, Inc., 1990, 48 pp.

Hawton, J.C. Learnabout ... Codes and Ciphers. Leicestershire, England: Ladybird Books Ltd., 1983, 52 pp.

Haynes, Alan. The Elizabethan Secret Services, 1590-1603. Wolfeboro Falls, NH: Alan Sutton Pub., 1992, 179 pp.

Haynes, John E. and Harvey Klehr. VENONA: Decodig Soviet Espionage in America. New Haven, CT: Yale University Press, 1999, 487 pp.

He Knows the Password. John Alexander Samford. New York Times, Sept. 7, 1960, p. 14.

Headquarters, Department of the Army. Basic Cryptanalysis, FM 34-40-2, 1990. Springfield, VA: National Technical Information Service, 363 pp.

Healy, Tim & Roger Gheysens. Armees Secretes: La Resistance en Europe durant la Seconde Guerre Mondiale. Paris, France: Editions Gamma, 1982, 48 pp.

Heath, F.G. Origins of the Binary Code. Scientific American, Aug. 1972, pp. 76-83.

Heider, F.P., D. Kraus & M. Welschenbach.  Mathematische Methoden der Kryptoanalyse.  Wiesbaden, W. Germany: Friedr. Vieweg & Sohn, 1985, 478 pp.

Heider, Franz-Peter. A Colossal Fish. Unpublished paper on cryptanalysis of SZ 40/42. Hürth, Germany: 1994, 27 pp.

Heiskanen, Ravimio. Stella Polaris. Helsinki, Finland: Kustannusosakeyhtiö, 1994, 95 pp.

Heitman, H. ed. The Signal Service in the Service of OKH During World War II. Operational History Branch, National Archives, MS # P-041K, Nov. 28, 1947, 63 pp.

Helcrypt Publicity. Article about H.E. Langen in binder.(Was editor of The Cryptogram, ACA’s bimonthly publication)

Held, Gilbert. Top Secret Data Encryption Techniques. Carmel, IN: Sams Publishing, 1993, 218 pp. plus disk.

Held, Gilbert. Learn Encryption Techniques with BASIC and C++. Plano, TX: Wordware Pub., 1999, 401 pp. plus CD-ROM.

Helleseth, Tor, ed. Advances in Cryptology -- Eurocrypt '93 Proceedings. NY: Springer-Verlag Inc., 1994, 465 pp.

Hellman, M.E. The Mathematics of Public-Key Cryptography. Scientific American, Aug. 1979, pp. 146-157.

Hellman, Martin. Cryptography in the Electronic Age. The Stamford Engineer, Fall/Winter 1978, pp. 3-8.

Hellman, M.E. & S.C. Pohlig. An Improved Algorithm fpr Computing Logorithms over GF(p) and its Cryptographic Significance. IEEE Transactions on Information Theory, Vol. IT-24, No. 1, Jan. 1978, pp. 106-110.

Hellman, M.E. A Cryptanalytic Time Memory Tradeoff. Stanford: Stanford University, N.D., 19 pp.

Hellman, M.E. The Information Theoretic Approach to Cryptography. Stanford: Stanford University, N.D., 58 pp.

Hellman, Martin. An Extension of the Shannon Theory Approach to Cryptography. IEEE Transactions on Information Theory. Vol. IT-23, No. 3, May 1973, pp. 289-294.

Helmick, L.S. Key Woman of the T-Men. Reader's Digest, Sept. 1937, 51-55.

Helmick, Leah Stock, Codes - Fact and Fallacy. American Legion magazine, Aug. 1937, pp. 18-19, 58.

Hempfner, Philip & Tania. Pattern Word List For Divided and Undivided Cryptograms. Stome Mountain, GA: 1984, 100 pp.

Henhoeffer, Willaim. The Intelligence War in 1941: A 50th Anniversary Perspective. Washington, DC: CIA, Center for the Study of Intelligence, 1992, 43 pp.

Hennessy, Michael. Intelligence Services in the Information Age: Tjeory and Practice. London: Frank Cass, 2002, 252 pp.

Henson, Michael Paul. John Swift's Lost Silver Mines. Jeffersonvile, IN: M.P. Henson, 1975, 99 pp.

Hermann, A. Introduction au Livre des Clefs, Systeme Cryptographique Complet. Paris: Librairie Scientifique, 1892, 21 pp.

Hermann, A. New Cryptograph Based on the Bazeries System. Revue Scientifique, Sept. 2, 1893, 6 pp.

Hersh, Seymour M. Iran Signs Rockwell Deal On Spy Base For The Gulf, New York Times, June 1, 1975, pp. 1, 31.

Hersh, Seymour M. The Target Is Destroyed. NY: Random House, 1986, 282 pp.

Hessler, Gunter. The U Boat War in the Atlantic 1939 1945. London: HMSO, 1989, 442 pp.

Hiatt, B. Decipherment of Writing Systems. Research News, University of Michigan, Dec. 1976, Vol. XXVII, No. 12, 20 pp.

Hicks, H.C. QDBWFNEGMRHPKNOJBIHVUGCYF -- or, Experiences in Cryptography. The Carnegie Technical, May 1942, pp. 11-12, 39.

Hicks, Clifford B. Alvin's Secret Code. NY: Scholastic Book Services, 1971, 160 pp.

Hicks, C.B. Tales From the Black Chamber. American Heritage, April 1973, pp. 56-61, 95.

Higenbottam, Frank. Codes and Ciphers. London: English Universities Press, `1973, 180 pp.

Higgins, T. East Wind Rain. U.S. Naval Institute Proceedings, Nov. 1955, pp. 1198-1203.

Highland, H.J. Protecting Your Microcomputer System. NY: Wiley Press, 1984, 244 pp.

Hill, Lester S. Cryptography in an Algebraic Alphabet. American Math Monthly, June-July 1929, pp. 3060312.

Hill, Lester S. Concerning Certain Linear Transformation Apparatus of Cryptography. American Math Monthly, March 1931, pp. 135-154.

Hill, Norman. How To Solve Puzzles. NY: Funk & Wagnalls, 1974, 222 pp.

Hilton, S.E. Hitler's Secret War In South America 1939-1945. Baton Rouge, LA: Louisiana State University Press, 1981, 353 pp.

Hinden, H.J. LSI-based data encryption discourages the data thief. Electronics, June 21, 1979, pp. 107-120.

Hindley, J. & F. Travis. The Fun Craft Book of Spycraft. Scholastic Book Services, 1978, 47 pp.

Hinrichs, Ernest H. Listening In: Intercepting German Trench Communications in World War I. Shippensburg, PA: Mane Pub. Co., Inc., 1996, 148 pp.

Hinsley, F.H. et al. British Intelligence in the Second World War, Vol. III, Part 2. London: HMSO, 1988, 1,038 pp.

Hinsley, F.H. et al. British Intelligence in the Second World War, Vol. III, Part I. NY: Cambridge University Press, 1984, 693 pp.

Hinsley, F.H. et al. British Intelligence In the Second World War, Vol. II. London: HMSO, 1981, 849 pp.

Hinsley, F.H. et al. British Intelligence in the Second World War, Vol. I. London: HMSO, 1979, 601 pp.

Hinsley, Sir Harry. The Intelligence Revolution: A Historical Perspective. Colorado Springs, CO: U.S. Air Force Academy, 1988, 12 pp.

Hinsley, F.H. British Intelligence in the Second World War. Abridged edition. NY: Cambridge University Press, 1993, 620 pp.

Hinsley, F.H. and C.A.G. Simkins. British Intelligence in the Second World War, Volume 4, Security and Counter-Intelligence. NY: Cambridge University Press, 1990, 408 pp.

Hinsley, F.H. & Alan Stripp, eds. Codebreakers: The Inside Story of Bletchley Park. NY: Oxford University Press, 1993, 321 pp.

Hirschberg, Arthur. Can You Solve It? A Book of Puzzles and Problems. NY: Thomas Y. Crowell Co., 1926, 311 pp.

Historical Notes. Time, May 14, 1956, p. 33. (About $100,000 award to WFF with photo using biliteral cipher.)

The History of Security Monitoring, WW I to 1955. SRH-162.

History of the Signal Security Agency. Vol. Two: The General Cryptanalytic Problems. 443 pp.

History of the Special Distribution Branch, Military Intelligence Service WDGS, Part 3, Section &, 7 pp.

History of Engineering Research Associates. Aug. 16, 1946, 26 pp.

History of ASA. History of the Signal Security Agency. Vol. I, Organization. Part I, 1939-1945. Part II, 1942-1945. April 13, 1948.

History of Engineering Research Associates. Aug. 16, 1946, 26 pp.

Hitchcock, Lt. Col. Walter T., ed. The Intelligence Revolution: A Historical Perspective. Washington, DC: USGPO, 1991, 366 pp.

Hitchcock, Alfred. Alfred Hitchcock's Sinister Spies. NY: Random House, 1966, 206 pp.

Hitt, Lt. Col. Parker. Manual For the Solution of Military Ciphers plus added problems for the solver. Laguna Hills, CA: Aegean Park Press, 1976, 112 pp.

Hitt, Parker. Personal Narrative-World War I, Jan. 4, 1919.

Hitt, Col. Parker, A Tale of the Rio Grande. New York National Guardsman, Oct. 1936, pp 19, 22.

Hitt, Col. Parker. The ABC of Secret Writing. NY: Puck Products Co., 1935, n.p.

Hitt, Lt. Col. Parker. Manual For the Solution of Military Ciphers. Ft. Leavenworth, KS: Army Service Schools Press, 1918, 100 pp.

Hitt, Parker. Manual For the Solution of Military Ciphers. NY: New York University Bookstore, reprint.

Hitt, Col. Parker. Memorandums and organization charts of International Communications Laboratories. Memos refer to cipher printer system known as the scrambler, 1930.

Hoare, Oliver. Codebreaking and the Second World War. Surrey, England: Public Record Office, 2002, 16 document facsimiles plus 12 pp.

Hoch, C.D. The Spy and the Thief. Davis Pub., 1971, 192 pp.

Hodges, Andrew. Alan Turing: The Enigma. NY: Simon & Schuster, 1983, 587 pp.

Hodgson, Godfrey. The Colonel: The Life and Wars of Henry Stimson. NY: A.A. Knopf, 1990, 402 pp.

Hoehling, A.A. The Week Before Pearl Harbor. NY: W.W. Norton & Co., 1963, 238 pp.

Hoffer, E. Kappi tables. Prepared for Bklyn. College Cipher Club and the New York Cipher Society, 3 pp.

Hoffman, L.J. Modern Methods for Computer Security and Privacy. Englewood Cliffs, NJ: Prentice-Hall, Inc., 1977, 255 pp.

Hoffman, Lance J. Building in Big Brother: The Cryptographic Policy Debate. NY: Springer-Verlag, 1995, 560 pp.

Hoffman, Paul. Archimedes’ Revenge: The Joys and Perils of Mathematics. NY: W.W. Norton & Co., 1988, 285 pp.

Hoflechner, Walter. Bemerkungen zur Frühneuzeitlichen Kryptographie und ihrer Interpretation. Graz, Austria: Adeva-Mitteilungen, Oct. 1972, pp. 12-17.

Höhne, H. Codeword: Director. NY: Berkley Medallion, 1972, 448 pp.

Holand, Hjalmar R. Explorations in America Before Columbus. NY: Twayne Pub., 1962, 381 pp.

Holden E.S. The Cipher Dispatches. The International Review 6(1879) 405-424.

Hollenbach, Karl F. Francis Rosicross. Ekron, KY: Dunsinane Hill Pub., 1996, 187 pp.

Holmes, W.J. Double-Edged Secrets. Annapolis, MD: Naval Institute Press, 1979, 240 pp.

Holst, P.A. Handbook of the Beale Cipher. Berale Cypher Association, 1980, 150 pp.

Holstein, O. A New Cipher. Letter to Editor, Scientific American Supp.. April 14, 1917, p. 235.

Holstein, O. The Ciphers of Porta and Vigenere: The Original Undecipherable Code and How to Decipher it. Scientific American Monthly 4(1921) 332-334.

Hooker, C.W.R. The Deciphering of Cryptograms. Police Journal, Dec. 1928, pp. 621-633.

Hooker, C.W.R. The Jules Verne Cipher. Police Journal, Jan. 1931, pp. 107-119.

Hope, Jonathan. The Authorship of Shakespeare's Plays: A Socio-Linguistic Study. NY: Cambridge University Press, 1994, 188+ pp.

Hopkins, Albert A. The Lure of the Lock. NY: The General Society of Mechanics and Tradesmen, 1928, Xerox copy of PP. 36-39, 89-90 on the letter lock.

Hopson, Commander Thomas E. COMINT at Coral Sea and Midway: Admiral Nimitz's Force Multiplier. Carlisle Barracks, PA: U.S. Army War College, Military Program Studies Program Paper, 1984, 28 pp.

Horan, James D. Confederate Agent: A Discovery in History. NY: Crown Pub., 1954, 326 pp.

Horesh, Josua. An Iraqi Jew in the Mossad: Memoir of an Israeli Intelligence Officer. Jefferson, NC: McFarland & Co., Inc., 1999, 215 pp.

Horgan, Penelope S. Signals Intelligence and Support to U.S. Military Commanders: Past and Present. Carlisle Barracks, PA: U.S. Army War College, 1991, 164 pp.

Horner, D.M. Special Intelligence in the South-West Pacific War in World War II. Australian Outlook, pp. 310-327.

Horner, D.M.  High Command: Australia and Allied Strategy 1939 1945. (Xerox copy of chapter 10, Allied intelligence cooperation in the SWPA, pp. 223 246.) Winchester, MA: Allen & Unwin Inc., 1982.

Horster, P. & H. Isselhorst. Approximative Public Key Kryptosysteme. Heidelberg, W. Germany: Springer Verlag, 1989, 174 pp.

Horster, P. Kryptlogie. Mannheim, Germany: Bibliographiecher Institut, 1985, 332 pp.

Hovanec, H. The Puzzler's Paradise: From the Garden of Eden to the Computer Age. Paddington Press, 1978, 160 pp.

House, Jonathan M. Military Intelligence, 1870-1991: A Research Guide. Westport, CT: Greenwood Press, 1993, 165 pp.

Housley, Russ & Tim Polk. Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure. NY: John Wiley & sins, 2001, 327 pp.

How To Send A Secret Message. National Geographic World, No. 2, Oct. 1975, pp. 16-21.

How To Read The Supermarket Codes. The Bohack Consumer Guide, 1970, 6 pp.

Howard, Michael. British Intelligence in the Second World War, Volume Five, Strategic Deception. NY: Cambridge University Press, 1990, 271 pp.

Howe, George F.  American Signal Intelligence in Northwest Africa and Western Europe.  NSA/CSS, 1980, 207 pp.

Howe, Norma. Blue Avenger Cracks the Code. NY: H.Holte & Co., 2000, 296 pp.

Hoyt, Edwin P. Pearl Harbor. NY: Avon Books, 1991, 186 pp.

Hoy, Hugh C. 40 O.B. or How The War Was Won. London: Hutchinson & Co., 1932, 287 pp.

Hsiao, D.K., D.S. Keir & S.E. Madnick. Computer Security. Academic Press, 1979, 299 pp.

Huckle, Helen. The Secret Code Book. NY: Dial Press, 1995, 58 pp.

Hulme, F.E. Cryptography or The Principles and Practices of Cypher-Writing. London: Ward, Lock and Co. Ltd., 192 pp.

Hume, Fergus.  The Crimson Cryptogram.  NY: F.M. Buckles & Co., 1902, 255 pp.

Hunt, Sir David. A Don at War. Portland, OR: Frank Cass & Co. c/o ISBS, Inc., 1990, 288 pp. plus 36 pp. foreword.

The Hunt for the Pearl Harbor Files. Transcript of television program produced by The Monitor Channel, Boston, MA, 1991, 32 pp.

Hunter, D.H. The Evolution of Literature of U.S. Intelligence. Armed Forces & Society, Nov. 1978, 5: 31-52.

Hunter, Robert. Spy Hunter: Inside the FBI Invstigation of the Wlaker Espionage Case. Annapolis, MD: Naval Institute Press, 1999, 250 pp.

Hunter, Sara Hoagland. The Unbreakable Code. Flagstaffm AZ: Northland Pub., 1996, 36 pp.

Huntoon, John. Yhpargotpyrc NI detseretni. QST, May 1942, pp. 15-17.

Huntoon, John. Easy Lessons In Cryptanalysis, QST, July 1942 -Dec. 1942.

Huntress, Diana. Unsolved Mystery: The Deadly Double. El Paso, TX: The Investigator, September 1981, 42-43, 65. (Separate letter to author from L. Kruh denying quotations attributed to him, which give credence to the author’s conclusions.)

Hurt, John B. A Version of THE JAPANESE PROBLEM IN THE Signal Intelligence Service (Later SIGNAL SECURITY AGENCY) 1930-1945. (Sanitized copy furnished by NSA.)

Hutt, A.E., S. Bosworht & D.B. Hoyt, eds. Computer Security Handbook, second edition. NY: Macmillan Pub. Co., 1988, 399 pp.

Hutt, Arthur E., Seymour Bosworth and Douglas B. Hoyt. Computer Security Handbook, Third Edition. NY: John Wiley & Sons, 1995, 947 pp.

Hüttenhain, V.E. Die Geheimschriften Des Fürstbistume Münster Unter Christoph Bernhard Von Galen 1650-1678. Verlag Aschendorff Münster, 1974, 101 pp.

Hüttenhain, Eric or Victor Wendland (???). Probleme der Entzifferung (insbesondere russischer chiffrierter Funksprüche). Band II. Hilfsmittel der Entzefferung. 179 pp.

Hüttenhain, Eric or Victor Wendland (???). Probleme der Entzifferung (insbesondere russischer chiffrierter Funksprüche). Band III. Praktache Entzifferung. 306 pp.

Hutton, Clayton. Official Secret. NY: Crown Pub., 1961, 212 pp.

Hyde, H. Montgomery. Room 3603. NY: Dell Pub., 1964, 286 pp.

Hyek, Mary. Secret Codes-Reading Activity Cards. Frank Schaffer Pub., 1974, 44 cards.

Hyman, Vernon T. Giant Killer. NY: Richard Marek Pub., Inc., 1981, 357 pp.

Hymoff, E. How They're Watching Us. Popular Mechanics, July 1976, pp. 47-49, 104, 106, 108-109.

IBM Research Reports. Data Privacy. Vol. 7, No. 4, 1971, 12 pp.

Icove, David, Karl Seger & William Von Storch. Computer Crime:A Crimefighter’s Handbook. Sebastopol, CA: O’Reilly & Assoc., 1995, 437 pp.

IEEE Transactions on Software Engineering. Special Issue On Computer Security and Privacy. NY: February 1987, Vol. SE-13, No. 2,296 pp.

Ifrah, Georges. The Universal History of Numbers: From Prehistory to the Investion of the Computer. NY: John Wiley & Sons, 2000, 634 pp.

Ikeler, T.R.S. Contributions of Cryptography To the Naval Aspects of World War I. U.S. Naval Academy, 1950, 17 pp.

Imai, Hideki and Ronald L. Rivest, eds. Advances in Cryptology --ASIACRYPT '91 Proceedings. NY: Springer-Verlag Inc., 1993, 498 pp.

Imai, Hideki and Yuliang Zheng (Eds.) Public Key Cryptography: Workshop on Practice and Theory on Public Key Cryptography PKC 2000 Proceedings. NY: Springer-Verlag, 2000, 485 pp.

Ind, Col. Allison. A Short History of Espionage. NY: David McKay Co., 1963, 337 pp.

Ind, Allison. Allied Intelligence Bureau. NY: David McKay Co., 1958, 305 pp.

Ind, Allison. A History of Modern Espionage. London: Hodder & Stoughton, Lts., 1965, 288 pp.

Information Systems Security Products and Services Catalogue. National Security Agency, July 1987, 182 pp.

Information on German Secret Teletypewriters. Interrogation Report, April 12, 1945, 5 pp.

Ingemarsson, I. Knapsacks Which are not Partly Solvable after Multiplication Modulo 9. IBM RC 8515, 1980, 11 pp.

Ingemarsson, I. Encryption in Teletex. Dept. of Electrical Engineering, Linkoping University, 1978, 12+ pp.

Ingemarsson, I. The Algebraic Structure of Public Key Distribution Systems. Linkoping University, Report ISY-I-0270, 1979, 12 pp.

Ingemarsson, I. Encryption in Data Networks with Application to Teletex. Dept. of Electrical Engineering, Linkoping University, 1978, 15+ pp.

Ingram, Jack E. Brilliant Victory: The Channel Dash of 1942. Greebbelt, MD: Interagency OPSEC Support Staff Monograph, 1992, 5 pp.

Innes, Brian. The Book of Spies: 4000 Years of Cloak & Dagger. NY: Grossett & Dunlop, 1966(?), 96 pp.

Innis, P.B. & W.D. Gold In The Blue Ridge. Washington: Devon Pub. Co., 1981, 249 pp.

_________________. Updated edition, 1981, 249 pp.

Innis, P.B. The Beale Fortune. Argosy, Aug. 1964, pp. 70-71, 82-84.

Instructions For Using the Cipher Device Type M-94. Training Pamphlet No. 2, Office of the Chief Signal Officer, 1922, 12 pp.

Intelligence in the War of Independence, Central Intelligence Agency, 1976, 40 pp.

Irving, David, ed. Breach of Security: The German Secret Intelligence File on Events leading to the Second World War. London: William Kimber, 1968, 216 pp.

Irwin, Will and Thomas M. Johnson. What You Should Know About Spies and Saboteurs. NY: W.W. Norton & Co., 1943, 227 pp.

Isaacson, G.I. Speech given to the Computer Security Institute. Nov. 16, 1977, 28 pp.

Isaartier. Procédé de cryptographie. Revue Scientifique 41(1888:1), 445.

IURP WKH WURYH. Time, Feb. 16, 1968, pp. 94-95. Review of The Codebreakers.

Jackson, Keith M. & Jan Hruska. The PC Security Guide 1990-1991, 2nd ed. Oxford, England: Elvesier Advanced Technology, 1990, 405 pp.

Jackson, T.H. From Number Theory to Secret Codes. Bristol, England: Adam Hilger, 1987, 86 pp. with computer disk.

Jackson, Robert. Science Action Book: Secret Codes. Philadelphia, PA: Running Press Book Pub., 1966.

Jackson, Keith M. and Jan Hruska, eds. U.S. Assoc. Ed., Donn B. Parker. Computer Security Reference Book. Boca Raton, FL: CRC Press, 1992, 949 pp.

Jacobs, W. Cipher Macines and Mathematics. London: Interdisciplinary Science Reviews, Vo. 2, No. 3, 1977, pp. 227-239.

James, Admiral Sir William. Room 40. University of Edinburgh Journal, pp. 50-54.

James, Admiral Sir William. The Code Breakers of Room 40. NY: St. Martin;s Press, 1956, 212 pp.

James, Daniel. Ché Guerra, A Biography. Stein & Day, 1969. Appendix pp. 352-367. The May 18, 1967 Coded Message to Fidel Castro.

James, E. & C. Barkin. How To Keep A Secret. Lothrop, Lee & G. Shepard, 1978, 56 pp.

James, Daniel. Che Guevara. NY: Stein & Day. 1969, 380 pp.

Janeczko, Paul B. Loads of Codes and Secret Ciphers. Macmillan Pub. Co., 1984, 108 pp.

Japanese "J" Cryptosystems of the Second World War. Dover Plains, NY: Goodwin Trading Co., 7 pp.

Japanese Naval Reserve Communication Intelligence Specialists (1941-1945), 1953, 16 pp.

Jarvis, Peter. The German Battleships. Bletchley Park, England: BP Trust, Report No. 2, 1997, 18 pp.

Jarvis, Sue. Japanese Codes. Bletchley Park, England: BP Trust, Report No. 6, 1997, 30 pp.

Jean, Georges. Writing: The Story of Alphabets and Scripts. NY: Harry N. Abrams, Inc. Publishers, 1992, 208 pp.

_____________.Signs,Symbols, and Ciphers (Discoveries)NY:Harry N. Abrams, 1998, 208 pp.

Jefferson, Thomas. Project of a Cypher. Library of Congress reproduction, 2 pp.

Jeffrey-Jones, R. American Espionage from Secret Service to CIA. NY: Macmillan Pub. Co., 1977, 276 pp.

Jeffrey-Jones, Rhodri. Cloak and Dollar: A History of America’s Secret Intelligence. New Haven: Yale University Press, 2002, 357 pp.

Jenkins, Geralk & Anne Wild. Be a Codebreaker. Norfolk, England: Tarquin Pub., 36 pp.

Jennings, Gary. Personalities of Language. NY: T.Y. Crowell Co., 1965, 282 pp., Apollo Edition.

Jennings, G. Personalities of Language. NY: T.Y. Crowell, 1965, 282 pp.

Jensen, R.W. & C.C. Tonies. Software Engineering. Prentice-Hall, 1979, 580 pp.

Johnson, Thomas M. Secrets of the Master Spies: Code and Cipher Stories of Statecraft and Battle. Popular Mechanics, April 1932, pp. 636-640; Sept. 1932, pp. 409-413.

Johnson, B. The Secret War. NY: Methuen Inc., 1978, 352 pp.

Johnson, Bud. Break the Code: Cryptography for Beginners. Mineola, NY: Dover Publications, Inc., 1997, 71 pp.

Johnson, John. The Evolution of British Sigent 1653-1939. Cheltenham, England: GCHQ, 1997, 58 pp.

Johnson, Neal F., Zoran Duries & Sushil Jojodia. Information Hiding: Steganography and Watermarking – Attacks and Countermeasures. Norwell, MA: Kluwer Academic Pub., 2001, 135 pp.

Johnson, Thomas M. Search for the Stolen Sigaba. Army, Feb. 1962, pp. 50-55.

Johnson, R.W. A Brief Guide to the Literature of Cryptology. December 1970, 24 pp.

Johnson, T. M. Trapping Enemy Spies. Modern Mechanix Hobbies & Inventions, Dec. 1936, pp. 36-37, 140, 142, 144, 147, 149-150.

Johnson, Thomas M. Our Secret War. Indianapolis: Bobbs Merrill Co., 1929, 340 pp.

Johnston, William. The Waddington Cipher. New York: Doubleday, Page & Co., 1923, 300 pp. (loose binding)

Joliet, C. Secret Writing Unveiled. Paris, France: E. Dentu, 1874, 16 pp.

Jones, S.V. After 35 Years, Secrecy Lifted on Encoded Calls. New York Times, July 3, 1976, pp. 27, 31.

Jones, A.K. & R.J. Lipton. The Enforcement of Security Policies for Computation. Carnegie-Mellon University, Dept. of Computer Science, 1975, 35 pp.

Jones, H.D. Cryptography: A Slected List of References. Washington: Library of Congress, April 14, 1944, 6 pp.

Jowitt, The Earl. Some Were Spies. London: Hodder & Stoughton, 1955, 223 pp.

Joyner, David, ed. Coding Theory and Cyptography: From Enigma amd Geheimschreiber toQuantum Theory. NY: Springer-Verlag, 2000, 256 pp.

Kahan, S. Have Some Sums to Solve: The Compleat Alphametics Book. Baywood Pub. Co., 1978, 114 pp.

Kahn, D. Codebreaking in WW I & II: The Major Successes and Failures, Their Causes and Their Efforts. London: The Historical Journal, 23,3(1980)617-639.

Kahn, D. GNITIRW TERCES. 1 pp.

Kahn, D. The Codebreakers. NY: Signet Books, 1973, 476 pp.

Kahn, D. Hearing Diplomatic Chatter. Signal, March 1978, pp. 61-64.

Kahn, D. Does the Enemy Care About Those Papers Because They Unlock Secret U.S. Codes. Newsday, June 25, 1971, p. 55.

Kahn, D. The Codebreakers. NY: Macmillan Co., 1967, 1164 pp.

Kahn, D. Cryptology. Encyclopedia Americana, 1970, Vol. VIII, pp. 276-285.

Kahn, D. Cryptology and History: Secret Writings for Historians. Report from The Maryland Historian, Fall 1972, pp. 157-162.

Kahn, D. The Codebreakers, London: Weidenfeld & Nicolson, 1974, 476 pp.

Kahn, D. Catalogue of Manuscript. Cipher Papers of J. Rives Childs. Deposited in the library of Randolph-Macon College. May 25, 1964, 4 pp.

Kahn, D. The World of Secret Words. Newsday, Part I. Sept. 15, 1960, p. 1c; Part II, Sept. 16, 1960, p. 1c.

Kahn, D. Lgcn Otuu Wllwqh Wl Etfown. New York Times Magazine, Nov. 13, 1960, pp. 71, 83-84, 86, 88, 90.

Kahn, D. On The Origins of Polyalphabetic Substitution. Isis, 1980, 71(No. 256) 122-127.

Kahn, D. The Sound of Secrecy. Newsday, December 1, 1961, p. 1c.

Kahn, D. Big Ear or Big Brother. New York Times Magazine, May 16, 1976, pp. 13, 62-67, 70, 72.

Kahn, D. Cryptology. Encyclopedia Americana, 1969, pp. 276-285.

Kahn, D. Alphabetical Antics. Newday, Feb. 7, 1962, p. 1c

Kahn, D. For Stalin's Eyes Only. Military History, pp. 10, 64-66.

Kahn, D. Embassy Burglaries? Old Hat. New York Times, June 22, 1973, p. 35.

Kahn, D. Kahn On Codes. NY: Macmillan Pub. Co., 1983, 343 pp.

Kahn, D. Secret Writings: Selected Works on Modern Cryptology. Bulletin of the N.Y. Public Library, May 1969, pp. 315-337.

Kahn, D. Modern Cryptology. Scientific American, July 1966, pp. 38-46.

Kahn, D. LGCN OTUU WLLWGH WL ETFOWN. Reprinted from New York Times Magazine, Nov. 13, 1960, pp. 71, 83-84, 86, 88, 90.

Kahn, D. Number One From Moscow. CIA reprint, pp. A15-A28.

Kahn, David. Cryptology in the 80's. Crowell-Collier Encyclopedia Yearbook(?), pp. 178-191.

Kahn, David. The Codebreakers   Excerpt. NY: Popular Science Monthly, May 1968, pp. 111 126.

Kahn, David. The Codebreakers (abridged version in hardcover). London: Weidenfeld and Nicolson, 1974, 476 pp.

Kahn, David. Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943. Boston: Houghton Mifflin Co., 1991, 336 pp.

Kahn, David. Book review. Norse Medieval Cryptography in Runic Carvings, Mongé & Landsverk. American- Scandanavian Review, Vol. 56, Srping 1968, pp. 82-83.

Kahn, D. Plaintext in the New Unabridged. NY: Crypto Press, 1963, 34 pp.

Kahn, D. Hitler's Spies. NY: Macmillan Pub. Co., 1978, 671 pp.

Kahn, D. The Code Battle. Playboy, Dec. 1975, pp. 132-136, 224-228.

Kahn, D. How One Bucknallion Wrote His Book. The Bucknell Alumnus, Nov. 1967, pp. 10-14.

Kahn, D. Top-Secret Language. Reader's Digest, pp. 164-168.

Kahn, D. The Public's Secrets. The Progressive, Nov. 1980, pp. 27-31.

Kahn, D. Chapter 18. What Every Candidate Should Say About The National Security Agency. Praeger Pub., Surveillance and Espionage in a Free Society, R.H. Blum, ed. 1972, pp. 267-271.

Kahn, D. Two Soviet Ciphers, 1060, 16 pp.

Kahn, D. La Guerra Dei Codici. Italy: Italian translation of The Codebreakers, 1969, 675 p.

Kahn, D. Review of The Ultra Secret. New York Times Book Review, Dec. 29, 1974, p. 5.

Kahn, D. Codebreaking in World War I and II. The Historical Journal - galleys.

Kahn. D. The Codebreakers - Japanese edition. Japan: Hayakawa Pub., 1978, 411.

Kahn, D. Codebreaking and the Battle of the Atlantic. The Harmon Memorial Lectures in Military History, Number Thirty-Six. U.S. Air Force Academy, 1994. Washington, DC: USGPO, 1994, 16 pp.

________. Szpiedzy Hitlers. Warsaw, Poland: Wydawnectwo Magnecm Ltd., 2000, 696 pp.

________. The Codebreakers – Russian translation. Russia, 2000, 475 pp.

Kallis, Jr., Stephen A. Radio’s Captain Midnight: The Wartime Biography. Jefferson, NC: McFarland & Co.,2000, 262 pp.

Kaliski Jr., Burton S., ed. Advances in Cryptology -- Crypto '97 Proceedings, NY: Springer-Verlag, 1997, 537 pp.

Kapera, Zdzislaw J., ed. The Enigma Bulletin, No. 1, December 1990. Krakow, Poland: The Enigma Press, 72 pp.

_______________________. The Enigma Bulletin, No. 2, May 1997. Krakow, Poland: The Enigma Press, 120 pp.

_______________________. The Enigma Bulletin, No. 3, May 1998. Krakow, Poland: The Enigma Press, 127 pp.

_______________________. The Enigma Bulletin, No. 4, Commanders Winn and Knowles (Special issue), 1999, Krakow, Poland: The Enigma Press, 168 pp.

_______________________. The Enigma Bulletin, No. 5, June 2000. Krakow, Poland: The Enigma Press, 96 pp.

_______________________.  The Enigma Bulletin, No. 6, Sept. 2002.Krakow-Mogilany,Poland. Before ULTRA There Was GALE, 96 pp.

Karaschima, Takeshi. Secret Code and Imagination. Japan: Kodansha, Inc. Feb. 20, 1962, 262 pp.

Karhunen, Joppe. Reino Hallamaan salasanomasotas. Finland: Weilen & Göös, 1980, 266 pp.

Karjian, R. ed. Encryption Techniques Make Data Secure. Telecommunications, Jan. 1979, pp. 21-22, 24.

Kasiski, F.W. Die Geheimschriften und die Dechiffrirkunst. Berlin, 1863. Xerox copy.

Katzan, Jr., Harry. The Standard Data Encryption Algorithm. Petrocelli Books, 1977, 134 pp.

Katzan, Jr., Harry. Computer Data Security. NY: Van Nostrand Reinhold, 1973, 223 pp.

Katzenbeisser, Stefan. Recent Advances in RSA Cryptography. Norwell, MA: Kluwer Academic Pub., 2002, 140 pp.

Katzenbeisser, Stefan & Fabien A.P. Petitcolas. Information Hiding: Techniques for Steganography and Digital Matermarking. Norwood, MA: Artech House, 2000, 220 pp.

Kaufman, Charlie, Radia Perlman and Mike Speciner. Network Security: PRIVATE Communication in a PUBLIC World. Englewood Cliffs, NJ: Prentice Hall PTR, 1995, 504 pp.

Kawano, Kenji. Warriors: Navajo Code Talkers. Flagstaff, AZ: Northland Pub. Co., 1990, 128 pp.

Kearful, J. A Radio Technician Made History. Field Artillery Journal, May-June 1950, 40: 128-129.

Keats, John. They Fought Alone. London: Secker & Warburg, 1964, 400 pp. Personal letter from subject of book about M-94 he used is in book.

Keech, Scott. Ciphered. NY: Harper & Row, 1980, 253 pp.

Keegan, John. The Second World War. NY: Viking Penguin Inc., 1989, 608 pp.

Keegan, John.  The Price of Admiralty: The Evolution of Naval Warfare. NY: Viking Penguin Inc., 1988, 292 pp.

Keene, Carolyn. The Clue in the Crossword Cipher. NY: Grosset & Dunlop, 1998 printing, 177 pp.

Keene, F.W. Secret Code Book For Boys and Girls. Pelham, NY: The Seahorse Press, 1950, 48 pp.

Kelley, Stephen J. Big Machines: Study of the Cryptographic Security of the German Enigma, Japanese Purple, and U.S. SIGABA/ECM Cipher Machines. Laguna Hills, CA: Aegean Park Press, 2001, 242 pp.

Kelly, Kevin. Out of Control: The Rise of Neo-Biological Civilizations. Reading, MA: Addison Wesley, 1994, 521 pp.

Kenda, Margaret and Phyllis S. Williams. Math Wizardy for Kids. Hauppauge, NY: Barron’s Educational Series,Inc., 1995, 365 pp.

Kendall, Correl, ed. The Key. Vol. 1, No. 1, May 1890 - No. 24, July 1892.

Kennedy, Col. W.V. Intelligence Warfare. NY: Crescent Books, 1983, 208 pp.

Kennedy, Col. William F. Intelligence Warfare: Penetrating the Secret World of Today's Advanced Technology Conflict. NY: Crescent Books, 1987, 224 pp. (Rev. ed.)

Kenngruppenheft Nr. 6 Zum Kurzsignalheft 1941. Indicator Group Book No. 6 to the Short Signal Code 1941. Berlin: Oberkommando der Kriegsmarine, 1944, 8 pp. (Xerox)

Kenngruppenheft Nr. 5 Zum Kurzsignalheft 1941. Indicator Group Book No. 5 to the Short Signal Code 1941. Berlin: Oberkommando de Kriegsmarine, 1943, 8 pp.

Kensington Runestone. Souvenir model.

Kent, Stephen T. Encryption-Based Protection Protocols for Interactive User-Computer Communication. MIT Laboratory for Computer Science, Technical Report 162, May 1976, 121 pp.

Kerbey, J.O. Further Adventures of the Boy Spy in Dixie. Washington: The national Tribune, 1898, 379 pp.

Kerckkoffs, A. La Cryptographie Militaires. Journal des Sciences Militaires, Jan. 1883, pp. 5-38; Feb. 1883, pp. 161-191. Xerox copy.

Kerckkoffs, A. La Cryptographie Militaire, 1883. English translation by Warren T. McCready, 1964, 46 pp.

Kern, Helmut. Mark XII IFF, Air Force, Army, Navy, NSA. C-E Trends, May 1973, pp. 23-30.

Kessler, Pamela. Undercover Washington: Touring the Sites Where Famous Spies Lived, Worked and Loved. McLean, VA: EPM Publications, 1992, 159 pp.

Kilian, Joe, Ed. Advances in Cryptology – Crypto 2001. NY: Springer-Verlag, 2001, 598 pp.

Killoran, Dr. Daniel. A Russian Revolutionary Cipher. The Cryptogram, Jan-Feb. 1969, May-June 1969, 8 pp.

Kim, Kivangjo & Tsutomu Matsumoto, eds. Advances in Cryptology -- Asiacrypt '96. NY: Springer-Verlag, 1996, 394 pp.

Kimmel, Admiral H.E. Admiral Kimmel's Story. Chicago: Henry Regnery Co., 1955, 206 pp.

Kimmett & Margaret Regis. The Attack on Pearl Harbor: An Illustrated History. Seattle, WA: Navigation Publishing, 1991, 126 pp.

Kinch, Jr. F.A. Cryptography in Today's World. Communications International, July-Aug. 1976, pp. 32, 34-35, 37.

King, Ross. Ex-Libris. NY: Walker & Company, 2001, 392 pp.

Kinnaird, C. Avon Complete Crosswords and Cryptograms. Avon Book Co., 1948, 128 pp.

Kinnucan, P. Data Encryption Gurus: Tuchman and Meyer. Mini-Micro Systems, Oct, 1978, pp. 54, 56-58, 60.

Kippenhahn,Rudolf. Code Breaking: A History and Exploration. NY: Overlook Press, Beter Mayer Pub., Inc., 1999, 283 pp.

Kirchhofer, K. Secure On-Line TTY Communication Via HF Radio in Naval and Airfield Deployment. Reprinted from Armada Int., Feb. 1980.

Kirchhofer, K. Key Management in Cryptographic Systems. International Defenst Review, Sept. 1980, pp. 1396-1398.

Kirchhofer, K. Cryptology. Parts 1, 2, 3, & 4. International Defense Review, Vol. 9, No. 2, pp. 281-286; Vol. 9, No. 3, pp. 389-394; Vol. 9, No. 4, pp. 585-590; Vol. 9, No. 5, pp. 761-767.

Kirkpatrick, Jr., Lyman B. The Real CIA. NY: Macmillan Co., 1968, 312 pp.

Kjellberg, Bo. "Memories of Arne Beurling, February 3, 1905-November 20, 1986." Heidelberg, Germany: The Mathematical Intelligencer, Vol. 15, No. 3, 1993, pp. 28-31.

Klarner, D.A., ed. The Mathematical Gardner, Belmont, CA: Wadsworth, Int., 1981, 382 pp.

Klembowsky, Col. W. L'Espionage Militaire. Toulouse, France: Saint-Cyprien, 1895, 75 pp. Translated from the Russian and German.

Klingenfuss, J. Radioteletype Code Manual, tenth edition. Tuebingen, German: Klingenfuss Pub., 1987, 96 pp.

Klingenfuss, Joerg. Radioteletype Manual. Teubingen, Germany: Klingenfuss Pub., 1991, 107 pp.

Klingenfuss, J. Radio Data Code Manual. Tuebingen, Germany: Klingenfuss Pub., 1998, 784 pp.

Klooz, Marie S. Japanese Diplomatic Secrets. Sweet Briar, WV: May 22, 1932, 1029 pp.,six volumes including 12 appendices, reproduced National Archives copy.

Kneitel, Tom. Guide to Embassy and Espionage Communications. Commack, NY: CRB Research, 1986, 96 pp.

Knightly, Phillip. The Second Oldest Profession: Spies and Spying in the Twentieth Century. NY: W.W. Norton & Co., 1987, 436 pp.

The Knightmare. Secrets of a Super Hacker. Port Townsend, WA: Loompanics Unltd., 1994, 205pp.

Knott, Stephen F. Secret and Sanctioned: Covert Operations and the American Presidency. NY: Oxford University Press, 1996, 258 pp.

Knowles, K. Ultra and the Battle of the Atlantic. The American View. Presented at Naval Symposium, Oct. 28, 1977. NSA publication reprint.

Knudsen, Jonathan. Java Cryptography. Sebastopol, CA: O’Reilly & Assoc.Inc., 1998, 344 pp.

Knudsen, Lars, ed. Fast Software Encryption: 6th International Workshop, FSE ’99 Proceedings. NY: Springer-Verlag, 1999, 317 pp.

Knudsen, Lars, ed. Advances in Cryptology – Eurocrypt 2002. NY: Springer-Verlag, 2002, 545 pp.

Knudson, R.L. The Whole Spy Catalogue: An Espionage Lover's Guide. NY: St. Martin's Press, 1986, 182 pp.

Kobler, John. JCHEW GISEY PYMQP UQRPD. Collier's, Oct. 28, 1950, pp. 22=23, 46-50.

Koblitz, Neal. A Course in Number Theory and Cryptography. NY: Springer-Verlag, 1987, 208 pp.

Koblitz, Neal, ed. Advances in Cryptology -- CRYPTO '96 Proceedings. NY: Springer-Verlag, Inc., 1996, 415 pp.

Koblits, Neal. Towards a Quarter-Century of Public Key Cryptography. Boston: Kluwer Academic Pub., 2000, 179 pp.

Koç, Cetin K. & Christof Paar (Eds.) Cryptographic Hardware and Embeded Systems – CHES 2000 Proceedings.NY: Springer-Verlag, 2000, 355 pp.

Koç, Cetin K. & Poar, Christof, eds. Cryptographic Hardware and Embedded Systems: First International Workshop, CHES ’99 Proceedings. NY: Springer-Verlag, 1999, 353 pp.

Koch, E. Cryptography or Cipher Writing. Belleville, IL: Buechler Pub. Co., 1936, 84 pp.

Kochanowski, M.E., ed. Proceedings of Communications and Computer Security (COMSEC & COMPUSEC): Requirements, Opportunities and Issues. Washington: Electronic Industries Assoc., 1987, 187 pp.

Koczon, William. Compilation of language frequency data and miscellaneous information. Authro was in 2nd Sig. Sec. Co., 1940.

Koenigsberg, Patricia Larkin. The Mystery of the Missing Microchip. Watermill Press, NJ: Watermill Press, 1988, 32 pp.
Kohl, H. A Book of Puzzlements. NY: Schocken Books, 1981, 287 pp.

Köhl, Alexis. Cryptographic System. Copenhagen, Denmark: 1876, 3 pp. Also 2 pp. English translation by W.M. Bowers.

Kohl, Herbert. A Book of Puzzlements” Play and Investion with Language. NY:Schochen Books,287 pp.

Kohn Bernice. Secret Codes and Ciphers. Englewood Cliffs, NJ: Prentice-Hall, Inc., 1968, 63 pp.

Kohnen, David. Commanders Winn and Knowles: Winnig the U-Boat War with Intelligence: 1939-1943. Krakow, Poland: The Enigma Bulletin, No. 4, 1999, 168 pp.

"KOKO VAN." One Approach Towards An Unbreakable Spy Field Cipher. The Cryptogram, Mar.-Apr. 1965, pp. 73, 78, 92-93; May-June 1965, pp. 100-101, 116-117.

Kolata, G.B. Computer Encryption and the National Security Agency Connection. Science, July 29, 1977, pp. 438-440.

Kolata, G.B. & D. Shapley. Cryptology: Scientists Puzzle Over Threat to Open Research Publication. Science, Sept. 30, 1978, pp. 1345-1349.

Kolata, G.B. Cryptography: On the Brink of a Revolution. Science, Aug. 19, 1977, pp. 747-748.

Komatsu, Keiichiro. Origin of the Pacific War and the Importance of “Magic.” NY: St. Martin’s Press, 1999, 684 pp.

Konheim, A.G. Cryptography, A Primer. NY: John Wiley and Sons, 1981, 432 pp.

Kooken, Don L. Cryptography in Criminal Investigations, Part I & Part II. Journal of Criminal Law & Criminology, Vol. 26, No. 6, Mar. 1936, pp. 903-920; Vol. 27, No. 1, May-June 1936, pp. 75-96.

Kooken, D.L. Cryptography in Criminal Investigations. Police Science, Mar. 1936, pp. 903-919; May-June 1936, pp. 75-96.

Kopec, John W. The Sabines at Riverbank: Their Role in the Science of Architectural Acoustics. Woodbury, NY: Acoustical Society of America, 1997, 212 pp.

Korbonski, S. The True Story of Enigma -- The German Code Machine in World War II. East European Quarterly, Summer 1977, pp. 227-234.

Körner, T.W. The Pleasures of Counting. NY: Cambridge University Press, 1996, 534 pp.

Kovach, Karen. The Life and Times of MG Dennis E. Nolen, 1872-1956, The Army’s First G-2. Fort Belvoir, VA: U.S. Intelligence and Security Command, 1998, 49 pp.

_____________. Breaking Codes, Breakig Barriers: The WACS of the Signal Security Agency, World War II. Fort Belvoir, VA: INSCOM, 2000, 50 pp.

Kozaczuk, W. W Kregu Enigmy. Warsaw: Ksiazka i Wiedza, 1979, 409 pp.

Kozaczuk, W. Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II. University Pub. of America, 1984, 348 pp.

Kozaczuk, W. Slamany Szyfr. Warsaw: Wydawmictwo Ministerstwo Obrony Narodowe, 1985, 208 pp.

Kozaczuk, W. W Kregu Enigmy, Warsaw: Ksiazka i Wiedza, 1986, 446 pp.

Kozaczuk, W. Enigma Solved. Translation for the Polish by C. Kasparek, 1981, 449 pp.

Kozaczuk, Wladyslaw.  Na Peryferiach Piekta.  Warsaw, Poland: Wydawnictwa Radia i Telewizgi, 1988, 281 pp.

Kozaczuk, Wladyslaw. Geheimoperation Wicher. Koblenz, W. Germany: Bernard Graefe Verlag, 1989, 365 pp.

Kreis, John F. Piercing the Fog: Intelligence and Army Air Forces Operations in WW II. Washington: USGPO, 1996, 501 pp.

Kozaczuk, Col. Wladyslaw. The Key to the Secrets of the Third Reich. Poland Illustrated Magazine, Part I, Aug. 1975, pp. 10-11, 34-35; Part II, Sept. 1975, pp. 32-34.

Kranskis, E. Primality and Cryptography. NY: John Wiley and Sons, 1986, 235 pp.

Krawczyk, ed. Advances In Cryptology – CRYPTO ’98. New York, NY:Springer-Verlag, 1998, 517 pp.

Kranz, F.W. Early History of Riverbank Acoustical Laboratories. Journal of the Acoustical Society of America, Vol. 49, No. 2, (Part I0 1971, pp. 381-384.

Kretzman, P.G. Mathematical Aspects of Cryptanalysis Employed on a Computer. L.I. Math Fair, Feb. 1973, 52 pp. plus appendix.

Krischer, Jeffrey. The Voynich Manuscript. Harvard University, May 1969, 73 pp. plus appendix.

Kross, Peter. Moles, Spies, & Traitors: An Intelligence and Espionage Quiz Book. Franklin Square, NJ: Kross Research Pub., 1996, 121 pp.

Kruh, Louis. Public Relations and Secrecy In A Democracy With Emphasis on a Supersecret Government Agency. Masters Thesis, Pace College, 1973, 212 pp.

Kruh, Louis. The Cryptograph That Was Invented Three Times. Retired Officer, April 1971, pp. 20-21. Reprinted An Cosantoir, Jan-Apr, 1972, pp. 21-23.

Kruh, Louis. The Evolution of Communications Security Devices. The Army Communicator, Winter 1980, pp. 48-54.

Kruh, Louis. The Mysterious Cipher Device. National Defense, Journal of the American Defense Preparedness Association, April 1980, pp. 33-36.

Kruh, Louis. Codes and Ciphers - America's Nemesis and Savior. Retired Officer. Aug. 1972, pp. 44-46.

Kruh's Cryptology. Joel Sater's Antique News, June 15, 1973, pp. 1, 6.

Kullback, S. Statistical Methods in Cryptanalysis with New added Problems for the Student. Laguna Hills, CA: Aegean Park Press, 1976, 206 pp.

Kullback, Solomon. Statistical Methods in Cryptanalysis. Revised edition.

Kurland, Michael. The Spymaster's Handbook. NY: Facts on File Pub., 1988, 192 pp.

Kurzsignalheft 1941. Short Signal Book. Berlin: Oberkommando der Kruegsmarine, 1941, 117 pp. (Xerox).

La Guerre du Renseignement: espions et agents doubles.Historama, hors séries No. 15, 192 pp.

L'Art de Deschiffrer: Traité de Déchiffrer du XVII e Siècle de la Secrétairerie d'Etat et de Guerre Espagnole. Belgium: Université de Louvain, 1967, 100 pp.

Ladd, James & Keith Melton. Clandestine Warfare: Weapons and Equipment of the SOE and OSS. NY: Sterling Pub. Co., Inc., 1988, 159 pp.

Laffin, John. Codes and Ciphers: Secret Writing Through The Ages. NY: Signet Books, 1967, 127 pp.

Ladd, C.D. 365 Cryptograms. St. Paul: Cryptos, 1983. 72 pp.

Ladd, James & Keith Melton. Clandestine Warfare: Weapons and Equipment of the SOE and OSS. NY: Sterling Pub. Co., Inc. 1988, 159 pp.

Laffin, John. Codes and Ciphers. NY: Abelard-Schuman, 1964, 152 pp.

Laffin, John. Petit Code Des Codes Secrets. Belgium, 1968, 157 pp.

Lafitte, H. Nouveau procédé de cryptographie. Revue Scientifique 41(1888:1), 283-284.

La Guerre Du Renseignement. Historama, série no. 15, 1971, 194 pp.

Lamb Collection of Cryptography. Copy of catalogue in Kent State University Library, 1974, 18 pp.

Lamb, Geoffrey. Serect Writing Tricks. NY: Thomas Nelson Inc., 1975, 88 pp.

Lamb, Geoffrey. Fun With Secret Writing. NY: Dover Publications, Inc. 2002, 60 pp. Republication of 1995 book, Secret Writing Tricks.

Lambert, Derek, The Judas Code. NY: Stein & Day, 1985, 469 pp.

Lamphere, R.J. & T. Shachtman. The FBI-KGB War, A Special Agent's Story. NY: Random House, 1986, 320 pp.

Landau, Susan et al. Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy. NY: Association for Computing Machinery (ACM), 1994, 74 pp.

Landovitz, L.F. and E.I. Schwartz. Crossword Puzzle Word Finder. NY: Funk & Wagnalls, Inc. 1974, 754 pp.

Landreth, Bill. Out of the Inner Circle: The True Story of a Computer Intruder Capable of Cracking the Nation's Most Secure Computer Systems. Redmond, WA: Tempus Books, 1989, 230 pp.

Landsverk, O.G. Ancient Norse Messages on American Stones. Glendale, CA: Norseman Press, 1969, 142 pp.

Landsverk, O.G. Scholars Progress Shows Norsemen Beat Columbus. Catholic Bulletin, Jan. 29, 1971, p. 11. Reprint.

Landsverk, O.G. Research and Lectures-Scandinavia and England, 1971, 4 pp.

Landsverk, O.G. and A. Monge. A Runic Cipher From Bergen plus The Cipher on a Stick. The Landsverk Foundation, Dec. 1970, 2 pp.

Landsverk, O.G. Norsemen in Oklahoma. Reprint from Oklahoma Today, Summer, 1970, pp. 1-6.

Lange, André. De la Cryptographie: Etude sure les Ecritures Secrètes. Paris: Payot et Cie, 1918, 254 pp.

Lange, A. & Soudart, E.A. Treatise on Cryptography. Laguna Hills, CA: Aegean Park Press, 164 pp., 1981.

Lange, André & E. -A. Soudart. Traité De Cryptographie. Paris: Librairie Félix Alean, 1935, 366+ pp.

Lange, André & E.A. Soudart. Traité de Cryptographie. Paris: Libraire Félix Alcan, 1925, 366 pp.

Lange, A. & E.A. Soudart, Treatise on Cryptography, trans. From the French by U.S. Navy. USGPO, 1940, 118 pp.

Langen, H.E. Cryptanalytics - A Course In Cryptography. 1953.

Langen, H.E. Identification of Ciphers, 1950, 132 pp.

Langen, H.E. Miscellaneous Cryptographia, 1952, 408 pp.

Langen, H.E. Langen Cryptograpic Library, 1957, 33 pp.

Langen, H.E. Correspondence with W.F. Friedman. 1954-1957.

Langen, H.E. Solving Newspaper Cryptograms, 1948, 96 pp.

Langen, H.E. "CW" Transposition Cipher, 1954, 17 pp.

Langen, H.E. Correspondence with H.O. Yardley. 1953-1959.

Langen, H.E. Secrets of the Black Chamber,1957,258 pp.Unpublished manuscript.

Langen, Henry E. Concealment Ciphers: An Analysis of the Null. Maple Shade, NJ: Henry E. Langen, 1948, 57 pp. Self-published, HB.

Langen Henry E. The Thirteen Rules of Sacco Simonetta and XVth Century Rules for Modern Italian Simple Substitution Ciphers. Maple Shade, NJ: 18 pp.

Langen, H.E. Cryptography - Confidential.

Langen, Henry E. Heteroletter Word Lists: A Cryptanalytical Device with Word Transposals and Triconsonant Sequence Chart. Maple Shade, NJ: Henry E. Langen, 1951, 100 pp.

Langen, Henry E. Biheteroletter Word Patterns and "Other Pattern Concepts."

Langen, H.E. Illustrations of Concealment of Secret Messages.

Langen, Henry. E. The Editor's Notebook of the ACA. Diary of the Editor, 1952-1956, of The Cryptogram.

Langen, H.E. Finger Print Ciphers. Finger Print Magazine, May 1951, pp. 15-19, 31.

Langer, Howard J., ed. World War II: An Encyclopedia of Quotations. Westport CT: Hreenwood Press, 1999, 449 pp.

Langhorne, R. ed. Diplomacy and Intelligence during the Second World War; essays in honor of F.H. Hinsley. NY: Cambridge University Press, 1985, 329 pp.

Langie, A. How I Solved Russian and German Cryptograms During WW II., 1944, trans. from the German, 17 pp.

Langie, André. De la Cryptographie: Etude sur les Ecritures Secrètes. Paris: Payot et Cie, 1918, 254 pp.

Langie, André. Cryptography. London: Constable & Co., 1922, 192 pp. Trans. from the French by J.C.H. Macbeth.

Lanning, Michael Lee. Senseless Secrets: The Failures of U.S. Military Intelligence from George Washington to the Present. NY: Birch Lane Press, Carol Pub. Group, 1996, 324 pp.

Laqueur, W. A World of Secrets: The Uses and Limits of Intelligence. Basic Books, 1985, 404 pp.

L’Art de Deschiffrer Traite de Dechiffrement du XVII e Siecle de la Secretairerie d’Etat et de Guerre Espagnole. Universite de Louvain, 1967, Belgium, 100 pp.

Lauer, R.F. Computer Simulation of Classical Substitution Cryptographic Systems. Laguna Hills, CA: Aegean Park Press, 1981, 111 pp.

Laurie, Clayton D. The Propaganda Warriors: America’s Crusade Against Nazi Germany. Lawrence, KS: University Press of Kansas, 1996, 521 pp.

Lawrence, V.B., J.L. LoCicero & L.B. Milstein. IEEE Communications Society's Tutorials in Modern Communications. Rockville, MD: Computer Science Press, 1982, 348 pp.

Laws pertaining to NSA. P.L. 86-36. U.S. Code Title #50; Sect. 1581 of U.S. Code Title #10; P.L. 91-187, Title 5; and P.L. 88-290.

Laxalt,Robert. A Private War: An American Code Officer in the Belgium Congo. Reno, NV: University of Nevada Press, 1998, 103 pp.

Layton, Rear Admiral E.T. "And I Was There": Pearl Harbor and Midway -- Breaking the Secrets. NY: William Morrow & Co., 1985, 596 pp.

Le Capitaine Georges Painvin. Paris: Armée et Défense, April 1964, No. 4, pp. 4-8.

Le Queux, William. Cipher Six. London: Hodder & Stoughton, 1919, 253 pp.

Leary, Penn. The Cryptographic Shakespeare. Omaha, NE: Westchester House, 1987, 272 pp. (plus supplements)

Leary, Penn. The. Second. Cryptographic. Shakespeare. Omaha, NE Westchester House Pub., 1990, 313 pp.(plus supplements)

Léauté, H. Sur Les Mécanismes Cryptographiques de M. de Viaris. Le Génie Civil, August 1888, pp. 67-80.

Leblanc, Maurice. The Hollow Needle. NY: W.R. Caldwell & Co., 1910, 325 pp.

Lechleitner, Christoph. Chiffriermaschine “NEMA” Linz, Austria: University of Linz, 1947, 39 pp.

Ledden, Carol. The Sneak Snack: Logic Games, Mysteries nd Quests. Toronto, Canada: Annick Press Ltd., 1993, 70 pp.

Lederer, Richard. The Play of Words: Fun & Games For Language Lovers. NY: Simon & Schuster Pocket Books, 1990, 274 pp.

Lee, Annabelle. Guidelines for Implementing Cryptography in the Federal Government. Washington, DC: USGPO, 1999, 138 pp. NIST Spec. Pub. 800-21.

Lee, Bruce. Marching Orders: The Untold Story of World War II. NY: Crown Publishers, Inc., 1995, 608 pp.

Lee, Loyd E., ed. World War II in Europe, Africa, and the Americas, with General Sources: A Handbook of Literature and Research. Westport, CT: Greenwood Press, 1997, 525 pp.

Leek, T. 55 Years of Silence. All Hands, Oct. 1983, pp. 34-39.

Leeper, D.G. A Universal Digital Data Scrambler. Bell System Technical Journal, Dec. 1973, pp. 1851-1865.

Legerdemainist. Crypt Tips No. 1, No. 2. Modern Power & Engineering, 4 pp. and 6 pp.

Leighton, A.C. Some Historical Examples of Historical Cryptanalysis. Historiá Mathematicá, August 1977, 4, pp. 319-337.

Leirich, A.J. Voice Scrambler Design for Mobile Radio. Proceedings, Int. Conf. on Cybernetics & Society, Sept. 19-21, 1977, pp. 51-55.

Lempel, A. Cryptology in Transition: A Survey. Sperry Rand Center, Sept. 1978, 58 pp.

Lennon, R.G. & S.M. Matyas. Cryptographic Key Distribution Using Composite Keys. 1978 Nat. Telecommunications Conf., Vol. 1, pp. 26.1.1-26.1.6

Lennon, R.G. & S.M. Matyas. Unidirectional Crtyptographic Functions Using Master Key Variants. Proceedings, Nat. Tele. Conf., Vo. 3, 43.4.1-43.4.5.

Lennon, R.G. & S.M. Matyas. Cryptographic Pin Privacy in EFT Systems. Proceedings, Fall Compcon '79, pp. 142-147.

Lennon, R.E. & S.M. Matyas. Cryptography: Facts and Fantasies. Proceedings of the Nat. Electronic Conf., Vol. XXXIII, 1979, pp. 309-313.

Lennon, R.E. & S.M. Matyas. Cryptographic Key Distribution Using Composite Keys. Proceedings, Nat. Tele. Conf., Vol. 2, 1978, 26.1.1-26.1.6.

Lerville, E. The Radiogram of Victory. Article originally published in La Liaison des Transmissions, April 1969. Trans. from the French by S.M. Taylor, 39 pp.

Lerville, Edmond. Les Cahiers Secrets de la Cryptographie. Monaco: Editions du Rocher, 1972, 318 pp.

Leslie, S. Codebreaker. London: Transworld Pub., 1976, 40 pp.

Lesser, Robert. A Celebration of Comic Art and Memorabilia. NY: Hawthorn Books, Inc., 1975, 292 pp.

Letter to Editor. Ramparts, Jan. 1973, p. 6.

Levender, Slater, & Goulavitch, eds. Book of Rune & Magickal Alphabet & Cypher. ERS-1975, 45 pp.

Leverage, H. The White Cipher. NY: Grosset & Dunlap, 1919, 272 pp. From the library of William F. Friedman with the Friedman’s personalized book plate. Signed and dated by William F. Friedman, 1921.

Leverage, Henry.  The White Cipher.  NY: Moffat, Yard & Co., 1919, 272 pp.

Levine, Emil, ed. Japanese Diplomatic Secrets (1933 manuscript) The only publication seized by the US Government with Analytical Articles from Cryptologia. Laguna Hills, CA: Aegean Park Press, 2001, CD-ROM.

Levine, Jack. A List of Words Containing No Repeated Letters (Non-Pattern Words). 1957.

Levine, Jack. Crytographic Slide Rules. Mathematics Magazine, Sept.-Oct. 1961, pp. 322-328.

Levine, Jack. Some Applications of High-Speed Computers to the Case n=2 of Algebraic Cryptography. Mathematics of Computation, vol. 15, no. 75, 1961, pp. 254-260.

Levine, Jack. Some Further Methods in Algebraic Cryptography. Journal of the Elisha Mitchell Scientific Society, Vol. 74, No. 2, Nov. 1958, pp. 1-12.

Levine, Jack. A List of Pattern Words of Lengths Ten Through Twelve. 1972. Inscribed by author.

Levine, Jack. A Trigraphic Frequency of 20,000 Letters English Literary Text. 1958, 16 pp.

Levine, Jack. Variable Matrix Substitution in Algebraic Cryptography. American Math. Monthly, vol. 65(1958) pp. 170-179.

Levine, Jack. A List of Pattern Words of Lenghts Thirteen to Sixteen. 1973.

Levine, Jack. United States Cryptographic Patents: 1861-1981. Terre Haute, IN: Cryptologia, 1983, 69 pp.

Levine, Jack. United States Cryptographic Patents: 1861-1989. Terre Haute, IN: Cryptologia, 1991, 115 pp.

Levine, Jack. Some Elementary Cryptanalysis of Algebraic Cryptography. American Math. Monthly, May 1961, pp. 411-418.

Levine, Jack & M. Willet. The Two-Message Problem in Cipher-Text Autokey. 1979. To appear in Cryptologia.

Levine, Jack & J.V. Brawley. Involuntary Commutants with Some Applications to Algebraic Cryptography. Parts I & II. Berlin: Journal für die reine und angewandte Mathematik, 1966, pp. 20-43; 1967, pp. 1-24.

Levine, Jack. A List of Pattern Words of Length Two Through Nine. 1971.

Levine, J. Analysis of the Case n=3 in Algebraic Cryptography with Involuntary Key-Matrix and Known Alphabet. Berlin: Journal für die reine und angewandte Mathematik, 1963, pp. 1-30.

Levitov, Leo. Solution of the Voynich Manuscript. Laguna Hills, CA: Aegean Park Press, 1987, 176 pp.

Levy, Stephen. "Crypto Rebels." San Francisco, CA: Wired, Vol. 1 No. 2 (May/June 1993) 54-61.

______ Crypto: How the Rebels Beat the Government – Saving Privacy in the Digital Age. NY: Penguin Press, 2001, 356 pp.

Lewand, Robert E. Cryptological Mathematics. Washington, DC: The Mathematical Association of America, 2001, 199 pp.

Lewin, R. Ultra Goes to War. NY: McGraw-Hill, 1978, 398 pp.

Lewin. R. The American Magic. NY: Farrar, Straus & Giroux, 1982, 332 pp.

Lewis, James M. Lt. Comm. Chapter VII, Secret and Confidential Publications, Codes and Ciphers, pp. 49-61. Annapolis, MD: U.S. Naval Institute, A Digest of Naval Communications, 1928.

Lewis, A.H. Copper Breeches. Pocket Book edition, 1972, 245 pp.

Lewis, Graydon A., ed. A History of Communications Intelligence in the U.S. With Emphasis on The United States Navy. Denver, CO: Naval Cryptologic Veterans Association, 1982, 56 pp.

Lewis, Graydon A., ed. Intercept Station "C." Denver: NCVA, 1983, 84 pp.

Lewis, Frank W.  Problem Solving, with Particular Reference to the Cryptic (or "British") Crossword and Other "American" Puzzles.  Acusnet, MA: E.S. Lewis, 1989, 112 pp.

Lewis Frank W. Solving Cipher Problems: Cryptanalysis, Probabilities and Diagnostics. Laguna Hills, CA: Aegean Park Press, 1992, 253 pp.

Lewis, S. Secrets, Signs, Signals & Codes. NY: Holt, Rinehart & Winston, 1980, 95 pp.

Lidl, Rudolf and Harald Niederreiter. Introduction to Finite Fields and Their Application. NY: Cambridge University Press, 1994, 416 pp.

Lidle, R. & H. Niederreiter. Introduction to Finite Fields and Their Applications. NY: Cambridge University Press, 1986, 407 pp.

Liebman, A. Tales of Espionage and Intrigue. NY: Richards Rosen Press, 1977, 180 pp.

Liestol, Aslek. Cryptograms in Runic Carvings -- A Critical Analysis. Minnesota History, Vol. 4, Spring 1968, pp. 34-42.

Limb, J.O. Picture Coding: The Use of a Viewer Model in Source Encoding. Bell System Technical Journal, Oct. 1973, Vol. 52, No. 8, pp. 1271-1302.

Lincoln, Henry. The Holy Place: Discovering the Eighth Wonder of the Ancient World. NY: Arcade Publishing, 1991, 176 pp.

Lindenfels, J.B. Den hemmelige Skrivekonst. Kjobenhaven, Denmark: 1819, 294+ pp. Xerox.

Lindsay, Franklin. Beacons in the Night: With the OSS and Tito's Partisans in Wartime Yugoslavia. Stanford, CA: Stanford University Press, 1993, 183 pp.

Linguistics. A Selected Bibliography of Selected Rand Publications. Santa Monica, CA: Rand Corp., 1972, 21 pp.

Linn, Capt. G.W. Information From Capt. G.W. Linn, USNR (Ret.), 14 pp.

Linz, Gerhard D. Novice Notes: An Introduction to Cipher Reconstruction. American Cryptogram Association, 1990, 147 pp.

Lipton, S.M. & S.M. Matyas. Making the Digital Signature Legal -- and Safeguarded. Data Communications, Feb. 1978, 41-44, 49-52.

Liston, Robert. The Dangerous World of Spies and Spying. NY: Platt & Munk. 1967, 274 pp.

Liston, Robert A. The Pueblo Surrender: A Covert Action by the National Security Agency. New York: M. Evans & Co., Inc., 1988, 294 pp.

Littell, Robert. The Company: A Novel of the CIA. NY: The Overlook Express, 2002, 894 pp.

Littlefield, Jack. BIINC (Melancholy Notes on a Cablegram Code Book). NY: Acme Code Co., N.D., 8 pp. Reprinted from the New Yorker.

Littman, Jonathan. The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen. NY: Little, Brown & Co., 1997, 289 pp.

Lloyd, Mark. The Guinness Book of Espionage. NY: Da Capo Press, Inc., 1994, 256 pp.

Locard, Edmond. Manuel de Technique Policiere. Chapter VI, Les Ecritures Secretes. Paris: Payot, 1923, pp. 194 213.

Log Management of Crypto Items Needs No Decoding. Army Logistics, July-Aug. 1971, p. 2. (Typed copy of article.)

London Newspaer Stories on The Ultra Secret. Battle of the Codes, The Telegraph, Oct. 26, 1974; The Enigma Revealed, The Daily Telegraph, Oct. 31. 1974; How Enigma Was Cracked, London Sunday Times. Nov. 3, 1974; Final Solution to the Enigma, London Sunday Times, Nov. 3, 1974.

Long, Duncan. Defeating Industrial Spies. Port Townsend, WA: Loompanics, Unltd., 1991, 132 pp.

Lorain, P. L'Arme Des Transmissions Des Origines A La Veille De 1914. Gazette des Armes, July-August 1978, pp. 12-19.

Lorain, P. L'Arme Des Transmissions De 1914 à 1945. Gazette des Armes, Oct. 1978, pp. 28-37.

Lorain, P. Armement Clandestin SOE 1941-1944. Paris, France: 1972, 180 pp.

Lorain, P. Clandestine Operations. NY: Macmillan Pub. Co., 1983, 185 pp.

Lord, W. Midway. Parts I & II. Look, Aug. 8, 1967, 33-38, 43-48; Aug. 22, 1967, 33-36, 41-44.

Lorraine, P. The Cipher No Spy Can Crack. Industria, Vol. 51, No. 11E, 1975, pp. 62-63.

Love, Benjamin T. The BeNDcrypt Methodology for Developing "uncrackable" Batch Algorithms. Preston, MN: gamma publishing, 1995, 304 pp.

Lovell, Stanley. Of Spies & Stratagems. NY: Pocketbooks, 1964, 229 pp.

Lovell, Mary S. Cast No Shadow: The Life of the American Spy Who Changed the Course of World War II. NY: Pantheon Books, 1992, 398 pp.

Low Power Hand-Held Encryption Unit Defies Sophisticated Code-Breakers. EDN, Aug. 20, 1977, pp. 52, 54.

Lowenthal, Mark M. U.S. Intelligence Evaluation and Anatomy. NY: Praeger Pub., 1984, 134 pp.

Lowenthal, Mark M. U.S. Intelligence: Evolution and Anatomy. Westport, CT: Praeger Publishers, 1992, 178 pp.

Loxton, J.H. Number Theory and Cryptography. NY: Cambridge University Press, 1990, 235 pp.

Lubin. Méthode de Correspondance chiffrée. Revue Scientifque 38(1901:2) 809-812.

Luby, Michael. Pseudorandomness and Cryptographic Applications. Princeton, NJ Princeton University Press, 1996, 234 pp.

Lucky, Robert W. Silicon Dreams: Information, Man, and Machine. NY: St. Martin's Press, 1989, 411 pp.

Ludlow, Peter, ed. High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Cambridge, MA: The MIT Press, 1996, 536 pp.

______________, ed. Crypto Anarchy, Cyberstates, and Pirate Utopias. Cambridge, MA: Cambridge University Press, 2002, 485 pp.

Luebbert, W.F. & E.L. Stoll. Colossus and the Ultra Secret. Abacus (prototype publication of AFIPS), June 1977, pp. 11-21.

Luebbert, W.F. & E.L. Stoll. The Emerging Secret History of Computer Development Arising From Cryptography in World War II. Unpublished manuscript, 54 pp. + 3 pp. App.

Luger, Jack. Code Making And Code Breaking. Port Townsend, WA: Loompanics Unlimited, 1990, 121 pp.

Lundstrom, J.B. The First South Pacific Campaign: Pacific Fleet Strategy, December 1941-June 1942. Annapolis: Naval Institute Press, 1976, 240 pp.

Lusar, Rudolf. Die deutschen Woffen und Geheimwaffen des 2. Weltkrieges und ihre Weiterentwicklung. J.F. Lehmannca Verlag München. pp. 182-184 (Sent by CLIFF) Xerox.

Lynch, Col. F.D. An Approach to Cryptarithms, 24 pp.

Lynch, Col. F.D. Pattern-Word List, Vol I. Laguna Hills, CA: Aegean Park Press, 1977, 152 pp.

Lynch, M.F. Variety Generation-A Reinterpretation of Shannon's Mathematical Theory of Communications and its Implications for Information Science. Journal of the American Society for Information Science, Jan. 1977, pp. 19-25.

Lynhope, William. The Ultimate Quest. Oxfordshire, UK, Roland Oliver Ltd., 2002, 68 pp.

Lysing, Henry. The Cryptogram Book. NY: David Kemp & Co., 1937, 110 pp.

Lysing, Henry. Secret Writing. NY: David Kemp & Co., 1936, 117 pp.HB, DJ.

Lysing, Henry. Secret Writing: An Introduction to Cryptograms, Ciphers and Codes. NY: Dover Publications, 1974, 117 pp.

Lysing, Henry. The Secret Code Digest. NY: Siebel Co., 1942, 32 pp.

Lysing, Henry. Secret Writing: An Introduction to Cryptograms, Ciphers and Codes. NY: David Kemp & Co., 1936, 117 pp.

MacCloskey, Big. Gen. M. The American Intelligence Community. NY: Richards Rosen Press, 1967, 190 pp.

Macdonald, John. Great Battles of World War II. NY: Macmillan Pub. Co., 1986, 192 pp.

MacDuff, E. The Dancing Horse Will Tell You. Sussex, England: Eric Faulkner-Little, 1974, 120 pp.

MacEachin, Douglas, J. The Final Month of the War With Japan: Signals Intelligence, U.S. Invasion Planning and the A-Bomb Decision. Langley, VA: CIA’s Center for the Study of Intelligence, 1998, 53+ pp.

Mache, Wolfgang. Lexikon der Text- und Datenkommunikation. München, Germany: R. Oldenbourg Verlag, 1992, 580 pp.

MACHIAVELLI, An Index to Articles in The Cryptogram, Vols. I-XXVII (1932-1960). Supplement to The Cryptogram, Nov.-Dec. 1960, 11 pp. Xerox.

Macksey, Kenneth. Without Enigma: The Ultra and Fellgiebel Riddles. Surrey, England: Jan Allen Pub., 2000, 160 pp.

MacNeil-Leher Report. High-Tech Censorship, April 21, 1982, 7 pp.

MacNeish, H.F. Lesson 15, The Puzzle Cryptogram, 9 pp.

Maffeo. Steven E. Most Secret and Confidential: Intelligence in the Age of Nelson. Annapolis, MD: Naval Institute Press, 2000, 355 pp.

Magic Reports for the Attention of the President, 1943-1944, 32 pp.

Magnavox Offers Fax Scrambler. Electroinc News, 9/8/72, p. 27.

Maillard, J.F. Aspects De L'Encyclopédiame au XVI Siècle Dans Le Traicté Des Chiffres. Bibliotheque D'Humanisme et Renaissance, Vol. 44, No. 2, 1982, 235-268.

Maitland, Peter. Communications Security. Speech at University of Kentucky. Fort Lauderdale: Ground/Data Corp., July 1972, 20 pp.

Makhnovets, V.P. = V. Bakharev. O shifrakh. Geneva, 1902.

Malabre, Jr., A.L. Top Secret: A Former Cryptographer Leaks All. Wall Street Journal, 6/22/71.

Manchester, R.B. The Mammoth Book of Word Games. NY: Hart Pub. Co., 1976, 510 pp.

Maneki, Sharon A. The Quiet Heroes of the Southeast Pacific Theatre: An Oral History of the Men and Women of CBB and Frumel. Fort Meade, MD: Center for Cryptologic History, NSA, 1966, 116 pp.

Manly, John M. "Roger Bacon and the Voynich MS." Cambridge, MA: Speculum, A Journal of Medieval Studies, July 1931, pp. 345-391.

Mango, Karen N. Codes, Ciphers and Other Secrets. NY: Frankin Watts, Inc. 1988, 96 pp.

Maniscalco, Mario J. Data Encryption. Radio-Electronics Magazine, April 1988, pp. 93-97.

Manly, J.M. The Most Mysterious Manuscript in the World. Harper's, June 1921, pp. 186-197.

Manly, J.M. The John Manly Papers: A Preliminary Guide. University of Chicago Library, Dec. 1972, 10 pp.

Manne, Robert. The Petrov Affair: Politics and Espionage. Elmsford, NY: Pergamon Press, 1987, 310 pp.

Mansfield, Louis C.S. One Hundred Problems in Cipher. London: A. Maclehose & Co., 1936, 223 pp.

Mansfield, Louis C.S. The Solution of Codes and Ciphers. London: A. Maclehose & Co., 1936, 162 pp.

Manual of Cryptography. London: General Staff, War Office, 1914, 96 pp. Xerox

Manual of Cryptography. British War Office ca. 1914. Laguna Hills, CA: Aegean Park Press, 1980, 96 pp., Reprint.

Marchetti, V. & J.D. Marks. The CIA and the Cult of Intelligence. NY: Dell Pub., 1975, 397 pp.

Marchetti, V. & J.D. Marks. The CIA and the Cult of Intelligence. NY: A.A. Knopf, 1974, 398 pp.

Marchmont, A.W. Miser Hoadley's Secret. NY: New Amsterdam Book Co., 1902, 305 pp.

Marinkovic, I. Enigma do pobjede. Zagreb: Fohersova Biblioteka, 1977, 203 pp.

Markle, Donald E. Spies & Spymasters of the Civil War. NY: Hippocrene Books, 1994, 244 pp.

Marks, Leo. Between Silk and Cyanide: A Codemaker’s War, 1941-1945. NY: Free Press, 1999, 614 pp.

Marotta, M.E. The Code Book -- All About Unbreakable Codes and How to Use Them. Loompanics Unltd., 1979, 74 pp.

Marrin, Albert. The Secret Armies: Spies, Counterspies, and Saboteurs in World War II. NY: Atheneum Children's Books, 1985, 239 pp.

Marriott, John. Tactical Crypt: The Art of Secure Communications. Military Technology, Vol. 26, Aug. 19, 1981, pp. 12-16.

Marsh, Carole. New York Dingbats: Decipher Games, Stories and Activities from Code! Decatur, GA: Gallopade Publishing Group, 1991, 36 pp.

Marsh, D.C.B. Cryptology as a Senior Seminar Topic. The American Mathematical Monthly, Aug.-Sept. 1070, pp. 761-764.

Marshall, Max L. ed. The Story of the U.S. Signal Corps. NY: Franklin Watts, 1965, 305 pp.

Marshall, Alan. Intelligence and Espionage in the Reign of Charles II, 1660-1685. NY: Cambridge University Press, 1994, 334 pp.

Martin, D.C. Wilderness of Mirrors. NY: Harper & Row, 1980, 236 pp.

Martin, Frederick T. Top Secret Intranet: How U.S. Intelligence Built INTELINK – The World’s Largest, Most Secret Network. Upper Saddle River, NJ: Prentice Hall, 1999,380 pp.

Martin, James. Security, Accuracy,and Privacy in COmputer Systems. Englewood Cliffs: Prentice Hall, Xerox copy of Chapter 19, Cryptography and Chapter 20, Programs for Enciphering Data.

Martineau, L. The Rocks Begin to Speak. Las Vegas: KC Pub., 1976, 210 pp.

Mason, Adrienne and Pat Cupples. Lu & Clancy’s Secret Codes. Buffalo, NY: Kids Can Press Ltd., 1999, 40 pp.

Mason, V.W. Spider House. NY: The Mystery League, 1932, 288 pp.

Mason, Van Wyck. The Branded Spy Murders. NY: Grosset & Dunlap, 1932, 301 pp.

Mason, Simon. Secret Signals - The Euronumbers Mystery. Lake Geneva, WI: Tiare Publications, 1991, 69 pp.

Mason, B. Centuries-Old Puzzle Solved in a Sitting. Newsday, May 17, 1973, p. 21.

Masters, Al. $2 Million Blue Ridge Bonanza. Saga magazine, March 1970, pp. 34-37, 90-94.

Masters, Al. Has the Beale Treasure Code Been Solved?
True Treasure magazine, Sept.-Oct. 1068, pp. 11-17.

Masters, Al. Secret Treasure Code of the Blue Ridge. True Treasure magazine, May-June 1968, pp. 9-15.

Mathiesen, K. A Bibliography of Modern Cryptology. Providence, R.I.: Brown University, 1978, 8 pp.

Matsuskima, Keizo. Special Report: Pacific Warfare. Japan: Tokumsa Book Store, July 15, 1967, 237 pp.

Matyas, S. Digital Signatures--An Overview. Computer Networks, 3(1979) 87-94.

Matyas, S. A Computer Oriented Cryptanalytic Solution for Multiple Substitution Enciphering Systems. University of Iowa, Dissertation, Dec. 1974, 215 pp.

Matyas Jr., Stephen M. The Beale Ciphers, Containing Research Findings, and Documents and Data, as well as Several Predictions about How the Ciphers were Constructed. Poughkeepsie, NY: Privately printed, 1996, 66 pp.

Mau, E.E. Create Word Puzzles With your Microcomputer. Rochelle Park, NJ: Hayden Book Co., 1982, 304 pp.

Mauborgne, Capt. J.O. Data for the Solution of German Ciphers. Ft. Leavenworth, KS, 1917, 6 pp.+

Mauborgne, Lt. Col. J.O. An Advanced Problem in Crytography And its Solution. Army Service Schools Press, Ft. Leavenworth, KS: 1918, 21 pp.

Maubourgne, Ben P. Military Foundling. Philadelphia: Dorrance & Co., 1974, 118 pp.

Mauler, Eugen K. Concerning the M-motion and its Ramifications. Vienna, Austria: Trans. from the German, 1972, 32 pp.

Maurer, Ueli, ed. Advances in Cryptology -- EUROCRYPT '96 Proceedings. Springer-Verlag, 1996, 416 pp.

Mavis, Paul. The Espionage Filmography: United States Releases, 1858 through 1999. Jefferson, NC: McFarland & Co., Inc., 462 pp.

May, E.R. Knowing One's Enemies: Intelligence Assessment Before the Two World Wars. Princeton, NJ: Princeton University Press, 1984, 561 pp.

Mayer, S. The Breaking up of the German Ciphering Machine "Enigma." 5/31/74, 9 pp. Supplement to this paper, 12/4/74, 4 pp.

McCalmont, Arnold M. How to Select and Apply Various Voice Scrambling Techniques. Communications News, Jan. 1974, pp. 34-37.

McCalmont, A.M. Communications Security Devices--Techniques, Constraints and Selection. Conf. on Comm. Equipment and Systems, April 4-7, 1978, pp. 415-418.

McCarthy, J. Proposed Criterion for a Cipher To Be Probable-Word-Proof. Communicartions of the ACM, Feb. 1975, Vol. 18, No. 2, pp. 131-132.

McCarthy, Linda. Spies, Pop Flies, and French Fries: Stories I Told my Visitors to the CIA Exhibit Center. Markham. VA: History is a Hoot, Inc., 1999, 108 pp.

McClain, Sally. Navajo Weapon. Boulder, CO: Books Beyond Borders, 1994, 304 pp.

McCloy, Helen. Panic. NY: Dell Books, 1944, 236 pp.

McCormac, John. European Scrambling Systems, Circuits, Tactics and Techniques. Waterford, Ireland: MC2 (Pub. Div.) 1991, 310 pp.

McCormack, Alfred. Origin, Functions and Problems of the Special Branch, MIS. 55 pp.

McCormack, Col. Alfred. Papers from the Personal files of Alfred McCormack, Colonel, AUS, Special Brancch, G-2 MID, WD. SRH-141, Part I, 223 pp.; Part 2, 347 pp.

McCormick, Donald. Love In Code Or, How To Keep Your Secrets. London: Eyre Methuen Ltd., 1990, 216 pp.

McCormick,Donald & Katy Fletcher. Spy Fiction: A Connoisseur's Guide. NY: Facts On File, Inc., 1990, 346 pp.

McCracken, G.E. Athanasius Kircher's Universal Polygraphy. Isis, 1949, Vol. 39, No. 118, pp. 215-228.

McCreary, John. Manual For The Solution of Secret Writing. 1984, 317 pp.

McDermott, Bridget. Decoding Egyptian Hieroglyphs: How to Read the Secret Language of the Pharaohs. San Francisco: Chronicle Books, 2001, 176 pp.

McDermott, Don J., ed. The Cryptic Scholar. Marquette, MI: Northern Michigan University, Winter/Spring 1991, 107 pp.

McDowell, E. Better The Smoke Signals. St. Louis Post-Dispatch. Story about Navajo Code Talkers.

McGinnis, George P., ed. U.S. Naval Cryptologic Veterans History Book. Paducah, KY: Turner Pub. Co., 1996, 208 pp.

Mc Graw, Gary & Edward Felton. Java Security: Hostile Applets, Holes and Antidotes. NY: John Wiley & Sons, Inc., 1997, 192 pp.

McKay, C.G. From Information to Intrigue: Studies in Secret Service based on the Swedish Experience, 1939-1945. London, England: Frank Cass & Co. Ltd., 1993, 306 pp.

McKay, C.G. and Bengt Beckmann. Swedish Signal Intelligence 1900-1945. London: Frank Cass Pub., 2003, 310 pp.

McKay, Randle & R.J. Gerrard. The "Intelligence" Game of Spy Cases and Problems. NY: Robert McBride & Co., 1935, 217 pp.

McKay, H.C. Notes From A Laboratory. American Photography, Nov. 1946, pp. 38-39, 50.

McKee, Alexander. El Alamein: Ultra and the Three Battles. London, England: Souvenir Press Ltd., 1991, 192 pp.

McLachlan, D. Room 39, A Study in Navy Intelligence. NY: Atheneum, 1968, 438 pp.

McLachlan, Jr., D. Description Mechanics. Information and Control 1, 240-266 (1958) RCA.

McLean, Captain Ridley. Naval Communications. Lecture delivered by Director Naval Communications at the Naval War College 28 January 1927, 26 pp.

McLean, Joe. Secure Data Com Entries Grow. Electronic News, Sept. 20, 1971, p. 36.

McMillan, B. An Elementary Approach to the Theory of Information. SIAM Review. Vol. 3, No. 3, 1961, pp. 211-229.

Megros, P. All About Ciphers. London: Collins, 1943, 77 pp.

Mehl, Donald. E. The Green Hornet: America’s Unbreakable Code for Secret Telephony: The Untold Story of World War II, The U.S. Army Signal Corps SIGSALY System. Kansas City, MO: D.E. Mehl, 1997, 204 pp.

Meissner, P. Ed. Report of the Workshop on Estimation of Significant Advances in Computer Technology. U.S. Dept. of Commerce, NBSIR 76-1189, Dec. 1976, 33 pp.

Meister, Dr. A. Die Anfange des Modernen Diplomatrachen Geheimschrift. Paderborn, 1902, 65 pp. Xerox.

Meister, Aloys. The Beginnings of Modern Diplomatic Cryptography. Paderborn, Germany: F. Schoningh, 1902, 74 pp. (English translation, Xerox)

Mel, H.X. and Doris Baker. Cryptography Decrypted. Readig, MA: Addison-Wesley, 2001, 352 pp.

Melchior, I. The Tombstone Cipher. NY: Bantam Books, 1983, 260 pp.

Melinshy, Hugh. A Code-breaker’s Tale. Norfolk, England: The Larks Press, 1998, 96 pp.
 

Mellen, Greg. Graphic Solution of a Linear Transformation Cipher. Presented at ACA convention, 1979, 3 pp.

Mellen, Greg & M.F. Mellen. To Hoax or Not To Hoax? Is that the Question? 1976, 9 pp.

Mellen, Greg. A Bibliography of Periodical Literature 1920-1950 on Secrecy Systems, Bell Telephone Laboratories Technical Library. 9 pp.

Mellen, Greg & Lloyd Greenwood. The Cryptology of Multiplex Systems. St. Paul, MN: Spring UNIVAC, 29 pp.

Mellen, G.E. Cryptology, Computers, and Common Sense. National Security Conference, 1973, pp. 569-579.

Melnick, W. The Unknown Secrets of the Black Chamber. Radio Mirror, 1935, pp. 32-33, 68-69.

Melosi, M.V. National Security Measured: The Aftermath of Pearl Harbor. Prologue, Summer 1977, pp. 75-89.

Melton, H. Keith. OSS Special Weapons & Equipment: Spy Devices of WW II. NY: Sterling Pub. Co., Inc., 1991, 128 pp.

Melton, H. Keith. CIA Special Weapons Equipment: Spy Devices of the Cold War. NY: Sterling Pub. Co., Inc., 1993, 128 pp.

Melton, H. Keith. The Ultimate Spy Book. NY: DK Publishing, Inc., 1996, 176 pp.

Memory Aids. American Cryptogram Association, 2 pp.

Mendelsohn, Charles. Studies in German Diplomatic Codes Employed During the World War. Washington: USGPO, 1937, 104 pp. (Xerox)

Mendelsohn, Charles J. Blaise De Vigenère and the "chiffre carré" Proceedings of the American Philosophical Society, March 1940, pp. 103-129.

Mendelsohn, C,J, (Translation) Alberti on Deciphering. From: A. Meister-Die Geheimschrift im Dienste der päpaltichen Kurie ... pp. 127-133.

Mendelsohn, Charles J. Blaise de Vigenère and the "Chiffre Carré" Philadelphia, PA: Proceedings of the American Philosophical Society, March 22, 1940, pp. 103-129.

Mendelsohn, John, ed.  Covert Warfare. Volume 6. German Radio Intelligence and the Soldatensender.  NY: Garland Pub.,Inc., 1989, 325 pp.

Mendelsohn, John, ed.  Covert Warfare. Volume 2. The Spy Factory and Secret Intelligence.  NY: Garland Pub.,Inc., 1989, 400 pp.

Mendelsohn, John, ed.  Covert Warfare. Volume 1. ULTRA, MAGIC and the Allies.  NY: Garland Pub.,Inc., 1989, 320 pp.

Mendelsphn, C.J. Cardan on Cryptography. Scripta Mathematica, Vol. VI, 1939, pp. 157-168.

Menezes, Alfred & Scott A. Vanstone, eds. Advances in Cryptology -- Crypto '90. NY: Springer-Verlag, 1991, 664 pp.

Menezes, Alfred J. Elliptic Curve Public Key Cryptosystems. Norwell, MA: Kluwer Academic Publishers, 1993, 128 pp.

Menezes, Alfred J., van Oorschot, Paul C. and Scott A. Vanstone. Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, Inc., 1997, 780 pp.

Mensaje Ciofrado. "TINKER" A.F. Blazquez. Buenos Aires, Argentina: June 1954, 10 pp.

Merishaw, R.V. The Standard Data Encryption Algorithm. Part I & Part II. Byte magazine, March 1979, pp. 66-70, 72-74.

Merkle, R.C. Secrecy, Authentication, and Public Key Systems. Ann Arbor: UMI Research Oress, 1986, 104 pp.

Merkle, R.C. Secure Communications over Insecure Channels. Communications of the ACM, April 1978, 294-299.

Metelski, J. Telecommunications Policy, Dec. 1978, 327-335.

Méthode Facile pour Dechiffrer un Écrit Quelconque Compose En Caractères Conventionale Dans Les Langues Italienne, Francaise, Anglaise, et Latine. Florence: Chez Vincent Battelle et Fils, 1833, 98 pp.

Metropolis, N., Howlett, J. and G.C. Rota. A History of Computing in the Twentieth Century. NY: Academic Press, 1980, 659 pp.

Meyer, C.H. Introduction to Cryptography. Infotech Special Seminar, Commercial Cryptography, 1979, 56 pp.

__________. Attacking A Cipher System. 1979, 18 pp.

Meyer, C.H. & S.M. Matyas. Cryptography. Article in McGraw-Hill Encyclopedia of Science & Technology, 1982, --. 770-777.

Meyer, C.H. & W.L. Tuchman. Psudorandom Codes Can Be Cracked. Electronic Design 23, Nov. 9, 1972, pp. 74-76.

Meyer, C.H. Designe Considerations for Cryptography. National Computer Conference, 1973, 99. 603-606.

Meyer, C.H., R. Lennon & S.M. Matyas. Cryptography Provides Practical Data Security. Computer World, Special Report/20, Nov. 26, 1979, pp. 26, 57.

Meyer C.H. & W.L. Tuchman. Putting Data Encryption to Work. Mini-Micro Systems, Oct. 1978, pp. 46, 48-50, 56.

Meyer, C.H. Attacking a Cipher System. Infotech Special Seminar, Commercial Cryptography, 1979, 18 pp.

Michell, John. Who Wrote Shakespeare? NY: Thames & Hudson, 1999, 272 pp.

Michie, D. Turing and the Origins of Computers. London: New Scientist, Feb. 21, 1980, --. 580-583.

Middleton, D. The Ultra Spy Machine. St. Louis Post-Dispatch, Nov. 25, 1974, p. 3D. Review of The Ultra Secret.

Milano, James V. & Patrick Brogan. Soldiers, Spies, and the Rat Line. McLean, VA: Brassey's, Inc., 1996, 242 pp.

Miles, Lisa, ed. Spying for Beginners.

___________, ed. Secret Codes: Signs and Symbols, Scrambling, Codebreaking. Tulsa, OK: Educational Development Corp., 1997, 32 pp.

Miller, Marvin. Who Dunnit? How To Be a Detective in Ten Easy Lessons. NY: Scholastic Inc., 1991, 102 pp.

______________. Codemaster: How to Write and Decode Secret Messages #2. NY: Scholastic Inc., 1998, 70 pp.

_______________.  Codemaster: How to Write and Decode Secret Messages. Book # 1. NY: Scholastic Inc., 1998, 69 pp.

Miller, G.A. & E.A. Friedman. The Reconstruction of Mutiliated English Texts. Information and Control 1, (1957) 38-55

Miller, G.A. E.B. Newman & E.A. Friedman. Length-Frequency Statistics for Written English. Information and Control 1, (1958) 370-389. RCA

Miller, Nathan. Spying for America: The Hidden History of U.S. Intelligence. NY: Paragon House, 1989, 482 pp.

Millet, Larry. Sherlock Holmes and the Rune Stone Mystery. NY: Viking Penguin, 1999, 317 pp.

Millikin, D.D. Elementary Cryptography and Cryptanalysis. NY: NYU Bookstore, Third Edition, 1943, 140 pp.

Millikin, D.D. Elementary Cryptography and Cryptanalysis. NY: NYU Bookstore, 1942, 117 pp.

Millikin, D.D. Cipher Writing. Reprinted from The Encyclopedia Americnana, 4 pp. Inside cover contains note to Major H.O. Yardley signed by Milikin, November 5, 1937,followed by note indicating that it was given to H.E. Langen by H.O. Yardley, Feb. 9, 1969.

Millikin, D.D. The Japanese Morse Telegraph Code. QST, Sept. 1942, pp. 23-23, 120.

Minnick, Wendell L. Spies and Provocateurs: A Worldwide Encyclopedia of Persons Conducting Espionage and Covert Action, 1946-1991. Jefferson, NC: McFarland & Co., Inc., 1992, 310 pp.

Mitchell, Chris, ed. Cryptography and Coding II. NY: Oxford University Press, 1992, 301 pp.

Mitrokhin, Vasiliy. KGB Lexicon: The Soviet Intelligence Officer’s Handbook. Portland, OR: Frank Cass Pub., 2002, 451 pp.

Mitteilungen des Osterreichischen Staatsarchivs. Herausgegeben von der Generaldirektion. 23 Band. 1970, Sonderdruck Wien 1971, pp. 377-384.

Modin, Yuri. My Five Cambridge Friends: Burgess, MacLean, Philby, Blunt and Caincross by Their KGB Controller. NY: Farrar Strauss Giroux, 1994, 282 pp.

Moitoret, Victor A. (Je Saurais). American Cryptogram Association Cipher Reference List and Index. St.-Jean-Cap-Ferrat, France: 1972, 12 pp.

Molho, L.M. Hardware Aspects of Secure Computing. Spring Joint Computer Conference, 1970, pp. 135-144.

Moll, Louise B. Clever Cryptograms. NY: Sterling Pub. Co., 1995, 128 pp.

Moll, Louise B. Cryptogram-A-Day Book. NY: Sterling Pub. Co., 1996, 128 pp.

Moll, Louise B. The Great book of Cryptograms. NY: Sterling Pub. Co., Inc., 1993, 128 pp.

Moll, Louise B. Baffling Cryptograms. NY: Sterling Pub. Co., Inc., 1996, 128 pp.

Moller, Gunnar. Hemmelig skrift & koder. Copenhagen, Denmark: Host & Sons Fprlag, 1968, 95 pp.

Mongé, Alf. The 13th Century Kingigtorswaq Runic Concealment Cipher. 18 page manuscript of article in New England Antiquities Research Journal.

Mongé, Alf. Dr. Golumb's Cryptic Quips. Anthropological Journal of Canada, Vol. 12, No. 3, 1974, 10-17.

Mongé, Alf & O.G. Landsverk. Norse Medieval Cryptography in Runic Carvings. Glendale, CA: Norsemen Press, 1967, 224 pp.

Montagu, E. Beyond Top Secret U. London: Peter Davies Ltd., 1977, 192 pp.

Moon, Havana. The Numbers Factsheet. Briarcliff Manor, NY: Moonbeam Press, 1990, 8 pp.

____________. Uno, Dos, Cuatro: A Guidd to the Number Stations. Lake Geneva, WI: Tiare Publications, 73 pp.

Moore, Dan T. and Martha Waller. Cloak & Cipher. Indianaplolis: Bobbs & Merrill, 1962, 256 pp. Inscribed by author.

Moore, S.E. Secret Island. NY: Four Winds Press, 1977, 213 pp.

Moore, Edythe. Secure Communications. A Literature Survey. El Segundo, CA: Aerospace Corp., 1964, 52 pp.

Moorman, Captain Frank. Code and Cipher in France. Infantry Journal, June 1920, 1039-1044.

Moorman, Frank. Enciphering and Deciphering Code. Letter to editor, Scientific American, Aug. 21, 1915, p. 159.

Moorman, Lt. Col. Frank. Final Report of the Radio Intellignece Section, General Staff General HQ AEF. Technical Paper of the SIS, 1935, 52 pp.

Moreland, Nigel. An Outline of Scientific Criminology. NY: Philosophical Library, Inc., 1950, 284 pp.

Morgan, Howard K. Codes and Ciphers Prepared for Aircraft Flight and Ground Crews. Washington: The Infantry Journal. 1944, 62 pp.

Morgan, Howard K. Codes and Ciphers. Washington: Airlines War Training Institute, 1943, 68 pp.

Morgenstern, George. Pearl Harbor, The Story of the Secret War. NY: Devan-Adair Co., 1947, 425 pp.

Morice, Dave. The Dictionary of Wordplay. NY: Teachers & Writers Collaborative, 2001, 293 pp.

Morley, E. Marvel's Mysterious Messages. NY: Tempo Books, 1977, 64 pp.

Morley, S.G. An Introduction to the Study of the Maya Hieroglyphs. NY: Dover Pub., 1975, 484 pp. (Reprint of 1915 edition.)
 

Morris, Anthony P. The Cipher Detctive. NY: Beadle & Adams, Dime New York Library, #334, 3/18/1885. Xerox copy.

Morris, R. A Fast Software Encryption Algorithm. Bell Labs Technical Memo 79-1271-1, Jan. 5, 1979, 6 pp.

Morris, K., N.J.A. Sloane and A.D. Wyner. Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard. Bell Laboratories, Nov. 15, 1976, 5 pp.

Morris, S. Brent. The Folger Manuscript: The Cryptanalysis and Interpretation of an American Masonic Manuscript. Fort Meade, MD: 1992, 255 pp.

Morrison, Philip & Emily. Charles Babbage and His Calculating Engines. NY: Dover Pub., 1961, 400 pp.

Morris, K. The Hagelin Code Machine (M-209) Reconstrcution of the Internal Settings. Bell Laboratories, 23 pp.

Morton, L. Pearl Harbor In Perspective -- A Bibliographical Survey. US Naval Institute Proceedings, April 1955, pp. 461-469.

Moss, Robert.  Carnival of Spies.  NY: Villard Books, 1987, 498 pp.

Mott-Smith, Geoffrey. Ciphers for Solvers, 30 pp., 1954.

Mowry, David P. Listening to the Rumrunners. Fort Meade, MD: Center for Cryptologic History, NSA, 34 pp.

Moyer, Patricia. A Six-Letter Word for Death. NY: Henry Holt & Co., Inc., 1983, 241 pp.

Moynihan, Daniel Patrick. Secrecy: The American Experience. New Haven, CT: Yale University Press,1998, 262 pp.

Mrayati, Mohammad, Yahya Mear Alan & Hassan al-Tayyan. Origins of Arab Cryptography and Cryptanalysis, Volume I. Damascus, Syria: Arab Academy of Damascus, 1987.

Mrayati, Mohammad, Y. Meer Alam & H. Al-Tayyan. Origins of Arab Cryptography and Cryptanalysis, Vol. Two: Analysis and Editing of Eight Arab Manuscripts. Damascus, Syria: Scientific Studies & Research Center, 478 pp.

_______________________________________________. New Contributions to the history of cryptology.(trans. by Said Al-Asaad)69 pp.N.D.

Muirhead, Capt. M. Military Cryptography. Journal of the Royal United Service Institution, Oct. 1911, pp. 1321-1332.

Muirhead, Capt. M. Military Cryptography. A Study of Transposition Cipher Systems and Substitution Frequency Tables. Journal of the Royal Service Institution, Dec. 1912, pp. 1665-1678.

Muller, André. Les Écritures Secrètes. Paris, France: Presses Universitaires de France, 1971, 127 pp.

Muller, André. Le Décryptement. Paris, France: Presses Universitaires de France, 1983, 128 pp.

Mulligan, T. The German Navy Evaluates Its Cryptographic Security, October 1941. Military Affairs, April 1985, 75-79.

Muñoz, Jose Luis. La Criptografia en Anecdotas. Madrid: Ediciones Ejército, 1955, 372 pp.

Murphy, Brian. The Business of Spying. London: Milton House Books, 1973, 208 pp.

Murphy, Elspeth Campbell. The Mystery of the Hobo’s Message. Minneapolis, MN: Bethany House Pub., 1995, 64 pp.

Murphy, W.F. The Roman Enigma. NY: Macmillan, 1981, 306 pp.

Murray, Gil. The Invisible War: The Untold Secret Story of Numer One Canadian Special Wireless Group, Toyal Canadian Signal Corps, 1944-1946. Toranto, Canada: Dundurn Press, 2001, 302 pp.

Murray, W. Ultra: Some Thoughts on its Impact on the Second World War. Air University Review, Vol. XXXV, No. 5, July-Aug. 1984, 52-64.

Myer, Lt. Gen. Charles R. Division-Level Communications 1962-1973. Washington: Dept. of the Army, 1982, 109 pp.

Myer, Albert J. A Manual of Signals. NY: D. Van Nostrand, 1868, 417 pp.

Myers, Lawrence W. Spycomm: Covert Communication Techniques of the Underground. Boulder, CO: Paladin Press, 1991, 246 pp.

Myszkowski, Lt. Col. E.V.T. Indecipherable Cryptography (Trans.) Paris, 1902, 42 pp. Xerox.

Naccache, David, Ed.Topics in Cryptology-CT-RSA 2001. The Cryptographers Track at RSA Conference, 201 Proceedings. NY: Spriner-Verlag, 2001, 473 pp.

Nagata, Zyunko. Cryptogram or Secret Code. (In Japanese). Tokyo: Diamond Pub. Co., 1971, 349 pp.

Nagata, Zyunko. Codes and Ciphers(?) (In Japanese) 1974, 185 pp.

Nalty, Bernard C., Consultant Ed. Pearl Harbor and the War in the Pacific. NY: Smithmark Pub. Inc., 1991, 304 pp.

Nash, Helen. Challenging Cryptograms. NY: Sterling Pub. Co., Inc., 1994, 128 pp.

Nash, Helen and Dorothy Masterson. Humorous Cryptograms. NY: Sterling Pub., Inc., 1995, 128 pp.

Nash, Jay Robert. Spies: A Narrative Encyclopedia of Dirty Deeds & Double Dealing From Biblical Times to Today. NY: M. Evans and Co., 1997, 624 pp.

National Intelligence Book Center Catalog. Illustrated and descriptive worldwide list of books for sale, Winter 1989, 110 pp. Also Autumn 1988,55 pp.list. Useful for research.

National Security Agency Newsletter. Published monthly for employees with information about NSA employees and activities. Dec. 1969, 16 pp., April 1986, 16 pp., Feb. 1987, 16 pp., Nov. 1987, 24 pp., Oct. 1994, 16 pp., July 1988, 16 pp., July 1990,16 pp., Dec. 1991, Jan. 1992, 16 pp., April 1992, 20 pp., July 2000, 16 pp.

National Security Agency - Carrers in Enginering and Mathematics. Washington: USGPO, 1968, 20 pp.

National Bureau of Standards. Proceedings of the Third Seminar on the DOD Computer Security Initiative Program. Gaithersburg, MD: Nov. 18-20, 1980.

National Intellectual Property Law Institute. International Cryptography Institute 1996 (ICI-96) Washinton, DC: 1996, 183 pp.

National Security Agency. Center for Cryptologic History (CCH), A Guide to Programs and Services.8 pp.(two versions)

________________________. National Security Agency.(CCH). The Origins of NSA. Includes photographs and profiles of Herbert O. Yardley, Commander Laurance F. Safford, William F. Friedman, Rear Admiral Earl E. Stone and Major General Ralph J. Canine. 5 pp.

________________________. CCH. NSA and the Cuban Missle Crisis by T.R. Johnson and D.A. Hatch, 1988, 11 pp. (two copies)

________________. CCH. Rare Books in the National Cryptologia Museum.13 pp.

________________________. CCH. Introducttory History of VENONA and Guide to the Translations. 12 pp.

________________________. CCH. VENONA: New Releases, Special Reports, and Project Shutdown. 8 pp.

________________________. CCH. The Venona Story by Robert L. Benson. 61 pp.

________________________. CCH. VENONA Historical Monograph #2:The 1942-43 New York-Moscow KGB Messages By R.L. Benson, 10 pp.

________________________. CCH. VENONA Historical Monograph #3: The 1944-45 New York and Washington-Moscow KGB Messages by R.L. Benson,12 pp.

________________________. CCH. THE BOMBE: Prelude to Modern Cryptanalysis. (Three versions)

________________________. CCH. The Cryptographic Mathematics of Enigma by Dr. Ray Miller. 17 pp.

________________________. CCH. Army Security Agency Aerial Reconnaissance: Mission and Sacrifice. 14 pp. (two copies)

________________________. CCH. Dedication and Sacrifice: National Aerial Reconnaissance in the Cold War. 8 pp.

________________________. CCH. Pioneers in U.S Cryptology. Includes photographs and profiles of H.O. Yardley,W.F. Friedman, Captain L.F. Safford,USN, J.N. Wenger, USN,F.B. Rowlett, E.S. Friedman and A.M. Driscoll.23 pp.

________________________. CCH. Sharing the Burden: Women in Cryptology durig World War II by Jennifer Wilcox, 1998.18 pp.

________________________. CCH. The Kgb in San Francisco and Mexico City [and] The GRU in New York and Washington. VENONA Historical Monograph #4 by R.L. Benson, 12 pp.

________________________. CCH. The KGB and GRU in Europe, South America, and Australia. VENONA Historical Monograph #5 by R.L. Benson, 15 pp.

________________________. CCH. Solving the Enigma: History of the Cryptanalytic Bombe by Jennifer E. Wilcox. 2001, 52 pp.

________________________. CCH. Listening to the Rumrunners by David P. Mowry. 34 pp.two copies.

________________________. History and Publicatios Staff. American Cryptology, Two Centuries of Tradition. 4 pp.

________________________. History and Publicatios Division (HPD). A Pictorial Cryptologic History Quiz. (For 35th Anniversary of NSA) 11 pp.

________________________. HPD. Origins of NSA 1945-1952. (35th anniversary) 6 pp.

________________________. HPD. Pioneers in U.S. Cryptology Part 1. Includes profiles of H.O. Yardley, W.F. Friedman and L.F. Safford. 11 pp.

________________________. HPD Pioneers in U.S. Cryptology, Part II. Includes profiles of J.N. Wenger, F.B. Rowlett, E.S. Friedman and A.M. Driscoll. 14 pp.

________________________. HPD. The NSA Museum Collection. 15 pp.

_________________________. The National Cryptologic Museum. 4 pp.

_________________________. The National Cryptologic Museum. A Self-Guided Tour. 9 pp.

_________________________. Codes and Ciphers, exhibit and brochure by NSA Cryptologic museum, 12 pp.

_________________________. Radio Intellgence on the Mexican Border, World War I: A Personal View. NSA Museum brochure based on interview of Richard Egolf in 1976 about his service with the Radio Intelligence Service starting in 1918.

_________________________. Decption at D-Day. Informational handout with suggested reading list. 8 pp.

_________________________. In Memoriam. Dr. Louis W. Tordella, 1911-1996. The Education of a Deputy Director by David A. Hatch. 8 pp.

____________________. The NSA Cryptologic History Program. A Guide to Programs and Services. 4 pp.

____________________. L5 Facilities Management.A Look Inside.  July 1995, 8 pp.

____________________. Natioanl Cryptologic Museum Master-Class Lecture Series descriptive folder. 1999, 6 pp.

____________________. National Cryptologic Museum Foundation. Memborship folder. 6 pp.

____________________. The Cipher Disk. Descriptive folder.

National Security Agency. Influence of U.S. Cryptologic Organizations on the Digital Computer Industry. May 1977, 36 pp.

National Security Agency. Statement of Lt. General Lew Allen, Jr., Director NSA. October 29, 1975.

National Security Agency. Armed Forces Management, Nov. 1962, 103-104.

National Communications and Information Administration. Impact Evaluation of Selected National Policy Alternatives on Private Sector Research in Cryptography For Telecommunications Protection. Executive Summary and Overview. CRC Systems Inc., 1981, 143 pp.

National Consumers Union Codebook. Prospect Heights, IL: National Consumers Union, 1971, 48 pp.

National Intellectual Property Law Institute. International Cryptography Institute 1996(ici-96). Washington, DC: 1996, 183 pp.

National Security Agency. COMINT Report (Declassified 1998) Fort Meade, MD: National Security Agency, 1963.

_________________________. Fifth VENONA Release,Vol.1-Vol.7. Fort Meade, MD: NSA, 1996, Vol.1-239 pp.,Vol.2, 356 pp., Vol.3,330 pp., Vol. 4 262 pp., Vo. 5 228 pp., Vol. 6 299 pp., Vol. 7, 452 pp.

Navarre, H. Le Service De Renseignements 1871-1944. Paris: Plon, 1978, 351 pp.

Nechvatel, James. Public-Key Cryptography, Computer Security. Washington, DC: USGPO, 1991, 162 pp.

Neilson, Keith & B.J.C. McKercher, eds. Go Spy the Land: Military Intelligence in History. Westport, CT: Praeger Publishers, 1992, 208 pp.

Nelson, Nigil. Codes. NY: Thomson Learning, 1994, 32 pp.

Nesbit, W. The Code War. American Way, April 1982, pp. 110-111, 113-116, 118.

net. Genesis. Build a World Wide Web Commerce Center: Plan, Program & Manage Internet Commerce for your Company. NY: John Wiley & Sons, inc., 1996, 412 pp.

Neville, Katherine. The Eight. NY: Ballantine Books, 1988, 550 pp.

Neville, Katherine. The Magic Circle. NY: Ballantine Books, 1998, 554 pp.

New Post Filled In Intelligence. New York Times, Nov. 5, 1971, p. 15.

New Research on the Voynich Manuscript. Proceedings of a Seminar. Nov. 30, 1976, Washington, DC, 75 pp.

New Primer of Puzzledom. The National Puzzlers League, 1968, 12 pp.

New Crypto Items Mean Bigger Maintenance Problems. Tec Yac, June 15, 1059, pp. 31-34.

Newbold, W.R. The Cipher of Roger Bacon. Philadelphia: University of Pennsylvania Press, 1928, 224 pp.

Newby, Peter. Pears Advanced Word-Puzzler's Dictionary. London: Pelham Books, 1987, 750 pp.

Newby, Peter. Pears Word Games. London: Pelham Books, 1990, 265 pp.

Newby, Peter. The Mammouth Book of Astounding Word Games. NY: Carroll & Graf Pub., Inc., 1996, 463 pp.

Newman, Bernard. The World of Espionage. NY: The British Book Centre. 1963, 254 pp.

Newman, Bernard. German Secret Service at Work. NY: Robert M. McBride & Co., 1940, 264 pp.

Newman, E.L. Cryptanalysis. A New Horizon. 1960, 11 pp.

Newman, E.L. Language Statistics and Associativity: Their Impact on Digital Computers. Jan. 28, 1958, 40 pp. RCA.

Newman, E.L. Cryptanalysis. March 4, 1959, 21 pp. RCA.

Newsletters. New York Cipher Society and Los Angeles Society for Cryptanalysis, 1959-1964.

Newton, David E. Encyclopedia of Cryptology. Santa Barbara, CA: ABC-CLIO, 1997, 330 pp.

Nicholl, Charles. The Reckoning: The Murder of Christopher Marlowe. NY: Harcourt Brace & Co., 1992, 413 pp.

Nichols, Randell K. ICSA Guide to Cryptography. NY: McGraw-Hill, 1998, 838 pp. Plus CD-ROM.

Nichols, Randell K. Classical Cryptography Course, Vol. I. Laguna Hills, CA: Aegean Park Press, 1996, 301 pp.

Nichols, Randell K. Classical Cryptography Course, Vol. II. Laguna Hills, CA: Aegean Park Press, 1996, 489 pp.

Nichols, Randall K. & Pamos C. Lekkas. Wireless Security: Models, Threats & Solutions. NY: McGraw-Hill, 2002, 657 pp.

Nichols, Randall K., Ryan, Daniel J. & Julie J.C.H. Ryan. Defending Your Digital Assets Against Hackers, Crackers, Spies & Thieves. NY: RSA Press/McGraw-Hill, 2000, 855 pp.

Nicholson, D.L. Spread Spectrum Signal Design: LPE and AJ Systems. Rochville, MD: Computer Science Press, 1988, 291 pp.

Nickell, Joseph. Uncovered -- The Fabulous Silver Mines of Swift and Filson. Louisville, KY: The Filson Club History Quarterly, Vol. 54, No. 4 (Oct. 1980) 325-345.

Nickell, Joe. Pen, Ink, & Evidence: A Study of Writing and Writing Materials for the Penman, Collector, and Document Detective. Lexington, KY: The University Press of Kentucky, 1990, 228 pp.

Nickels, Hamilton. Codemaster: Secrets of Making and Breaking Codes. Boulder, CO: Paladin Press, 1990, 136 pp.
 

Nickels, Hamilton. Secrets of Making and Breaking Codes. NY:
Barnes & Boble, 1998 reprint, 136 pp.

Nilsson, L.A. Krypto. Stockholm: Aldusserien, 1970, 139 pp.

Noccache, David ed. Topics in Cryptology – CT-RSA 2001. NY: Springer-Verlag, 2001, 471 pp.

No Place to Hide. Newsweek, Sept. 8, 1075, pp. 19-21.

Nolan, Frederick. Red Center. NY: St. Martin's Press, 1987, 295 pp.

Nolte, William. Publisher, Cryptolog Vol. XXII, No. 1, Spring 1996. Issue devoted to Louis W. Tordella and the Making of NSA. Fort Meade, MD: NSA, 1966, 27 pp.
 

Norman, Bruce. Secret Warfare. England: David & Charles, 1973, 187 pp.

Norman, Bruce. The ADFGX Men. London: The Sunday Times Magazine, Aug. 11. 1974, pp. 8-9, 11, 13, 15.

Norman, James. Ancestral Voices: Decoding Ancient Languages. NY: Barnes and Noble Books, 1992 (reprint of 1975 edition), 242 pp.

Norman, Bruce. Secret Warfare: The Battle of Codes and Cyphers. NY: Sterling Pub. Co., 1989, 187 pp.

Normot, Tod. The Will. A Modern Day Treasure Hunt. Riverdale, NJ: Tricore Assoc., 1981, 60 pp.

Norvill, Roy. The Golden Understanding. Bath, England: Ashgrove Press, Ltd., 1989, 189 pp.

Norvill, Roy.  The Language of the Gods.  Bath, England: Ashgrove Press Ltd., 1987, 185 pp.

Norvill, Roy.  Hermes Unveiled.  Bath, England: Ashgrove Press Ltd., 1986, 276 pp.

Notes On Communications Security. Prepared by Communications Divison Office of Chief of Naval Operations. USGPO, 1935, 46 pp.

Notz, W.A. & J.L. Smith. An Experimental Application of Cryptography to a Remotely Accessed Data System. IBM Research Report RC 3508, 1971, 36 pp.

Nourse, Lt. Emory. Special Report on Three-Letter Trench Code. Oct. 10, 1918, 2 pp.

NSA And The Community. Speech to Laurel Lions by NSA P.I.O., 9 pp. n.d.

Nyberg, Ciphering. Neue Zürchur Zeitung, No. 586, Dec. 17, 1973, pp. 1-7.

Nyberg, Kaisa. Advances in Cryptology – Eurocrypt ’98. NY: Springer-Verlag, 1998, 608 pp.

Nye, J.M. User's Guide. Voice and Data Communications Protection Equipment. U.S. Dept. of Commerce. NTIA, 1980, 154 pp.

Nylund, Eric S. Signal to Voice. NY: Avon Books, 1998, 371 pp.

Oaks, Scott. Java Security. Sebastopol, CA: O’Reilly &Assoc., 1998, 456 pp.

O’Brien, Eileen and Diana Riddell. The Usborne Book of Secret Codes. Tulsa, OK: EDC Publishing, 1997, 32 pp.

Oda, James. Secret Embedded in Magic Cables, The Story of a 100 year old Japanese Communist leader who served Japan, KGB and CIA. NP: 1993, 279 pp.

O'Donnell, M. & J. L. Cooper. From Codes to Captains. NY: Harper & Row. 1963, 383 pp.

Ohaver, M.E. Solving Cipher Secrets. 3o original pages of nine columns in the 1920’s /1930’s.

Ohta, Kazuo and Dangyi Pei, eds. Advances in Cryptology – Crypto ’98. NY: Springer-Verlag, 1998, 436 pp.

Okamoto, Tatsuaki, ed. Advances in Crytology – ASIACRYPT 2000. NY: Springer-Verlag, 2000, 630 pp.

O'Keefe, Bernard J. Trapdoor. Boston: Houghton Mifflin Co., 1988, 324 pp.

O'Toole, G.J.A. The Encyclopedia of American Intelligence and Espionage. NY: Facts on File, Inc. 1988, 539 pp.

O'Toole, George J.A. Honorable Treachery: A History of U.S. Intelligence, Espionage, and Covert Action. NY: Atlantic Monthly Press, 1991, 591 pp.

Oakley, H.T. The Bifid and Trifid Ciphers of Delastelle. Unpublished paper, Nov. 1958, 18 pp.

Oakley, H.T. The Hagelin Cryptographer (Model C-38) Converter M-209. Reconstruction of the Key Elements. Unpublished paper, 8 pp.

Oakley, H.T. U.S. Patents Relating to Cryptography, April 28, 1950, 8 pp.

Oakley, H.T. An Application of Bayes' Theorem to the Solution of Transposition Ciphers. 4 pp. plus 12 tables.

Oakley, H.T. The Riverbank Publications on Cryptology. Talk before New York Cipher Society, Feb. 27, 1978.

Oakley, H.T, Equi-Frequency System. 3 pp.

Oberdorfer, D. The Playboy Sergeant Who Spied For Russia. Saturday Evening Post, March 7, 1964, pp. 40, 44, 45.

Occasional publications of The Epigraphic Society. Vol. 4, Parts 1 & 2, 1977.

Odlyzko, A.M., ed. Advances in Cryptology -- CRYPTO '86 Proceedings. NY: Springer-Verlag New York, 1987, 488 pp.

Offer New Five-Band Voice Scrambler Unit. Communications News, p. 6.

Officials Silent on Spy Report. Newsweek, July 17, 1972, p. 14.

Ohaver, M.E. Solving Cipher Secrets. Columns from Detective Fiction Weekly. Xerox.

Ohaver, M.E. Solving Cipher Secrets. Extracted from Flynn's Detective Fiction Weekly, April 23, 1927, 9 pp.

Ohaver, M.E. Cryptography: The Gronsfeld Cipher. 11 pp. n.d.
1345. Ohaver, M.E. Solving Cipher Secrets. Laguna Hills, CA: Aegean Park Press, 1983, 153 pp.

Ohaver, M.E. Solving Cipher Secrets. Columns in Flynn's Detective Weekly, December 13, 1924 August 11, 1928. (Xerox)

Ohaver, M.E. Cryptogram Solving. Columbus, OH: Stoneman Press, 1933, 32 pp.

Okins, Elliott E. To Spy Or Not To Spy. Chula Vista, CA: Pateo Pub. Co., 1985, 199 pp.

Oliver, Martin. Agent Arthur's Desert Challenge. Tulsa, OK: EDC Publishing, 1994, 48 pp.

Olivér, Svékus. Titkosírások. Budapest: Móra Ferenc Könyvkiadó, 1989, 153 pp.
 

Oliver, Captain F.L. Two Code Messages. U.S. Navl Institute
Proceedings, Jan. 1938, pp. 16-19. Xerox.

Operational History of Japanese Naval Communications, December 1941-August 1945. Laguna Hills, CA: Aegean Park Press, 1985, 407 pp.

Oppliger, Rolf. Internet and Intranet Security. Norwood, MA: Artech House Pub., 1998, 348 pp.

Orceyre, M.J. & R.H. Courtney Jr. Computer Science & Technology: Considerations in the Selection of Security Measures for Automatic Sata Processing Systems. Washington: USGPO, Dept. of Commerce, NBS, 1978, 33 pp.

Ostby, E. The Code That Can't Be Cracked. ROM Magazine, Jan. 1978, pp. 30-35.

O’Toole, George J.A. Honorable Treachery: A History of U.S. Intelligence, Espionage, and Covert Action. NY: Atlnatic Monthly Press, 1991, 591 pp.

___________________. The Encyclopedia of American Intelligence and Espionage: From the Revolutionary War to the President.NY: Facts On File, Inc., 1988, 539 pp.

Owen, David. Hidden Secrets: A Complete History of Espionage and the Technology Used to Support It. Toronto, Canada: Firefly Books, 2002, 224 pp.

Packard, Frank L. The Wire Devils. Garden City, NY: Doubleday, Doran & Co., 1931, 318 pp.

Packard, Frank L. The Big Shot. NY: Doubleday, Doran & Co., Inc., 1931, 286 pp.

Packard, Capt. Wyman H. USN (Ret.) A Century of U.S. Naval Intelligence. Washington, DC: USGPO, 1996, 498 pp.

Packard, Frank L. Doors of the Night. NY: Doubleday, Doran & Co., Inc., 1931, 297 pp.

Paddock, I.J. Cipher Codes Simplified. Letter to editor, Scientific American, Sept. 25, 1915, p. 271.

Paddock, Paul. The Magic Lure of Ciphers. Popular Mechanics, Oct. 1926, pp. 564-568.

Page, R.I. Runes. Berkeley, CA: University of California Press, 1987, 64 pp.

Pagés, Jacinto Ventura. Comunicaciones Secretas. Buenos Aires, Argentina: Editorial Molino Argentina, 1947, 95 pp.

Paillole, P. Notre Espions Chez Hitler. Paris: Robert Laffont, 1985, 285 pp.

Paillole, P. Services Speciaux (1935-1945). Paris: Éditions Robert Laffont, 1975, 565 pp.

Painvin, Georges J. Exposé des travaux de Cryptologie effectués de 1914 à 1918. Paris: 69 pp. plus documents. Inscribed by author.

Palatino, Giovambattista. On Cryptography. Translated from the Italian (1540) and privately printed by A.S. Osley, The Glade Press at Wormley, England, 1970, 20 pp.

Pale, Erkki. Totuus Stella Polariksesta. Finland: 1994, 257 pp.

Pale, Erkki. Suomen Radiotiedustelu, 1927-1944. Helsinki, Hakapaino Oy, 1998, 261 pp.

Pallas, Norvin. Code Games. NY: Sterling Pub. Co., 1973, 111 pp.

Pallas, Norvin. Code Games. London: Pan Books Ltd., 1973, 111 pp.

Pallas, N. A Little Matter of Espionage. Recreational Mathematics, Vol. 6, Dec. 1961, pp. 56-58.

Pallas, N. The Sun Dial. Recreational Mathematics, Vol. 2, April 1961, pp. 34-36.

Palme, Jacob. Software Security. Datamation, Jan. 1974, pp. 51-55.

Palmer, Kim. The Dream. Topsfield, MA: Salem House, 1988, 47 pp.

Palmer, Raymond. The Making of a Spy.NY: Crescent Books, 1977, 144 pp.

Paonessa, D. Code Detective. Coronet, Aug. 1954, pp. 35-37.

Parish, Peggy. Key To The Treasure. NY: Collier Books, 1971, 117 pp.

Parker, R.D. Recollections Concerning the Birth of One-Time Tape and Printing-Telegraph Machine Cryptography. NSA Technical Journal, Nov. 1956, pp. 103-114.

Parker, Frederick D. Pearl Harbor Revisited: United States Navy Communications Intelligence, 1924-1941. Fort George G. Meade, MD: Center for Cryptologic History, NSA, 1994, 98 pp.

Parker, Frederick D. A Priceless Advantage: U.S. Navy Communications Intelligence and the Battle of Coral Sea, Midway, and the Aleutians. Fort Meade, MD: National Security Agency, 1993, 88 pp.

Parkinson, Richard. Cracking Codes: The Rosetta Stone and Decipherment. Berkeley, CA: University of California Press, 1999, 208 pp.

Parmentier, Th. Les dépâches chiffrées indéchiffrables. Revue Scientifique, 40 (1887:2), 796.

Parpola, Asko. Deciphering the Indus Script. NY: Cambridge University Press, 1994, 374 pp.

Parrish, Thomas. The Ultra Americans: The U.S. Role in Breaking the Nazi Codes. Briarcliff Manor, NY: Stein & Day, 1986, 338 pp.

Pattern & Nonpattern Words of 7 & 8 Letters. Norman, OK: Raja Press, 1980.

Patterson, Wayne. Mathematical Cryptology for Computer Scientists and Mathematicians. Totowa, NJ: Rowman & Littlefield, 1987, 312 pp.

Patti, Tony. Cryptosystems Journal, Vol. 1 No.1, Burke, VA: May 1998, 32 pp.

___________. Cryptosystems Journal, Vol. 1 No. 2, Burke, VA: Aug. 1998, 40 pp.

___________. Cryptosystems Journal, Vol. 1 No. 3, Burke, VA: Dec, 1988, 60 pp.

___________. Cryptosystems Journal, Vol. 4. Holland, PA: Tony Patti, 1997, 281 pp. plus 3 diskettes.

___________. Cryptosystems Journal, Vol. 5. Holland, PA: Tony Patti, 1999, 400 pp.

Paul, Doris A. The Navaho Talkers. Pittsburgh: Dorrance Pub. Co. Inc., 1973 (1990 edition), 170 pp.

Payne, Aubrey H. On Measuring the Value of Information -- With Imlications for Communications Systems. Washington: Center for Naval Analyses, 1965, 23 pp.

Payne, Diana. My Secret Live with Ultra. After the Battle, No. 37.1982, pp.9-16. (Also see pp. 1-8)

Peake, Hayden B. The Reader's Guide to Intelligence Periodicals. Washington, DC: NIBC Press, 1992, 250 pp.

Peake, Hayden B. and Samuel Halpern, eds. In the Name of Intelligence: Essays in Honor of Walter Pforzheimer. Washington: NIBC Press, 1994, 620 pp.

Pearl Harbor. Magic Was The Word for It. Time. Dec. 17, 1945, pp. 20-22.

Pearson, Susan. The Spy Code Caper. NY: Simon & Schuster Books for Young Readers, 1991, 73 pp.

Pearson, David. KAL 007: The Cover-Up. NY: Summit Books, 1987, 462 pp.

Pearson, Ryne D. Simple Simon. NY: William Morrow & Co., Inc., 1996, 256 pp.

Peck, Lyman C. Secret Codes, Remainder Arithmatic, and Matrices. Washington: National Council of Teachers of Mathematics, 1961, 54 pp.

Peckham, Howard H. British Secret Writing in the Revolution. Ann Arbor, MI: Michigan Alumnus Quarterly Review, Vol. XLIV, No. 15, Feb. 26, 1938, pp. 126-131.

Peignot, Jerome. Du Chiffre. Paris, France: Jacques Damase editeur, 1989, 224 pp.

Pelissier, L.G. La Cryptographie de Simon Cattaneo-Note sur quelques documents cryptographiques Italians. Memories de la Societe Nationale des Antiquaires de la France, Paris, 1895, Vol. LVI, pp. 161-192. Xerox.

Penn, Gareth. Times 17. San Rafael, CA: Foxglove Press, 1987, 380 pp.

Penn, Gareth. The Second Power: A Mathematical Analysis of the Letters Attributed to the Zodiac Murders and Supplement to TIMES 17. Stinson Beach, CA: Gareth Penn, 1999, 60 pp.

Pennycock, A. Codes and Ciphers. NY: David McKay Co., 1980, 152 pp.

Pennypacker, M. General Washington's Spies On Long Island and In New York, Volume II. Garden City, NY: Country Life Press Corp., 1948, 42+ pp.

Pennypacker, M. General Washington's Spies On Long Island and In New York. Brooklyn: Long Island Historical Society, 1939, 302 pp.

Pennypacker, Morton. General Washington's Spies On Long Island and in New York. vol. I and Vol. II. Brooklyn, NY: Long Island Historical Society, 1939, 302 pp. (vol. I).

____________________ East Hampton, NY: East Hampton Free Library, 1948, 42 pp. (vol. II).

Perec, George. Life, A User's Manual. Boston: D.R. Godine Pub., Inc., 1987, 581 pp.

Perrault, G. The Red Orchestra. NY: Simon & Schuster, 1967, 512 pp.

Persico, Joseph E. Piercing The Reich. NY: The Viking Press, 1979, 376 pp.

_________________. Roosevelt’s Secret War: FDR and World War II Espionage. NY: Random House, Inc., 2001, 564 pp.

Pesic, Peter. Labyrinth: A Search for the Hidden Meaning of Science. Cambridge, MA: The MIT Press, 2000, 186 pp.

Peters, Bernard. HTI: An Order To Improve Multiprocessor Performance. Computer Design, Feb. 1969, pp. 58-60.

Peters, Elizabeth. The Dead Sea Cipher. NY: Dell Pub. Co., 1970, 219 pp.

Petersen, Neal H. American Intelligence, 1775-1990: A Bibliographical Guide. Claremont, CA Regina Books, 1992, 406 pp.

Peterson, John. How To Write Codes and Send Secret Messages. NT: Scholastic Book Services, 1966, 64 pp.

Peterson, Ivars. The Mathematical Tourist. NY: W.H. Freeman & Co., 1988, 240 pp.

Peterson, I. Keeping Secrets Secret. Science News, Oct. 17, 1981, PP. 253, 254.

Peterson, G.A.J. & M.M. Clintock. A Guide to Codes and Signals. Racine, WI: Whitman Pub. Co., 1942, 62 pp.

Peterson, G.E. Applications of Information Theory To Research In Experimental Phonetics For Communication Between Two Individuals. Bell Telephone System Monograph 2135, 1954, 14 pp.+. RCA

Peterson, Ivars. Islands of Truth: A Mathematical Mystery Cruise. NY: W.H. Freeman and Co., 1990, 325 pp.

Pether, John. Black Propaganda. Bletchley Park, England: Bletchley Park Trust, Report No. 14, Dec. 1998, 32 pp.

_____________. The Post Office at War and Fenny Stratford Repeater Station. Blectchley Park, England: Bletchley Park Trust, Rpt. No. 12,Dec. 1998, 36 pp.

Pfaffenberger, Bryan. Protect Your Privacy on the Internet: Privacy Defense Tools and Techniques You Can Use Right Now. NY: John Wiley & Sons, 1997, 326 pp. plus CD-ROM.

Pfitzmann, Birgit. Digital Signature Schemes: General Framework and Fail-Stop Signatures. NY: Springer-Verlag, Inc., 1996, 396 pp.

__________________,Ed. Advances in Cryptology – Eurocrypt 2001. NY: Springer-Verlag, 2001, 544 pp.

Pfleeger, Charles P. Security in Computing. NY: John Wiley & Sons, 1997, 574 pp.

Pfleeger, Charles P. Security in Computing.  Englewood Cliffs, NJ: Prentice Hall, 1989, 538 pp.

Pforzheimer, Walter L., Chief, Legislative Liaison Branch. Memorandum for the Director of Central Intelligence. Subject: Intelligence at Pearl Harbor. August 22, 1946, 26 pp.

Pforzheimer, W. Code Breaking -- The Ultra Story. Marine Corps Gazette, 64: 76-80 (July 1980)

Pforzheimer, Walter, ed. Bibliography of Intelligence Literature. Washington, DC: Defense Intelligence College, Eighth Edition, 1985, 90 pp.

Philipp, Lothar. Die Geheimschrift. Hildesheim, Germany: Gebr. Gerstenberg-Verlag, 1950, 40 pp.

Phillips, A.H. Cipher for Secrets. The Technology Review, June 1940, pp. 321-322, 336, 338, 340, 342.

Phillips, D.A. Careers in Secret Operations: How to be a Federal Intellligence Officer. Frederick, MD: University Pub. of America, Inc., 1984, 93 pp.

Phillips, H., S.T. Shovelton & G.S. Marshall. Caliban's Problem Book. NY: Dover Pub., 1961, 180 pp.

Phillips, V.J. & J.K. Watkins. Speech Scrambling by the Matrixing of Amplitude Samples. The Radio and Electronic Engineer, Vol. 43, No. 8, Aug. 1973, pp. 459-469.

The Phoenician: The Newsletter of the Phoenix Society. Autumn ’87,24 pp., Winter ‘87, 24 pp., Summer ’90, 21 pp., Winter ’91-’92, 22 pp., Spring ’93, 21 pp., Summer ’94, 21 pp., Winter ’92-’96, 21 pp.

Phoenix (William Sutton). Xenocrypt Handbook. Meredith, NH American Cryptogram Association, 1996, 96 pp.

Pichler, Frenz. Advances in Cryptology -- Eurocrypt '85. NY: Springer Verlag New York, 1986, 280 pp.

Pickering, Fran. Super Secret Code Book. NY: Sterling Pub. Co., 1995, 64 pp.

Pickering, Fran. Incredible Code Book. Wolverhampton, England: Mensa Pub. Ltd., 1991, 64 pp.

Pickover, Clifford A. Computers and the Imagination: Visual Adventures Beyond the Edge. NY: St. Martin;s Press, 1991, 424 pp.

Pickover, Clifford. Cryptorunes: Codes and Secret Writing. Rohnert Park, CA: Pomegranate Communications, Inc., 2000, 100 pp.

Piekalkiewicz, Janusz. Rommel and the Secret War, 1941-1943: Secret Intelligence in the North African Campaign. West Chester, PA: Schiffer Publishing, Ltd., 1992, 239 pp.

_____________________. World History of Espionage: Agents, Systems, Operations. Trans. By W.M. Henhoeffer & G.L. Liebenau. Washington, DC Nat. Intelligence Book Center, 1998, 865 pp.

Pieprzyk, Josef. Advances in Cryptology - ASIACRYPT '95. NY: Springer-Verlag, 1995, 430 pp.

Pierce, C.C. Cifer Communication. Ventura, CA: 1971, 25 pp. plus appendix.

Pierce, J.R. Symbols, Signals and Noise. NY: Harper & Row, 1961, 305 pp.

Pierce, C.C. Secret and Secure: Privacy, Cryptography, and Secure Communications. Ventura, CA: 1977, 84 pp.

Pierce C.C. Privacy Transformation Matrixes. Supplement A --Secret and Secure. Ventura, CA: 1978, 8 pp.

Pierce, C.C. Cryptoprivacy. Ventura, CA: 1986, 8 pp.

Piercy, Marge. Gone to Soldiers. NY: Ballantine Books, 1987, 773 pp.

Pietrasanats, Silvestro. Symboli Heroica. Amsterdam, 1682. Selected Xerox pages having cryptologic implication.

Pincher, C. Inside Story. Briarcliff Manor, NY: Stein & Day, 1979, 400 pp.

Pincher, Chapman. Too Secret, Too Long. NY: St. Martin's Press, 1984, 640 pp. (paperback)

Pingaud, A. Les dessous de la Grande Guerre; la guerre des chiffres. Paris: Revue des Deux Mondes, June 15, 1935, S. 8, V. 27, pp. 897-909.

Pinto, Oreste. Spy Catcher. NY: Harper & Bros., 1952, 213 pp.

Piper, Fred & Sean Murphy. Cryptography: A Very Short Introduction. NY: Oxford University Press, 2002, 142 pp.

Pipkin, Donald L. Halting the Hacker: A Practical Guide to Computer Security. Upper Saddle River, NJ: Prentice Hall PTR, 1997, 193 pp. plus CD-ROM

Platt, Richard. Spy. NY: A.A. Knopf, Inc., 1996, 60 pp.

Pleasants, Jr., Henry. John Andre -- Spy Extraordinary. Historical Publications of the Society of Colonial Wars in the Commonwealth of Pennsylvania, Vol. V. No. 2, 1939, 62 pp.

Plum William R. The Military Telegraph during the Civil War in the United States. NY: Arno Press reprint of 1882 edition, 1974, Vol. I, 377 pp. and Vol. II, 390 pp. in one volume.

Poe, Edgar Allan. Complete Stories of Edgar Allan Poe. Garden City, NY: Doubleday & Co., Inc., 1966, 736 pp.

Poe, Edgar Allan. The Gold Bug and Other Stories. Cleveland: The World Syndicate Pub. Co., N.D., 216 pp.

Pogue, F. The Pearl Harbor Blunders. Look, Dec. 14, 1975, 35-39.

Pogue, David. Hard Drive. NY: Diamond Books, 1993, 288 pp.

Poillon, Richard. A Problem in Cryptography. Letter to editor, American Army and Navy Journal, Oct. 21, 1916, p. 231.

Police Electronics - Secure Communications. Electronics, Aug. 17, 1970, pp. 39-40.

Pollux. Letters and articles from ALL DEFIED, J.W. Delafield, 1947 in binder.

Polmar, Norman, Mark Warren & Eric Wertheim. Dictionary of Military Abbreviations. Annapolis, MD: Naval Institute Press, 1944, 307 pp.

Polmar, Norman & Thomas B. Allen. Spy Book: The Encyclopedia of Espionage. NY: Random House, 1997, 633 pp.

_________________________. “The Crypto Bandits” Arlington, VA: Air Force magazine, June 1989, 88-92.

Pomerance, C., ed. Advances in Cryptology: Proceedings of CRYPTO '87. NY: Springer-Verlag New York, 1988, 463 pp.

Pomey. Systemes de cryptographie. Revue Scientifique, 41(1888:1), 380.

Poolman, Kenneth. The Winning Edge: Naval Technology in Action, 1939-1945. Annapolis, MD: Naval Institute Press, 1997, 256 pp.

Pope, Maurice. The Story of Archaeological Decipherment. NY: Charles Scribner's Sons, 1975, 216 pp.

Popov, Dusko. Spy Counter-Spy. Greenwich, CT: Fawcett Crest, 1975, 272 pp.

Popp, J.D. Vigenère Period Determination Through Frequency Distribution Analysis. June 8, 1966, 6 pp.

Porch, Douglas. The French Secret Services: From the Dreyfus Affair to the Gulf War. NY: Farrar, Straus & Geroux, 1995, 623 pp.

Porta, Ioan. Battista. De Furtivis Literarum Notis, vulgo de ziferis Libri IIII, Neapoli: Apud Ioa. Mariam Scotum, 1563, 228 pp.Calf.gilt imprinted title and date on spine

____________________. On Secret Notations for Letters Commonly Called Ciphers in Four Books.1563. Trans.Keith Preston.1916, 212 pp. Bound in boards.

Possehl, Gregory L. Indus Age: The Writing System. Philadelphia, PA: University of Pennsylvania Press, 1977, 244 pp.

Post, Melville D. The Man Hunters. NY: J.H. Sears & Co., 1926, 348 pp.

Post, Melville D. German War Ciphers. Everybody's, June 1918, pp. 28-34.

Potter, E.B. The Crypt of the Cryptanalysts. Proceedings of the Naval Institute, Aug. 1983, 52-56.

Potter, Lois. Secret Rites and Secret Writing: Royalist Literature, 1641-1660. NY: Cambridge University Press, 1989, 242 pp.

Poundstone, William. Labyrinths of Reason. NY: Anchor Press/Doubleday, 1988, 274 pp.

Poundstone, William. Biggest Secrets. NY: William Morrow & Co., Inc., 1993, 272 pp.

Powe, Marc B. American Military Intelligence Comes of Age: A Sketch of a Man and His Times. Military Review, Dec. 1975, pp. 17-30.

Powe, M.B. & E.E. Wilson. The Evolution of American Military Intelligence. Supplement Reading, May 1973. Prepared for use by the US Army Intelligence Center and School, Ft. Huachuca, AZ, 148 pp.

Powell, Alan. War by Stealth: Australia and the Allied Intelligence Bureau. Victoria, Australia: Melbourne University Press, 1996, 421 pp.

Powell, R.E. Introduction to the Hill Cipher. Berkeley, CA: April 1950, 14 pp. + nomographs. RCA

Powell, J.A. The Greatest Work of Sir Francis Bacon. Riverbank Publications, 1916, 14 pp. + plates.

Prados, John. Combined Fleet Decoded: The Secret History of American Intelligence and the Japanese Navy in World War II. NY: Random House, 1995, 832 pp.

Prange, G.W. Miracle at Midway. McGraw-Hill, 1982, 469 pp.

Prange, G.W. Pearl Harbor: The Verdict of History. NY: McGraw-Hill, 1985, 699 pp.

Prange, Gordon. At Dawn We Slept. NY: McGraw-Hill, 1981, 873 pp.

Prange, G.W., Goldstein, D.M. & K.V. Dillon. Dec. 7, 1941: The Day the Japanese Attacked Pearl Harbor. NY: McGraw-Hill, 1988, 493 pp.

Pratt, F. The Art of Solving Secret Ciphers, And The Digital Computer. Computers and Automation, April 1953, pp. 16.

Pratt, F. Histoire de la Cryptographie. Paris: Payot, 1940, 296 pp.

Pratt, F. Secret and Urgent. Indianapolis: Bobbs-Merrill, 1939, 282 pp.

Pratt, F. A Plea for Ciphers. U.S. Naval Institute Proceedings, May 1933, pp. 692-696.

Pratt, F. Secret and Urgent. Garden City, NY: Blue Ribbon Books, 1942, 282 pp.

Praun, V.A. Über Klartext und Geheimschriften. Wehr-Wissenschaftliche, July 1968, pp. 399-416.

Preiss, Byran. The Secret: A Treasure Hunt. Bantam Books, 1982, 224 pp.

Prendergast, Curtis. Ne Plus Ultra. Review of The Ultra Secret. Time, Dec. 9, 1974, pp. 103-104.

Preneel, Bart, ed. Advances in Cryptology – Eurocrypt 2000, May 2000 Proceedings. NY: Springer-Verlag, 2000, 608 pp.

Preneel, Bart, ed. Topic in Crtyptology – CT-RSA 2002. Springer-Verlag, 2002, 309 pp.

Preneel, Bart, Govaerts, R., and Joos Vandewalle, eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. NY: Springer-Verlag, 1993, 274 pp.

Preneel, Bart and Vincent Rijmen. State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography. NY: Springer-Verlag, 1998, 398 pp.

Preston, Lydia. Computer Security. Alexandria, VA: Time-Life Books, 1986, 128 pp.

Price, W.H. I Was A Top-Secret Human Being During World War 2. National Inquirer, Feb. 4, 1973.

Price, W.L. A Further Annotated Biblography of Cryptography as Applied to Data Protection in Computing. England: National Physical Laboratory, March 1979, 7 pp.

Principles of Solution of Military Field Codes Used by the German Army in 1917. Technical paper of the SIS. Washington: USGPO, 1935, 28 pp.

Pritchard, J.A.T. Encryption is the Key to Computer Privacy. Reprint og article in New Scientist, Feb. 3, 1977.

Privacy - Secure Com Line Shown. Electronic News, Sept. 13, 1971, p. 21.

Private Code. London: Morgan Lyons & Co., 9 pp.

Proceedings of Communications & Computer Security (COMSEC & COMPUSEC): Requirements, Opprtunities and Issues.Washington, DC: Electronic Industries Association, 1987, 187 pp.

Proceedings of the 1986 IEEE Symposium on Security and Privacy. CA: IEEE Computer Society, 1986, 241 pp.

Proceedings of the Fourth Seminar on the DOD Computer Security Initiative. National Bureau of Standards, Aug. 10-12, 1981.

Proceedings of the [First] Beale Cipher Symposium 1972. The Beale Cypher Study Committee. Published by The Beale Cypher Association, 1979, 104 pp.

Proceedings of the Second Beale Cypher Symposium. Beale Cypher Assoc. 1979, 103 pp.

Proceedings of the Fourth Beale Cyphwer Symposium, 1986. Warrington, PA: Beale Cypher Assoc., 1987, 137 pp.

Proceedings of the Third Beale Cypher Symposium. Medfield, MA: Beale Cypher Assoc., 1981, 107 pp.

Proposed Federal Information Processing Data Encryption Standard. Federal Register, Aug. 1, 1975, 12 pp. + app.

Protecting Data Communications Networks with Encryption Systems. Auerbach Publishers, 1976, 14 pp.

Prozini, Bill & M.H. Greenberg, eds. A Treasury of 35 Great Espionage Stories. NY: Avenel Books, 1988, 580 pp.

Pugh, Emerson W. Building IBM: Shaping an Industry and Its Technology. Cambridge, MA: The MIT Press, 1995, 405 pp.

Purdy, G.B. A High Security Log-in Procedure. Communications of the ACM, Aug 1974, pp. 442-445.

Pursglove, S.D. Here's How You Can Make and Break Secret Messages. Science Experimenter, pp. 127-130.

Pursglove, S.D. Spy Secrets from U.S. Code Rooms. Science and Mechanics, Sept. 1962, pp. 48-51, 138.

Putney, D.T. ULTRA and the Army Air Forces in WW II. Washington: USGPO, 1987, 197 pp.

Qing,Sikam,Okamoto,Tatsuski and Jianying Zhou, Eds.Information and Communications Security. NY: Springer-Verlag, 2001, 504 pp.

Quaritch, Bernard.Catalog 1300.Cryptography. A Collection of Books and Manuscripts. Offered for Sale. Introduction by David Kahn. London: Bernard Quaritch Ltd. 2002, 62 pp.

Questions and Answers prepared by Japanese Officials when the American Black Chamber Ws Published. 19 pp.

Queux, William Le. Cipher Six A Mystery. London: Hoder and Stoughton Ltd., 1919, 253 pp.

Quirk, John. The Central Intelligence Agency, A Photographic History. Guilford, CY: Foreign Intelligence Press, 1986, 256 pp.

Quisquater, J.J. & J. Vandewalle, eds. Advances in Cryptology--EUROCRYPT '89. Springer-Verlag New York, Inc., 1990, 710 pp.

Quittner, Joshua and Michelle Slatalla. Flame Wars: a cyberthriller. NY: William Morrow & Co., Inc., 1997, 291 pp.

R.A.F. Man's Book Describes Breaking of the Magic Codes. New York Times, Oct. 25, 1974, p. 2.

Radio and Cryptographic Security Bulletin No. 25. A Primer For Message Originators. Also #1 & #33. HQ AAF: Jan.1, 1945, 8 pp.

Radiotelegraph Convention and General Regulations between the United States and Other Powers. Washington: USGPO, 1929, 86 pp.

Raggett, R.J. Jane's Military Communications 1983. London: Jane's Pub. Co., 1983, 839 pp.

Rajagopolan, K.R. A Note on Entropy of Kannada Prose. Information and Control 8, 640-644 (1965). RCA

Randell, B. The Colossus. University of Newcastle upon Tyne, Technical Report Series No. 90, June 1976, 81 pp.

Randell, B. On Allan Turing and the Origins of Digital Computers. Edinburgh: Edinburgh University Press, Machine Intelligence 7, 1972, pp. 3-20.

Randell, Brian. The Origins of Digital Computers. NY: Springer-Verlag, 1975, 464 pp.

Randell, B. An Annotated Bibliography on the Origins of Digital Computers. Annals of the History of Computing, Vol. 1, No. 2, Oct. 1979, pp. 101-207.

Randolph. B. Cryptofun. Laguna Hills, CA: Aegean Park Press, 1981, 110 pp.

Random Enciphering Techniques. Dover Plains, NY: Goodwin Trading Co., 7 pp.

Ranson, H.H. The Intelligence Establishment. Cambridge: Howard University Press, 1970. Xerox copy of pp. XIV, 1-3, 126-133, 161, 164-165, 172, 182, 196, 214-215, 233-234, 253-254.

Rapp, Richard T. Tuscan Diplomatic Letters: A Decipherment by Computer. The Library Chronicle, Winter 1970, pp. 37-46.

Rapport, Samuel & Helen Wright, eds. Archaeology. NY: Washington Square Press, 1964, 367 pp.

RCA Offers Scrambler, Receiver. Electronic News, March 12, 1973, p. 29.

Read, Anthony & David Fisher. Colonel Z: The Secret Life of a Master of Spies. NY: Viking Penguin Books, 1985, 361 pp.

Redman, J.R. Advanced Intelligence Centers in the U.S. Navy. June 1942, 8 pp.

Reed, Edwin. Bacon vs Shakespeare. Bried for Plaintif. Boston: Joseph Knight Co., 1897, 296 pp.

Reed, I.S. Information Theory and Privacy in Data Banks. National Computer Conference, 1973, pp. 581-587.

Reed, Edwin. Bacon vs. Shakspere: Brief for Plaintif. Boston: Joseph Knight Co., 1897, 296 pp.

Reed, J.V. Fun With Cryptograms. NY: Walker & Co., 1968, 59 pp.

Reed, J.V. Fun With Codes. London: Pelham Books, 1971, 59 pp.

Reeds, J. A Monoalphabetic Method for Solving the L.S. Hill Matrix Cipher. 35 pp. Private paper.

Reeds, J. Probablility of Overlap of Keying Sequence in Superimposition. April 23, 1973, 4 pp. plus 5 pages of further clarifications. Private paper.

Reeds, J., D. Ritchie & R. Morris. The Hagelin Cipher Machine (M-209) Cryptanalysis from Ciphertext Alone. 1978, 8 pp.

Reeds, J. Possible outline of M-209 paper. Oct. 2, 1972, 48 pp. plus 4 pp. "Synopsis" dated Oct. 8, 1972.

Reeds, J. "Cracking" a Random Number Generator. Oct. 8, 1972, 6 pp. Private paper.

Reeds, James. Preliminary Description of the Cryptanalysis of the Hagelin M-209 Cipher Machine. Oct. 1970, 13 pp.

Reeds, James. Entropy Caluculations and Particular Methods of Cryptanalysis.April 10, 1973, 7 pp. + tables. Personal paper.

Reeve, Arthur B. The Poisoned Pen. NY: Harper & Brothers, 1911, 399 pp.

Regnier, M. Description et Usage Du Cadenas De Sureté. Paris, 1978, 3 pp.

Reinhold, R. Elusive Maya Glyphs Yielding to Modern Techniques. New York Times, March 28, 1973, pp. 1, 18.

Rejewski, M. The Mathematical Solution of the Enigma Ciphewr. Translated from the Polish by C. Kasparek.

Rejewski, M. An Application of the Theory of Permutations In Breaking the Enigma Cipher. Warsaw: Zastosowania Malenastyhi Applicitunis Mathematiace, pp. 541-559.

___________. How Polish Mathematicians Broke the Enigma Cipher. Annals of the History of Computing, July 1981, pp.213-234.

Relyea, H.C., ed. Striking A Balance: National Security and Scientific Freedom. Washington: AAAS, 1985, 134 pp.

Remington, F.L. Can You Read The Simple Message Below? Catholic Digest, Feb. 1964, pp. 67-72.

Remy. Réseaux D'Ombres. Paris: Editions France_Empire, 196(?), 316 pp.

Rendell, Ruth. Talking to Strange Men. NY: Pantheon Books, 1987, 280 pp.

Rendezvous. 1935 MGM film with William Powell and Rosalind Russell. Videotape, 91 minutes. Based on book by Herbert O. Yardley, The Blonde Countess.

Report of Signal Division, Supreme Headquarters, Allied Expeditionary Force in Operation "Overlord." Code and Cipher excerpts from Vols. III, IV, & V.

Reservehandverfahren Allgemein. General Reserve Hand System. Berlin: Oberkommando der Kriegsmarine, 1940, 11 pp. (Xerox).

Resnicow, H. The Crossword Code. NY: Ballantine Books, 1986, 247 pp.

Revue Historique De L'Armée. Paris: Ministère Des Armée, Feb. 1967, 232 pp.

Revue d'Histoire de la Deuxième Guerre Mondiale. Paris: Presses Universitaires de France, Jan. 1984, No. 133.

Reynard, Robert. Secret Code Breaker: Secret Message Kit. Jacksonville, FL: Smith & Daniel Marketing. 1996, 28 pp.

Reynard, Robert. Secret Code Breaker: A Cryptanalyst's Handbook. Jacksonville, FL: Smith & Daniel Marketing, 1996, 92 pp. plus diskette.

Reynard, Robert. Secret Code Breaker II: A Cryptanalyst's Handbook. Jacksonville, FL: Smith & Daniel Marketing, 1997, 120 pp. plus diskette.

________________. Secret Code Breaker III: A Cryptanalyst’s Handbook. Jacksonville, FL: Smith & Daniels Marketing, 1999, 117 pp. with 3 ½ computer disk.

Rhee, Man Young. Cryptography and Secure Communications. NY: McGraw-Hill Book Co., 1994, 504 pp.

Rhodes, John K. He Solves the Secrets of Cipher Writing. The
American Magazine, Jan. 1925, pp. 36-39, 60, 62.

Rice, Charlie. Challenge! Fun With Puzzles, Riddles, Word Games and Problems. Kansas City, MO: Hallmark Cards, Inc., 1968, 61 pp.

Richards, Mark. The War That Never Ends. Nov. 1957, pp. 29-30, 48-50.

Richelson, Jeffrey T. A Centur of Spies: Intelligence in the Twentieth Century. NY: Oxford University Press, 1995, 534 pp.

Richelson, Jeffrey T. America's Secret Eyes in Space: The U.S. Keyhole Spy Satellite Program. NY: Harper & Row, Pub., 1990, 375 pp.

Richelson, J.T. The U.S. Intelligence Community. Boston: Ballinger Pub. Co., 1985, 358 pp.

Richelson, J.T. & D. Ball. The Ties That Bind: Intelligence Cooperation Between the UKUSA Countries. Winchester, MA: Allen & Unwin, 1985, 402 pp.

Rinehart, M.R. The Red Lamp. G.H. Doran Co., 1925, 317 pp.

Rinkoff, Barbara. The Case of the Stolen Code Book. NY: Crown Pub., 1971, 40 pp.

Rios, Carol E. and Kathy R. Coker.Annual Historical Review. Headquarters United States Army Signal Center and Fort Gordon, Fort Gordon, Georgia. 1 Jan. 1985-31 Dec. 1985. Office of the Command Historian, 215 pp.

Ripley, H.A. Detectograms and Other Puzzles. NY: Scholastic Book Services, 1969, 96 pp.

Riste, Olav.The Norwegian Intelligence Service 1945-1970. London: Frank Cass Pub., 1999, 315 pp.

Ritchie, D. The Computer Pioneers. NY: Simon & Schuster, 1986, 238 pp.

Rivest, R., A. Shamir & L. Adleman. On Digital Signatures and Public-Key Cryptsystems. Cambridge, MA: MIT Laboratory for Computer Science, April 25, 1977, 10 pp.

Rivest, R.L., A. Shamir & L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, Feb. 1978, pp. 120-126.

Rivest, Ronald. Chapter 13, Cryptology, in Handbok of Theoretical Computer Science, 1988, 33 pp.

Rivest, R., A. Shamir & L. Adleman. A Methof for Obtaining Digital Signatures and Public-Key Cryptosystems. Cambridge, MA: MIT Laboratory for Computer Science, Technical Memo LCS/TM 82.

Roach, Tom. Hobbyist's Guide to COMINT Collection and Analysis. San Jose, CA: Tom Roach, 1994, 88 pp.

Roberts, R. A BASIC Program for Home Cryptography. Byte, April 1982, pp. 432-434.

Roberts, E.N. Transposition Ciphers. Games Digest, Cryptogram Column, Sept. 1938, pp. 26-39.

Robertson, J. Voice Security Standard For DoD Com/Equipment. Electronic News, May 7, 1973, p. 2.

Robertson, J. Tempest Clouds on Security. Electronic News, May 15, 1972, p. 18.

Robertson, K.G. British and American Aproaches to Intelligence. NY: St. Martin's Press, 1987, 281 pp.

Robertson, J. Spy Agency In Big IC Buy. Electronic News, April 1, 1968, p. 4.

Robertson, J. Sylvania, Collins to Build Secure Voice Prototype. Electronic News.

Robertson, J. GTE Wins $50M Mini Pact For Nat'l Security Agency. Electronic News, July 8, 1974, pp. 1, 6.

Robertson, J. Cryptic Report on NSA Rebid. Electronic News, June 4, 1973, p. 22.

Robertson, Charles. The Omega Deception. NY: Bantam Books, 1983, 360 pp.

Robertson, J. Secure Voice Fools Industry. Electronic News, July 12, 1971, p. 16.

Robertson, J. Report From AFCEA - Defense Competition Still Hot. Electronic News, June 12, 1972, p. 18.

Robertson, Jack. DoD Supplemental Asks $ for Secure Voice R&D. Electronic News, Sept. 4, 1972, p. 18.

Robertson, J. La Not-So-Faire Vite. Electronic News, Marhc 19, 1973, p. 20.

Robinson, E.E. They Called Him A Flafflopper. Signals, July-Aug. 1949, pp. 29-30.

Robinson, Andrew. The Story of Writing Alphabets, Hieroglyphs and Pictograms. NY: Thames and Hudson, 1995, 224 pp.

Robinson, Glen. The Case of the Secret Code. Nampa, ID: Pacific Press Pub. Assoc., 1995, 96 pp.

Rochfort, W.H. A Treatise Upon Arcanography. London: De La Rue & Co., 1836, 22 pp.

Rochlin, Joanne. The Case of the Backyard Treasure. NY: Scholastic, Inc., 1998, 48 pp.

Roehrig, Catherine. Fun With Hieroglyphs. NY: Viking Books & Metropolitan Museum of Art, 1990.

Rohrbach, Hans. Die Anzakl Der Zahlen Mit Vorgegebener Quersumme. Berlin: Mathematische Nachrichten, Nov./Dec., 1948, 357-364.

Rohrback, Hans. Mathematical and Mechanical Methods in Cryptography. Originally published in Fiat Review of German Science, 1948. Trans. by B. Hardie, 1963, 58 pp.

Rohrback, Hans. Modern Cryptography. Trans. by H.T. Oakley. 12 pp.

Rohwer, J. & E. Jäckel. Die Funkaufklärung und ihre Rolle im 2. Weltkrieg. Stuttgart: Motorbuch Verlag, 1979, 406 pp.

Rohwer, J. Ultra and the Battle of the Atlantic, The German View. Presented at Naval Symposium, 10/28/77. NSA publication reprint.

Rohwer, J. Radio Intelligence in the Battle of the Atlantic. University of Lund, Sweden: Lund Studies in International History 17, 85-107.

Rohwer, J. War "Ultra" Kriegsentscheidend. Marine-Rundschau, Jan. 1979, 29-47.

_________. Die Funkaufklaerung Und Ihre Rolle IM 2. Weltkrieg.Folge XIX, 25 pp.

Romerstein, Herbert and Eric Breindel. The Venona Secrets: Exposing Soviet Espionage and America’s Traitors. Washington, DC: Regnery Pub., Inc., 2000, 608 pp.

Rondon, Eduardo E.C. Digital Encoding for Secure Data Communications. Monterey, CA: Naval Postgraduate School, 1976, 123 pp.

Rooney, W.A. "Top" but Not Secret. St. Louis Post-Dispatch review of The Codebreakers.

Rose, F. Clayton. Modern Cipheranalysis. Annapolis, MD: U.S. Naval Academy, 1955, 115 pp.

Rosenblum. Howard G. Impact of Microelectronics On Narrowband Speech Processor Developments. Signal, August 1974, pp. 40-42.

Rosenheim, Shawn James. The Cryptographic Imagination: Secret Writing From Edgar Poe to the Internet. Baltimore, MD: John Hopkins University Press, 1997, 264 pp.

Ross, T.B. & D. Wise. The Espionage Establishment. Parts I, II and III. SEP, pp. 30-31, 82-87; pp. 50-53, 56-59; pp. 76-82.

Rosing, Michael. Implementing Elliptic Curve Cryptography. Greenwich, CT: Manning Pub. Co., 1999, 314 pp.

Ross, Stewart. Sppies & Traitors. Brookfield, CT: Copper Beech Books, 1995, 48 pp.

Roth, R.I. Data Block Scrambler and Unscrambler. IBM Technical Disclosure Bulletin, Jan. 1973, pp. 2671-2679.

Rothman, J. and R. Tremain. Secrets with Ciphers and Codes. NY: Collier Books, 1972, 32 pp.

Rothman, J. & R. Tremain. Secrets with Ciphers and Codes. NY: Macmillan Co., 1969, 32 pp.

Roubaty, R. ABC De Cryptographie avec programmes en Basic. Paris: Masson S.A., 1984, 208 pp.

Rovner, Luis. Una Nueva Posibilidad en Cripto Grafia. Buenos Aires: Editorial Cuarto Mundo, 1974, 44 pp.

Rowan, Richard W. Spies And The Next War. Garden City, NY: Garden City Pub. Co., 1936, 311 pp.

Rowan, R.W. The Story of Secret Service. NY: The Literary Guild of America, 1937, 732 pp.

Rowan, Richard W. Spy and Counter-Spy: The Development of Modern Espionage. NY: The Viking Press, 1928, 322 pp.

Rowan, Richard W. 33 Centuries of Espionage. NY: Hawthorn Books, 1967, 786 pp.

Rowan, R.W. Spy Secrets. NY: Buse Publications, 1946, 112 pp.

Rowlett, F.B. Further Applications of the Principles of Indirect Symmetry of Position in Secondary Alphabets. Washington: Signal Intelligence Section, OCSO, USGPO, 1935, 29 pp.

Rowlett, F.B. Some Highlights of U.S. Cryptology, 1930-1942. 1984, 11 pp. Address at the 1984 ACA convention. Copy signed by author.

Rowlett, Frank B. The Story of Magic: Memoirs of an American Cryptologic Pioneer. Laguna Hills, CA: Aegean Park Press, 1998, 258 pp.

Roy, Bimal and Eiji Okamoto, eds. Progress in Cryptology – Indocrypt 2000 Proceedings. NY: Springer-Vrlag, 2000, 295 pp.

Rubin, Aviel D., Daniel Geer and Marcus J. Ranum. Web Security Sourcebook: A Complete Guide to Web Security Threats and Solutions. NY: John Wiley & Sons, Inc., 1997, 350 pp.

Ruchlis, Hy. Cryptograms - The Art of Investigation. Grade Teacher, Feb. 1969, pp. 50, 56-57.

Rueppel, Rainer A. Analysis and Design of Stream Ciphers. NY: Springer-Verlag, 1986, 244 pp.

Rueppel, Rainer A. Advances in Cryptology -- Eurocrypt '92. NY: Springer-Verlag, 1993, 491 pp.

Ruffins, R. & J. Sarnoff. The Code & Cipher Book. NY: Charles Scribner's Sons, 1975, 40 pp.

Rungan, Timothy J. & Jan M. Copes. To Die Gallantly: The Battle of the Atlantic. Boulder, CO: Westview Press, 1994, 349 pp.

Runic Records of the Norsemen in America. O.G. Landsverk. Boston, MA: Twayne Pub., 1974. Book review in The Interamerican, May-June 1974, p. 6.

Rusbridger, J. Winds of Warning: Mythology & Fact About Enigma and Pearl Harbor. Encounter, Jan. 1986, pp. 6-13, 80.

Rusbridger, James & Eric Nave. Betrayal at Pearl Harbor: How Churchill Lured Roosevelt into WW II. NY: Summit Books, 1991, 302 pp.

Rusbridger, J. The Sinking of the "Automedon," the Capture of the "Nankin." Encounter, May 1985, pp. 8-14.

Russell, F. The Secret War. Time-Life Books, 1981, 208 pp.

Russell, Major C.E. Espionage and Counter-Espionage. Garden City, NY: Country Life Press, 1921, 263 pp.

Russian book on cryptology, 1994, 382 pp.

Ryska, N. & S. Herda. Kryptgraphische Vefahren in der Datenverarbeitung. Springer-Verlag, 1980, 401 pp.

Sacco, General L. Presences, Mean Frequency Squared, Reciprocal Alphabets. Trans. of Appendix II, 41. from Manual of Cryptography, pp. 257-261.

Sacco, General L. Un Primato Intaliano. La Crittografia nei Secoli XV E XVI. Rome: Istituto Storico E Di Cultura Dell'Arma Del Genio, 1958, 53 pp.

Sacco, General L. Manual of Cryptography. Trans. from the Italian by Office of the Chief Signal Officer, 1941, 193 pp.

Sacco, General L. Manuel de Cryptographie. Paris: Payot, 1951, 376 pp., trans. from the Italian edition.

Sacco, General L. Derivation of the Fromula for Presences. Original French article from: Revue Internationale de Criminology et de Police Technique, Oct.-Dec. 1957, 6 pp., with 7 page English translation.

Sacco, General L. Manual of Cryptography. Trans. from the original. Washington: USGPO, 1941, 182 pp.

Sacco, Gen. Luigi. Manuale di Crittigrafia. (Signed by author) Rome: Istituto Poligrafico Dello, 1947, 374+ pp.

Sacco, General L. Manuale di Crittografia. Rome: Istituto Poligrafico Dello, 1947, 374+ pp.

Sacco, General L. Manual of Cryptography. Laguna Hills, CA: Aegean Park Press, reprint of War Dept. translation, 193 pp., 1977.

Safford, Capt. L.F. The Undeclared War "History of R.I." 15 November 1943, 28 pp.

Safford, Lt. L.F. The Function and Duties of the Cryptography Section, Naval Communications. Lecture delivered at Postgraduate School. 12 December 1925, 18 pp.

Safford, Commander L.F. History of Invention and Development of the Mark II ECM. 30 Oct. 1943.

Sale, Anthony. The Colossus of Bletchley Park. Stevenage, England: IEE Review, 3/16/95, pp. 55-59.

Sale, Anthony E. The Colossus Computer, 1943-1996: How it Helped to Break the German Lorenz Cipher in WW II. Kidderminister, England: M & M Baldwin, 1998, 20 pp.

Salomaa, A. Computation and Automata. NY: Cambridge University Press, 1985, 284 pp.

Salomaa, Arto. Public-Key Cryptography. NY: Springer-Verlag, 1990, 245 pp.

______________________________________.Second Edition, Springer-Verlag, 1996, 271 pp.

Sambur, M.R. & N.S. Jayant. Speech Encryption by Manipulations of LPC Parameters. Bell System Technical Journal, Nov. 1976, pp. 1373-1388.

Sams, E. A Schumann Primer? The Musical Times, Nov. 1970, pp. 1096-1087.

Sams, E. Variations on an original Theme (Enigma). The Musical Times, March 1970, pp. 258-262.

Sams, E. The Schumann Ciphers: A Coda. The Musical Times, Dec. 1966, pp. 1050-1051.

Sams, E. Elgar's Enigmas. The Musical Times, July 1970, pp. 692-694.

Sams, E. Did Schumann Use Ciphers? The Muscial Times, Aug. 1965, pp. 584-591.

Sams, E. The Schumann Ciphers. The Musical Times, May 1966, pp. 392-400.

Sams, E. Crackinfg the Historical Codes. Times Literary Supplement, Feb. 8, 1986, p. 154.

Sams, E. Elgar's cipher letter to Dorabella. The Musical Times, Feb. 1970, pp. 151-154.

Sams, E. Cryptography, Musical. Section in The New Grove Dictionary of Music & Musicians. London: Macmillan, 1980, Vol. 5.

Sandek, L. Privacy Security and Cipher. Data Processor, IBM, Jan. 1978, pp. 2-6.

Sanders, Nancy I. Marshal Matt and the Case of the Secret Code. St. Louis, MO: Concordia Pub. House, 1997, 48 pp.

Sanders, S. Data Provacy: What Washington Doesn't Want You To Know. Reason, Jan 1981, pp. 24-37.

Sanders, W. Transmission secrète en radiotéléphone. Radioélectricité 61925, 357.

Sandler, R. Chiffer En Bok Om Litterara Och Historiska Hemligskrifter. Stockholm: Wahlstrom & Widstrand, 1943, 166 pp.

Santoni, Alberto. The First Ultra Secret: The British Cryptnanlysis in the Naval Operations of the First World War. Revue Internationale d'Histoire Militaire, No. 63 (1985).

Santoni, A. Il Primo Ultra Secret: L'influenza dell decrittazioni britannishe sulle operazione navali della guerre 1914-1918. Milan: Ugo Mursia, 1985, 415 pp.

Santoni. A. Il Vero Traditore: Il Ruolo Documentato di Ultra Nella Guerra del Mediterraneo. Milan: Mursia, 1981, 378 pp.

Sarafin, E.E. Information Protection: Why? How? Control Engineering, May 1965, pp. 105-107.

Sassoon, George. The Radio Hacker's Code Book. London: Duckworth & Co., Ltd., 1986, 239 pp.

Satinover, Jeffrey. Cracking the Bible Code. NY: William Morrow & Co., Inc., 1997, 346 pp.

Sayers, D.L. Have His Carcase. NY: Avon Books, 1968, 351 pp.

Sayers, Dorothy L. Have His Carcase. NY: Harper & Row, Reissue of 1932 edition, 448 pp.

Sayers, M. and Albert E. Kahn. Sabotage! The Secret War Against America. NY: Harper & Bros., 1942, 266 pp.

Sayle, Edward F. The Historical Underpinnings of the U.S. Intelligence Community. Reprinted from the International Journal of Intelligence and Counterintelligence, Vol. 1, No. 1, 1986, 27 pp. [Stroudsburg, PA].

Schaaf, W.L. A Bibliography of Recreational Mathematics, Vol 4. Reston, VA: Nat. Council of Teachers of Mathematics, 1978, 172 pp.

Schaffer, Frank. Secret Codes for Fun. Palos Verdes Peninsula, CA: Frank Schaffer Pub., 1973, 44 pp.

Schaffer, Edy Garcia, comp. The New Comprehensive A - Z Crossword Dictionary. NY: Avon Books, 1350 Ave. of the Americas, 1996, 1,367 pp.

Schatz, Bruce. Automated Analysis of Cryptograms. Rice University, 20 pp.

Scheikert, Hans. Die Geheimschriften im Dienste du Geschäfts-und Verkehrstebens. Leipzig: L. Huberti, 1905, 94 pp.

Scheips, Paul J. Union Signal Communications: Innovation and Conflict. Civil War History, Dec. 1963, PP. 391-421.

Scheips, Paul J., ed. Military Signal Communications. NY: Arno Press, 1980, Vol. 1, 182 pp.; Vol. 2, 153 pp.

Schenck, R.T.E. Holmes, Cryptanalysis and the Dancing Men. The Baker Street Journal, April 1955, pp. 80-91.

Schepper, H. De. E   Geheimschrift in de Zestiende Eeuw. Bussum, Netherlands: Spiegel Historiael, March 1967, pp. 139 149.

Schlüsselanleitung zur Schüsselmaschine Enigma. Cipher Key Manual for Cipher Machine Enigma. Berlin: 1940, 14 pp.

Schlüsselheft Nr. 16 zum R.H.V. Cipher Book No. 16 as to R.H.V. Berlin: Oberkommando der Kriegsmarine, 1942, 47 pp. (Xerox).

Schlüsselverfahren zum Geheimen Wetterschlüssel der Kriegsmarine. Cipher System for the Secret Weather Cipher of the Navy. Berlin: Oberkommando der Kriegsmarine, 1938, 9 pp. (Xerox).

Schmitz, Roberto. Mute Music. Pittsburgh, PA: Dorrance Pub. Co., 1997, 125 pp.

Schneickert, Hans. Moderne Geheimschriften. Mannheim, 1900, 94 pp.

Schneickert, Hans. Die Geheimschriften im Dienste des Geschäfts und Verfehrslebens. Leipzig: Ludwig Huberti, 1902, 76 pp.

Schneider, E.L. E. Description of a Cryptographic System for the Use of the Army. Paris: L. Fournier, 1912, 16 pp.

Schneider, Commandant L. Décryptement du Système Cryptographique. Saint Germain, France, L. Fournier, 1921, 31 pp.

Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Second Edition. NY: John Wiley & Sons, 1995, 758 pp.

Schneier, Bruce. E-Mail Security: How to Keep Your Electronic Messages Private. NY: John Wiley & Sons, Inc., 1995, 365 pp.

Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. NY: John Wiley and Sons, Inc., 1993, 618 pp.

__________ Secrets & Lies: Digital Security in a Networked World. NY: John Wiley & Sons, Inc., 2000, 412 pp.

Schneier, Bruce, ed. Fast Software Encryption, 7th International Workshop, New York, April 2000 Proceedings. NY: Springer-Vrlag, 2000, 315 pp.

Schneier, Bruce and David Banisar. The Electronic Privacy Papers: Documents in the Battle for Privacy in the Age of Surveillance. NY: John Wiley & Sons, Inc., 1997, 747 pp.

Schoenbaum, S. Shakespeare's Lives. Part Six - Xerox. NY: Oxford University Press, 1970. Plus Esquire and Life magazine articles on the Shakespeare authorship question.

Schoenbaum, Samuel. Shakespeare's Lives. NY: Oxford University Press, 1991, 612 pp.

Schooling, J. Holt. Secrets in Cipher. The Pall Mall magazine, 8(1896), pp. 119-129, 245-256, 452-462, 608-618.

Schroeder, Manfred R. Number Theory in Science and Communications With Application in Cryptography, Physics, Digital Information, Computing, and Self-Similarity. NY: Springer-Verlag, 1997, 362 pp.

Schwartau, Winn. Information Warfare: Chaos on the Electronic Superhighway. NY: Thunder's Mouth Press, 1994, 432 pp.

Schwartau, Winn. Terminal Compromise. Nashville, TN: Inter-Pact Press, 1991, 562 pp.

Schwartz, E.S. An Adaptive Information Transmission System Employing Minimum Redundancy Word Codes. 12 pp.

Schwartz, H. A Report of the Costs and Benefits of Electronic Surveillance. NY: ACLU, Dec. 1971, 46 pp.

Schwartz, Alvin.  Gold and Silver, Silver and Gold: Tales of Hidden Treasure.  NY: Farrar, Straus & Giroux, 1988, 128 pp.

Sciezynski, Mieczyslaw.  Radjotelegrafja Jako Zrodlo Wisdomosci o Nieprzyjacielu. Przemysl, Poland: 1928, 49 pp. (Xerox copy).

Scott, Joseph & Lenore. Hieroglyphs For Fun. NY: Van Nostrand Reinhold Co., 1974, 80 pp.

Seale, Patrick and McConville, M. Philby: The Long Road To Moscow. Chapter Nine - The Golf Club and Chess Society. NY: Simon & Schuster, 1973, pp. 144-159.

Sears, Peter. Secret Writing, Keys to the mysteries of Reading and Writing. NY: Teachers and Writers Collaborative, 1986, 160 pp.

Sebag-Montefiore, Hugh. Enigma: The Battle for the Code. London: Weidenfeld & Nicolson, 2000, 403 pp.

Seberry, Jennifer & Josef Pieprzyk. Cryptography: An Introduction to Computer Security. Englewood Cliffs: Prentice Hall, 1989, 375 pp.

Seberry, Jennifer & Josef Pieprzyk, eds. Advances in Cryptology -- Auscrypt '90. NY: Springer-Verlag, 1990, 462 pp.

Seberry, Jennifer & Yuliang Zheng, eds. Advances in Cryptology -- AUSCRYPT '92 Proceedings. Springer-Verlag Inc., 1993, 542 pp.

Secret Agent’s Handbook of Special Devices,World War II. Surrey, England: Public Record Office, 2000, 258 pp.

Secret Writing. Includes The Gold Bug. Hood Rubber Co., 1931, 48 pp.

Secrets of the Black Chamber. Popular Mechanics, Aug. 1934, pp. 220-223, 126A.

Secrets & Spies. Reader's Digest, 1964, 576 pp.

Secure Voice Unit Formed for Military Communication. Electronics, March 9, 1974, p. 49.

Secure Communication System. NASA Tech Briefs, Summer 1977, Vol. 2, No. 2, MSC-16462, 20 pp. L.B. Johnson Space Center, Houston, TX.

Semart, G. Méthode facile pour déchiffier un écrit quelconque composé en caractères conventionnels dans les langues statienne, francaise, anglaise et latine. Florence: V. Batelli et fils, 1883, 98 pp.

Serao, Major De Castro. Generalidades Sobre Criptpgrafia. Revista Militar, Aug.-Sept. 1965, pp. 462-484.

Serrin, J. Codebreaker. Detroit Free Press, 1/19/78, pp. 23-28.

Sesskin, S.H. Elements of Cryptanalysis: The Simple Substitution Cryptogram. The Pentogram, 1954, pp. 80-86.

Sesskin, S.H. An Introduction to Cryptanalysis: Two Ciphers. The Pentagon, Vol. XIV, Fall 1954, No. 1, pp. 16-25.

Seth, Ronald. Anatomy of Spying. E.P. Dutton & Co., 1963, 368 pp.

Sexton, Jr., Donal J. Signals Intelligence in World War II: A Research Guide. Westport, CT: Greenwood Pub. Group Inc., 1996, 163 pp.

Sgarro, Adrea. Crittografia: tecniche di protezione dati riservati. Padova, Italy: Franco Muzzio Editore, 1986, 126 pp.

Sgarro, Andrea. Crittografia: Tecniche de Protezione dei Dati Riservati. Padove, Italy: Franco Muzzio & C. Editore, 1986, 126 pp.

Sgarro, Andrea. Codici Segreti. Milan, Italy: Arnoldo Mondadori Editore, 1989, 128 pp.

Shane, Scott & Tom Bowman. No Such Agency: America's Fortress of Spies. Baltimore, MD: The Baltimore Sun, reprint of six-part series that appeared De. 3-15, 1996, 16 pp.

Shannon, C.E. A Mathematical Theory of Communication. Bell System Technical Journal, July 1948, pp. 379-422; Aug. 1948, pp. 623-656.

Shannon, C.E. Communication Theory of Secrecy Systems. Bell System Technical Journal, Oct. 1949, pp. 656-715.

Shannon, C.E. & Warren Weaver. The Mathematical Theory of Communication. Urbana, IL: The University of Illinois Press, 1959, 117 pp.

Shannon, C.E. Prediction and Entrophy of Printed English. Bell Telephone System Monograph 1819, 1951, 15 pp.

Shannon, C.E. Communication Theory of Secrecy Systems. Bell Telephone System Monograph 1727, 1949, 60 pp.

Shannon, C.E. A Mathematical Theory of Communication. Bell Telephone System Monograph B-1598, 1948, 80 pp.

Shannon, C.E. Prediction and Entrophy of Printed English. Bell System Technical Journal, Jan 1957, pp. 50-64.

Sharman III, Jackson R., editor in chief. Special issue on Intelligence Oversight, National Security, and Democracy. Harvard Journal of Law & Public Policy, vol. 12, No.2, Spring 1989. Cambridge, MA: Harvard Law School, 1989, 324 pp.

Sharp, David. The Code Letter Mystery. Boston: Houghton Mifflin Co., 1932, 224 pp.

Shasha, Dennis. Codes, Puzzles, and Conspiracy. NY: W.H. Freeman and Co., 1992, 241 pp.

Sheffy, Yigal. British Military Intelligence in the Palestine Campaign 1914-1918. London: Frank Cass Pub., 1998, 380 pp.

Shekels, Howard D. & S.H. Shekels. The Mysterious Death of Hamnet Shackspeare: A Study of an Elizabethan Cipher. Phoenix, AZ: Control Systems Assoc., Inc., 1988, 75 pp.

Shepard, Simon J. Cryptography: Diffusing the Confusion. Baldock, England: Research Studies Press Ltd., 2001, 152 pp.

Sheymov, Victor. Tower of Secrets: A Real Life Spy Thriller. Annapolis, MD: Naval Institute Press, 1993, 420 pp.

Shirokov, Felix. Decoding the Maya Scripts. Science Digest, Aug. 1962, pp. 4-12.

Shulman, David. An Annotated Bibliography of Cryptography. NY: Garland Publishing, 1976, 390 pp.

______________. A Supplement To An Annotated Bibliography of Cryptography. Xerox copy of unpublished typed manuscript. 1986,unpaginated, but handwritten “334 pp.” next to title.

Shulman, D. An Impractical Cipher. Word Ways, Vol. 16, No. 3, Aug., 1983, 158-159.

Shulman, D. My 100 Best Cryptgrams. NY: Crypto Press, 1965, 48 pp.

Shulman, D. Crypto-Notes. Issues 1,3,6,7,8,10, 1961, 9 pp.

Shulman, D. The Origin of the Dancing Men. Baker Street Journal, March 1973, pp. 19-21.

Shulman, D. Jews In Cryptography. The Synagogue Light,Vol. 39, No. 9,May 1973, pp. 4-7, 15-16. NY: Wall Street Synagogue.

Shulman, David & George Weintraub. Glossary of Cryptography. NY: Crypto Press, 1961, unpaged (44 pp.)

Shulman, David. A Supplement to An Annotated Bibliography of Cryptography, 1986, 334 pp. (Manuscript)

Shulman, D. Idiomorphic Solution of Plaintext Autokey Ciphers. NY: Crypto Press, 1961, 9 pp.

Shulman, D. Sherlock Holmes: Cryptanalyst. The Baker Street Journal, 1949.

__________. Shh! … My Secret Collection. Eugene, OR: Biblio, Jan. 1997, 52-54.

Shulsky, Abram N. Silent Warfare: Understanding the World of Intelligence. McLean, VA: Brassey's (US), Inc., 1991, 222 pp

Shulsky, Abram N. & Gary J. Schmitt. Silent Warfare: Understanding the World Of Intelligence. McLean, VA: Brassey's (US), 1993, revised second edition, 286 pp.

Shumaker, W. Renaissance Curiosa. Binghamton, NY: MRTS, SUNY, 1982, 207 pp.

Shumaker, Wayne, ed. Natural Magic and Modern Science: Four Treatises, 1590 1657. Binghamton: Medieval & Renaissance Texts, 1989, 233 pp.

Siehl, George. Cloak, Dust Jacket and Dagger. Library Journal, Oct. 15, 1972, pp. 3277-3283.

Signaling. North Brunswick, NJ: Boy Scouts of America, 1975, 32 pp.

Silver, R.L. Decryptor. Lincoln Laboratory, MIT, Quarterly Progress Report, Div. 5, Dec. 15, 1959, pp. 57-60.

Silvern, Gloria Marantz. Development of a Course in Beginning Cryptanalysis for Adults. Appendix A, Text Workbook for Beginning Cryptanalysis. NY: Teachers College, Columbia University, 1952, Thesis.

Simmel, J.M. The Caesar Code. NY: Popular Library, 1976, 542 pp.

Simmons, G.J. Secure Communications and Asymmetric Cryptosystems. Boulder, CO: Westview Press, 1982, 338 pp.

Simmons, G.J., ed. Special Section on Cryptology,Proceedings of the IEEE, May 1988,pp. 533-627.

Simmons, Gustavus L., ed. Contemporary Cryptology: The Science of Information Integrity. Piscataway, NJ: IEEE Press, 1992, 656 pp.

Simmons, G.J. Cryptology: The Mathematics of Secure Communication. The Mathematical Intelligencer, Vol. 1, No. 4, 1979, pp. 233-246.

Simmons, Isabel. The Unbreakable Code. Marine Corps Gazette, Nov. 1971, p. 59.

Simon, M.K. et al. Spread Spectrum Communications. Rockville, MD: Computer Science Press, Vol. I, 1985, 402 pp.; Vol. II, 1985, 385 pp.; Vol. III, 1985, 423 pp.

Simonot, Edme. L'art de Déchiffrer les Écritures Secretes. Paris, France: J. Arnous de Reviere, 1881, 132+ pp.

Simons, Eric N. The Pegasus Story of Communication. London: Dobson Books, 1970, 185 pp.

Sims, Leslie, ed. The Usborne Spy’s Guidebook with CD-ROM Encoder. Tulsa, OK: EDC Pub., 2000, 48 pp. Plus CD-ROM encoder.

Singer, Kurt. The World's Best Spy Stories - Fact and Fiction. NY: Wilfred Funk, Inc., 1954, 342 pp.

Singh, Simon. The Science of Secrecy:The History of Codes and Codebreaking. London: Fourth Estate Ltd., 2000, 224 pp.

______ The Code Book: The Evolution of Secrecy From Mary, Queen of Scots to Quantum Cryptography. NY: Doubleday Pub., 1999, 402 pp.

Sinkov, A.  Elementary Cryptanalysis. NY: Random House, 1968,
189 pp. Hard cover edition.

Sinkov, A. Elementary Cryptanalysis. NY: Random House, 1968, 189 pp. Soft cover edition.

_________. Elementary Cryptanalysis, A Mathematical Approach. The Mathematical Assocaiation of America, 1966, 222 pp.

Sinkov, A. The Existence of Alphabets Having No Interval Repetitions. Washington: USGPO, 1934, 6 pp.

Sinkov, A. Permutation Tables involving A Feature of Non-Transposability. USGPO, 1934, Signal Intelligence Section, OCSO, 12 pp.

Sinkov, A. A Property of Cyclic Substitutions of Even Degree. Offprint of American Mathematical Monthly, March 1935, pp. 145-149.

Skatrud, R.O. A Consideration of the Application of Cryptographic Techniques to Data Processing. Fall Joint Computer Conference, 1969, pp. 111-117.

Skatrud, R.O. Computer and Cryptography. Privacy: Legal and Technological Protection in the Computer Age, Oct. 12-14, 1970, 18 pp.

Skillen, Hugh. Spies of the Airwaves: A History of Y Sections During the Second World War. Pinner, England: H. Skillen, 1989, 600 pp.

Skillen, Hugh. The Y Compendium. Pinner, England: Hugh Skillen, 1990, 254 pp.

Skillen, Hugh. Enigma and its Achilles Heel. Middlesex, England: Hugh Skillen, 1992, 225 pp.

Skillen, Hugh. The Enigma Symposium 1992. Pinner, England: Hugh Skillen, 1992, 60 pp.

Skillen, Hugh. Knowledge Strengthens The Arm. Pinner, England: Hugh Skillen, 1991, 492 pp.

Skillen, Hugh. The Enigma Symposium 1995. Pinner, England: Hugh Skillen, 1995, 163 pp.

Skillen, Hugh. The Enigma Symposium 1994. Pinner, England: Hugh Skillen, 1994, N.P.

Skillen, Hugh. The Enigma Symposium 1997. Middlesex, England: Hugh Skillen, 1977, 194 pp.

Skillen, Hugh. The Enigma Symposium 1998. Pinner, England: Hugh Skillen, 1998, 206 pp.

_________ The Enigma Symposium 1999. Pinner, England: Hugh Skillen, 1999, 210 pp.

__________ The Enigma Symposium 2000. Pinner, England: Hugh Skillen, 2000, 186 pp.

__________ The Enigma Symposium 2002. Pinner, England: Hugh Skillen, 2002,82 pp.

Skinner, Lt. H.C. Transposition Ciphers Used by the Germans (February, 1918 to November, 1918) 11/29/18, 2 pp.

Slackman, Michael. Target: Pearl Harbor. Honolulu: University of Hawaii Press, 1990, 354 pp.

Slade, Robert M. Robert Slade's Guide to Computer Viruses: How to Avoid Them, How to Get Rid of Them, and How to Get Help. NY: Springer-Verlag, 1994, 472 pp. plus computer disk.

Slater, Mrs. Slater's Sententise Chronological. London: Longmans, Green & Co., 1866, 170 pp.

Sloane, N.J.A. Error-Correcting Codes and Cryptography. Bell Labs, 1979, 68 pp.

Sloane, N.J.A. Error-Correcting Codes and Cryptography. Paper based on talk at Mathematical Association of America, Aug. 10, 1978, 39+ pp.

Slocum, Jerry and Jack Botermans. New Book of Puzzles: 101 Classic and Modern Puzzles to Make and to Solve. NY: W.H. Freeman & Co., 1992, 128 pp.

Slocum, Jerry and Jack Botermans. The Book of Ingenious & Diabolical Puzzles. NY: Times Books/Random House Inc., 1994, 152 pp.

_________________________________. Puzzles Old and New. How to Make and Solve Them. Plenary Publications International, De Meern, The Netherlands. 1987, 160 pp.

Smith, D.E. John Wallis as a Cryptographer. American Mathematical Society Bulletin, Nov. 1917, pp. 82-96.

Smith, Eugene T. How to Evaluate a Scrambling System. Personal Communications, Oct. 1985, pp. 34, 37.

Smith, B.F. The Shadow Warriors. Basic Books, 1983, 507 pp.

Smith, Bradley F. The Ultra-Magic Deals and the Most Secret Special Relationship, 1940-1946. Novato, CA: Presidio Press, 1993, 276 pp.  Inscribed by author.

Smith, M.J. The Secret Wars. Santa Barbara, CA: Clio Press, Vol. I, 250 pp.; Vol. II, 389 pp.; Vol. III, 237 pp.

Smith, L.D. The G-Men Trap the Spy Ring. NY: Grosset & Dunlap, 1939, 218 pp.

Smith, Lloyd E. Curiosities of the English Language. Girard, KS: Haldeman-Julius Pub. Little Blue Book No. 1350, 32 pp.

Smith, Michael. The Emperor’s Codes: Bletchley Park and the Breaking of Japan’s Secret Ciphers. London: Bantam Press, 2000, 322 pp.

____________________________________. NY: Arcade Press, Inc., 2001, 323 pp.

Smith, Richard. Internet Cryptography. Reading, MA: Addison Wesley Longman, 1997, 356 pp.

Smith, W.T. Confederate Secret Service Device. North South Trader, Vol. II, No. 6. Sept.-Oct. 1975, pp. 16-19.

Smith, Laurence Dwight. Cryptography. NY: W.W. Norton & Co., 1943, 164 pp.

Smith, J.L. The Design of Lucifer, A Cryptographic Device for Data Communications. IBM Research Report RC 3326, 1971, 65 pp.

Smith, L.D. Cryptography. NY: Dover Pub., 1955, 164 pp.

Smith, Stanley H., comp. Investigations of the Attack on Pearl Harbor: Index to Government Hearings. Westport, CT: Greenwood Press, 1990, 251 pp.

Smith, Bradley F. "Sharing Ultra in World War II." Stroudsburg, PA: International Journal of Intelligence and Counterintelligence, Spring 1988, pp. 59-72.

Smith, Wilbur. The Seventh Scroll. NY: St. Martin's Press, 1995, 486 pp.

Smith, Michael. New Cloak, Old Dagger: How Britain's Spies Came In From The Cold. London: Victor Gollancz Ltd., 1996,   338 pp.

Smith, Jr., Myron. Pearl Harbor, 1941: A Bibliography. Westport, CT: Greenwood Press, 1991, 197 pp.

Smoothey, Marion. Let's Investigate Codes and Sequences. White Plains, NY: Marshall Cavendish Corp., 1995, 64 pp.

Snively, John H. Cryptography. NY: Appleton's Journal of Literature, Science and Art, No. 167 Vol. VII, June 8, 1872, pp. 627-628.

Snyder, S.S. Influence of U.S. Cryptologic Organizations On the Digital Computer Industry. 28 pp.

Sobol, Donald J. Encyclopedia Brown's Book of Wacky Spies. NY: William Morrow & Co., Inc. 1984, 105 pp.

SOE Secret Operations Manual. Boulder, CO: Paladin Press, 1993, 266 pp.

Solving the Enigma: History of the Cryptanalytic Bombe. Fort Meade, MD: Center for Cryptologic History, NSA, 52 pp.

Some Inside Facts About Ciphers: Secret Language of War. Popular Science, Nov. 1942, pp. 86-87, 222, 224.

Sonderby, A.R. Dodsårsag: Dårlig signaltjeneste Fra Pearl Harbor til Pueblo. Mililaert Tidsskrift, Marts 1970, pp. 109-121.

Soneira, Capt. W.R. & Capt. J.R. MacSwords. Send A Message. Armor, July-August 1978, pp. 13-15.

Sourbès, Pierre. Le Commandant Bazeries l'homme qui "cassait" les codes. Miroir de L'Histoire, Sept. 1962, 8 pp.

Spector, Ronald H. Listening To The Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan. Wilmington, DE: Scholarly Resources, 1988, 258 pp.

Spector, R.H. Eagle Against the Sun: The American War with Japan. The Free Press/Macmillan, 1984, 589 pp.

Speech and Facsimile Scrambling and Decoding. Aegean Park Press, 1981, 130 pp.

Speransky M.N. Taynopis' v Yugo-Slavyanskikh i Russikh Pamgatnikakh Pis 'ma. Entsihlopediya Slavanskoy Philolgii, iv, 1929, pp. 1-161.

Speziali, P. Le Logogriph d'Euler. Bulletin de la Societé suisse des bibliophiles, April 1953, pp. 6-7.

Spies, Scouts and Raiders: Irregular Operations (The Civil War). Chicago: Time-Life Books, 1985, 176 pp.

Spiller, R.J. Some Implications of Ultra. Military Affairs, April 1976, pp. 45-54.

Spiller, R.J. Assessing Ultra. Military Review, Aug. 1979, pp. 13-23.

Spivak, John L. Honorable Spy, Exposing Japanese Military Intrigue in the United States.New York: Modern Age Books, Inc., 1939, 149 pp.

Spy: The Story of Modern Espionage. Xerox copy, pp. 78-81 dealing with Russian cipher techniques.

SRH-110. Operations of the Military Intelligence Service, War Dept, London (MIS WD London), 57 pp.

SRH-117. History of Special Branch M.I.S. June 1944-Sept. 1945, 11 pp.

SRH-132. History of the Special Distribution Branch Military Intelligence Service, WDGS, Part 3, Section 7, 7 pp.

SRH-141, Part 2. Papers From the Personnel Files of Alfred McCormack, Colonel, AUS Special Branch, G-2, M.I.D. War Dept., 348 pp.

SRH-141, Part 1. Papers From the Personnel Files of Alfred McCormack, Colonel, AUS Special Branch, G-2, M.I.D. War Dept., 223 pp.

SRH-185. War Experiences of Alfred McCormack. 83 pp.

SRH-279. Op-20-G File, Communications Intelligence Organization, 1942-1946. 82 pp.

SRH-306. OP-20G. Exploits and Commendations World War II.148 pp.

SRH-355.  Naval Security Group History to World War II. Part 1, 464 pp. Part II, 83 pp.

SRH-357. S.I.D. Diary. 234 pp.

St. John, Peter. Canada's Accession to the Allied Intelligence Community, 1940-45. Conflict Quarterly, Fall 1984, 5-21.

Stadlin, Hans. 100 Jahre Boris Hagelin 1892-1992: Die Geschichte des Firmagründers Crypto AG. Zug, Switzerland: Crypto AG, 1992, 80 pp.

Stafford, David. Camp X. NY: Dodd, Mead & Co., Inc., 1986, 327 pp.

Stafford, David. Churchill and Secret Service. NY: The Overlook Press, 1998, 386 pp.

Stahl, Fred A. A Homophonic Cipher For Computational Cryptography. Urbana, IL: Coordinated Science Lab., University of Illinois, March 1973, 15 pp.

Stålhane, H. Hemlig Skrift, Codes och chiffermaskiner. Stockholm: Lindfors Bokförlag, 1934, 279 pp.

Stallings, William. Protect Your Privacy: A Guide for PGP Users. Englewood Cliffs, NJ: Prentice Hall PTR, 1995, 302 pp.

Stallings, William. Practical Cryptography for Data Internetworks. Los Alamitos, CA: IEEE Computer Society Press, 1996, 356 pp.

Stallings, William. Network and Internetwork Security: Principles and Practice. Englewood Cliffs, NJ: Prentice-Hall, Inc., 1995, 462 pp.

___________________. Cryptography and Network Security: Principles and Practices. Third edition.NJ:Prentice Hall, 2003, 679 pp.

Stamps. Egyptian stamp and French stamp, each commemorating 150th anniversary of Champollion's decipherment of the Rosetta Stone. Also 1992 U.S. stamp, "Allies decipher enemy codes 1942."

Stanley, George E.  The Codebreaker Kids Return.  NY: Avon Books, 1989, 118 pp.

Stanley, G.E. The Codebreaker Kids. NY: Avon Books, 1987, 104 pp.

Starrett, Vincent, ed. World's Greatest Spy Stories. Cleveland: The World Pub. Co., 1944, 445 pp.

Stenger, E. Photographische Geheimvorschriften und Ähnliches um die Mitte des vorigen Jahrhunderte. Wien: Photographische Korrespondenz, 1903, V. 69, 10-14, 23-26.

Stengers, J. La Guerre des Messages codés (1930-1945). Paris: L'Histoire, No. 31, Feb. 1981, pp. 19-31.

Stephan, John J. Hawaii Under The Rising Sun: Japan's Plans for Conquest After Pearl Harbor. Honolulu: University of Hawaii Press, 1984, 228 pp.

Stephenson, William Samuel, ed. British Security Coordination: The Secret History of British Inteligence in the Americas, 1940-1945. NY: Fromm International Pub. Corp., 1999, 536 pp.

Sterling, George E. The RID Story. Spark-Gap Times, 8/1/63, 10/1/63, 12/1/63, 2/64.

Stern, Jacques, ed. Advances in Cryptology Eurocrypt ’99 Proceedings. NY: Springer-Verlag, 1999, 475 pp.

Stern, Philip Van Doren, Secret Missions of the Civil War. NY: Rand McNally, 1960, 320 pp.

Steury, Donald P. World War II Chronicles: The Intelligence War. NY: Metro Books, 2000, 128 pp.

Stevenson, William. A Man Called Intrepid - The Secret War. Harcourt Brace, Jovanovich, Inc., 1976, 486 pp.

Stewart, B.H. A Cipher based on congruences, pp. 108-110, in Theory of Numbers. NY: Macmillan Co., 1964.

Stewart, Ian. Game, Set, & Math-Enigmas and Conundrums-. Cambridge, MA: Basil Blackwell, Inc., 1989, 191 pp.

Stillwell, P., ed. Air Raid: Pearl Harbor. Annapolis: Naval Institute Press, 1981, 299 pp.

Stinson, Douglas R. Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, Inc., 1995, 434 pp.
 

______________________________________. Second Edition, Boaca Raton, FL: CRC press, Inc., 2002, 339 pp.

Stinson, Douglas R. Advances in Cryptology -- CRYPTO '93 Proceedings. NY: Springer-Verlag, Inc., 1994, 491 pp.

Stoker, Bram. The Mystery of the Sea. NY: Doubleday, Page & Co., 1904, 498 pp.

Stoll, Clifford. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. New York: Doubleday Pub. Co., 1989, 326 pp.

Stoner, Major General Frank. Communications Security. Lecture, Command and General Staff College, 1945.

Strasser, Gerhard F. Lingua Universalis: Kryptologie und Theorie des Universalsprachen im 16, und 17 Jahrhundert. Wolfenbuttel, W. Germany: Herzog August Bibliothek Wolfenbuttel, 1988, 291 pp.

Strategic Use of Communications During The World War. Washington: Monthly Information Bulletin, O.N.I., August 1928, pp. 62-67.

Strehle, Res. Verschlüsselt: Der Fall Hans Bühler. Zurich: Werd Verlag, 1994, 200 pp.

Stripp, Alan. Codebreaker in the Far East. Savage, MD: Frank Cass, c/o Rowman & Littlefield, 1989, 204 pp.

____________. The Code Snatch. Cambridge, England: 2001, 224 pp.

Stubblebine, Stuart G. Message Integrity in Cryptographic Protocols. Ann Arbor, MI: U.M.I. Dissertation Services, 1992, 169 pp.

Study of Cryptography. Army and Navy Register, May 14, 1932, 1 p.

Sturzinger, O. Radio Intelligence and Code Cracking in WW II. Armada Int., July/Aug. 1979, pp. 108-110, 112, 116, 118, 120, 122, 124, 126.

Sturzinger, O. Cipher Technique Today. Paper presented at seminar, Electronic War, Winter term 1976/79, Swiss Federal Institute of Technology, 35+ pp.

Stützel, Dr. H.I. Geheimschrift und Entzifferung im Ersten Weltkrieg. Germany: Truppenpraxis, July 1969, 541-545.

Stützel, Dr. Hermann Ing. Encipherment and Decipherment During World War I. Truppenpraxis, July 1967. Trans. from German by Marie Sinclair.

Survey of Digital Communications, Cryptography, cryptographic Requirements. Hughes Aircraft Co., April 15, 1961, 4 pp.

Sykes, D.J. Enhancing Data Security. Data Comm. User, Jan. 1977, pp. 25-28.

Sykes, D.J. Protecting Data by Encryption. Datamation, Aug. 1976, pp. 81-85.

Symbolic Exhibition Flyers. Hallmark Gallery, Jan. 12-Mar. 1, 1972, 3 pp.

Syrett, David. The Secret War and the Historians. Armed Forces and Security, V. 9, No. 2, 1983, 293-328.

Syrett, David. The Defeat of the German U-Boats: The Battle of the Atlantic. Columbia, SC: University of South Carolina Press, 1994, 344 pp.

Syversen, E. Norse Runic Inscriptions, With Their Long-Forgotten Cryptography. Sebastopol, CA: Vine Hall Press, 1979, 123 pp.

Szulc, Ted. The NSA - America's $10 Billion Frankenstein. Penthouse, Nov. 1975, pp. 55-56,70,72,184,186,188,191-192, 194-195.

Tallarica, Tony. The Hardy Bors Secret-Code Activity Book.NY: Grosset & Dunlop, 1978, N.P.

Tallarico, Tony. The Nancy Drew Secret-Code Activity Book. NY: Grosset & Dunlop, 1978, N.P.

Tanaka, Junji. Story of Secret Code. Japan: Tokuma Book Store, June 10, 1967, 229 pp.

Tapager, James R.D. Decoding and Plotting. Vol. 3 ASWEPS Manual. Washington: U.S. Naval Oceanographic Office, 1966, 42 pp.

Tarrant, V. E. The Red Orchestra: The Soviet Spy Network Inside Nazi Europe. NY: John Wiley & Sons, Inc., 1996, 224 pp.

Tatlow, Ruth. Bach and the Riddle of the Number Alphabet. NY: Cambridge University Press, 1991, 186 pp.

Taylor, F.E. Use of Encryption Methods to Protect Data. Information Privacy, Jan. 1979, pp. 111-115.

Taylor, Dr. Charles E. The Signal and Secret Service of the Confederate States. North Carolina Booklet, Vol. 2, No. 11, March 1903, 24 pp.

Teil 5 Ersatzteilliste Schlüsselgerät, Spruch. April 1964, 55 pp. (Xerox)

Teil 1-3 für Spruchschlüsselgerät H. June 1964, 45 pp. (Xerox)

Teil 1-3 für Tastaturzusatz B 62. October 1964, 59 pp. (Xerox)

Tellarico, T. The Hardy Boys Secret-Code Activity Book. NY: Grosset & Dunlop, 1978, N.P.

Thalbitzer, William. Two Runic Stones, from Greenland and Minnesota. Washington: Smithsonian Institution (publication 4021), 1951, 71 pp.

Thayer, C.W. Diplomat. Harper & Bros. 1959, 299 pp.

The Art of Secret Writing. Reproduced from The American Letter Writer. NY: Hurst & Co., 1883, 6 pp.

The Beale Cipher. The Beale Cypher Association, 1978, 50 pp.

The Beale Cipher. Papers, articles and correspondence.

The Best of Create-A-Code. Phoenix: Resources For The Gifted. 1981, 118 pp.

The CIA. Congressional Record, 7/28/66/ pp. 17463-17466.

The Cipher: A Face to Face Confrontation After 50 Years. L'Armee, May 1969, pp. 36-53. French article and translation.

The Cipher Dispatches. New York Tribune, 1979, Tribune Extra No. 44.

The Cipher Dispatches. Mr. Tilden's Letter and Testimony respecting them.

The Codebreakers. Major reviews, 1967-1968.

The Code Crackers. Review of The Broken Seal. Newsweek, April 24, 1967.

The Cryptogram. American Cryptogram Association, 1932 - present.

The Decoder: The Technical Newsletter of the Satellite and Cable Descrambling Industry. Sept. 1988,Vol. 2 No. 9, 16 pp.

The Eavesdroppers. Time Out, May 21, 1976.

The Electronic Warfare Market. Frost & Sullivan, Nov. 1971, 4 pp. circular describing report.

The Francis Bacon Library. List of holdings on cryptology.

The Friedman Legacy: A Tribute to William and Elizebeth Friedman. Fort Meade, MD: National Security Agency, Center for Cryptologic History, Sources in Cryptologic History Number 3, 1992, 282 pp.

The History of Security Monitoring, WW I to 1955.  SRH 162.

The History of the Hagelin-Cryptos. 63 pp.

The Hunt for the Pearl Harbor Files. Transcript of television program produced by The Monitor Channel, Boston, MA, 1991, 32 pp.

The Keys for Deciphering The Greatest Work of Sir Francis Bacon, Baron of Verulam Viscount St. Alban. Geneva, Ill., Riverbank Laboratories, 1916,100 pp.

The Knightmare. Secrets of a Super Hacker. Port Townsend, WA: Loompanics Unltd., 1994, 205 pp.

The Man Who Broke Japan's Code. St. Louis Post-Dispatch, Nov. 10, 1969, p. 40. W.F. Friedman obituary.

The Modern Sphinx. London: Griffith and Farran, 1873, 343 pp. (pp. 57-58 missing)

The National Security Agency. 4 pp. folder.

The Need for New Legislation Against Unauthorized Disclosures of Communication Intellligence Activities. June 9, 1944, 108 pp.

The New Espionage American Style. Newsweek, Nov. 22, 1971, (cover story) pp. 28-40.

The 1931 International Code of Signals. American Edition (Reprinted 1937). Volume I, For Visual and Sound Signaling. USGPO, 1937, 362 pp.

________________________________________. American Edition.Vol. II, For Radio Signaling.USGPO, 1933, 418 pp.

The Origin and Development of the Army Security Agency. Lecture, 18 pp. n.d.

The Philip Mills Arnold Semeiology Collection. An Exhibit, June-Sept. 1973, compiled by Patrick J. Russell, Jr. Rare Books and Special Collections Dept., Washington University Libraries, St. Louis, 1873.

The Reader’s Digest Illustrated History of World War II, The World At Arms. London, The Reader’s Digest Association Ltd., 1989, 480 pp.

The Roving Englishman. Chapter XI, Letter Opening from Embassies and Foreign Courts: A History of Diplomacy. London: G. Routledge & Co., 1955, pp. 130-145.

The Secret Code Digest by Henry Lysing. 32-page booklet featuring Paul Kelly, star of The Secret Code serial, on the cover.

Theobald, R.A. The Final Secret of Pearl Harbor. NY: Devin-Adair Co., 1954, 202 pp.

Thomas, Paul B. Secret Messages. NY: A.A. Knopf, Inc., 1928, 137 pp.

Thompson, J.E.S. Maya Hieroglyphic Writing. Norman, OK: University of Oklahoma Press, 1975, 347 pp.

Thompson, Robert S. A Time for War: Franklin D. Roosevelt and the Path to Pearl Harbor. NY: Prentice Hall, 1991, 449 pp.

Thompson, Edmund R., ed. Secret New England: Spies of the American Revolution. Kennebunk, ME: D. Atlee Phillips Chapter, AFIO, 1991, 234 pp.

Thompson, Leroy. The US Army in Vietnam. NY: Sterling Pub. Co., 1990, 216 pp.

Thomson, J.W. & S.K. Padover. Secret Diplomacy. NY: Frederick Unger Pub. Co., 1965, 290 pp.

Three Ways to Solve Cryptograms. ACA, 1963, 14 pp.

Tibor, Nemetz & Vijda István. Algoritmusos Adatvédelem. Budapest: Akadémiai Kradó, 1991, 240 pp.

Tidwell, William A. April '65: Confederate Covert Action in the American Civil War. Kent, OH: Kent State University Press, 1995, 264 pp.

Tidwell, W.A., & J.O. Hall & D.W. Gaddy. Come Retribution: The Confederate Secret Service and the Assassination of Lincoln. Jackson, MS: University Press of Mississippi, 1988, 510 p.

Tilborg, Henk C.A. van. An Introduction to Cryptology. Norwell, MA: Kluwer Academic Publishers, 1988, 170 pp.

TO TEET. 1973 Greek crossword puzzle magazine, 42 pp., cryptogram on p. 9.

Todd, Stewart. Cryptograms in Portuguese. Laguna Hills, CA: Aegean Park Press, 1986, 122 pp.

Toland, John. The Rising Sun. NY: Random House, 1970, 954 pp.

Toland, John. Infamy: Pearl Harbor and Its Aftermath. NY: Doubleday & Co., 1982, 366 pp.

Tomash, Erwin & Arnold A. Cohen. The Birth of an ERA: Engineering Research Associates, Inc. 1946-1955. Arlington, VA: Annals of the History of Computing, Oct. 1977, pp. 83-97.

Topor, T. Identify Ramparts' Code Man. New York Post, July 18, 1972, p. 14.

Torrieri, D.J. Principles of Military Communication Systems. Dedham, MA: Artech House, Inc., 1981, 298 pp.

Torrieri, D.J. Cryptographic Digital Communication. Offprint, IEEE Transactions on Aerospace Electronic Systems, Vol. AES-12, No. 1, Jan. 1976.

Tracy, T. & L.G. Turrow. How to be a G-Man. Chapter X, Secret Codes and Ciphers. R.M. McBride & Co., 1939.

Tranchedino, Fran. Diplomatische Geheimschriften. Graz, Austria: Descriptive 4-page folder on this book, 1970.

Trappe, Wade and Lawrence C. Washington. Introduction to Cryptography with Coding Theory. Upper Saddle River, NJ: Prentice Hall, 2002, 490 pp.

Travis, F. & Judy Handley. The KnowHow Book of Codes, Secret Agents & Spies. NY: Sterling Pub. Co., 1976, 48 pp.

Travis, F. & Judy Handley. The KnowHow Book of Spycraft. London: Usborne Pub., 1975, 47 pp.

__________________________. The Funcraft Book of Spycraft: Secret codes, tricks, and disguises to fool your friends. Scholastic Book Services, 1976, 47 pp.

Trefousse, H.L. Pearl Harbor: The Continuing Controversy. Malabar, FL: Krieger Pub. Co., 1982, 215 pp.

Trefousse, H.L., ed. What Happened at Pearl Harbor. NY: Twayne Pub., 1958, 324 pp.

Tres Secret, Histoire De L'Espionnage 1945-1991. Historia, hors serie 23. Paris: Librairie Jules Tallandier, 1971, 192 pp.

Trithemius,Johannes. Steganographia:hoc est: Ars per occultam scripturam animi sui voluntatem absentbus aperiendi certa; authore reverendissimo et clarissimo viro, Joanne Trithemio ... Darmstadt, 1621.Original vellum binding.

Trithemius,J.Steganographia,1608 edition. Italian translation and comments by A. Gentili. Steganographia dell’Abate Tritemio. Volume 1, 293 pp. and Volume 2, 278 pp. Milan, Italy: Editrice Kemi, 1980.

Trithmeius,J. Polygraphie, et Universelle Escriture Cabalistique de M.I. Tritheme Abbe.(University Microfilms
XEROX copy of French translation of Polygraphia by Gabriel de Collange in Paris in 1561.)

Troy, Thomas F. Donovan and the CIA. Frederick, MD: University Pub. of America, 1984, 589 pp.

Trumbull, R. Word of Secret Australian Role in Singapore Causes Sensation. New York Times, Feb. 14, 1973,

Tsujii, Shigeo, ed. Cryptography and Security. Langhorne, PA: Gordon & Breach, 1992, 156 pp.

Tuchman, Barbara W. The Zimmerman Telegram. NY: Macmillan, 1966, 244 pp.

Tuchman, Barbara W. The Zimmermann Telegram. NY: Dell Pub. Co., 1965, 224 pp.

Tuckerman, Bryant. Solution of a Substitution-Fractionation Transposition Cipher. Yorktown Heights, NY: IBM Research, Sept. 21, 1973, 62 pp.

Tuckerman, Bryant. A Study of the Vigenère-Vernam Single and Multiple Loop Enciphering Systems. Yorktown Heights, NY: IBM Research Report RC 2879, 1970, 115 pp.

Tully, Andrew. The Super Spies. NY: Pocket Books, 1970, 215 pp.

Tully, Andrew. CIA: The Inside Story. NY: William Morrow & Co., 1962, 276 pp.

Tumbusch, Tom. Tomart’s Price Guide to Radio Premiums and Cereal Box Collectibles. Dayton, OH: Tomart Pub., 1991, 176 pp.

Tunnell, James E. Latest Intelligence: An International Directory of Codes Used by Government, Law Enforcement, Military and Surveillance Agencies. Blue Ridge Summit, PA: Tab Books, 1990, 305 pp.

Tunstall, J.N. The Utilization of Matrix Congruences In Algebraic Cryptography. Thesis, University of North Carolina, 1964, 62 pp.

Turchen, Lesta V. Herbert Osborne Yardley and American Cryptography. University of South Dakota, Thesis, May 1969, 98 pp.

Türkel, Dr. S. Morssegeisden und Geheimschrift. Archiv fur Kriminologie, Vol. 124, 129-133.

Türkel, Dr. S. Chiffrieren Mit Geraten und Maschinen. Graz: 1927, 94 pp. plus appendices.Two copies, one HB.

Türkel, Dr. S. Die Lochstanzschrift. Archiv fur Kriminologie, 1925-26, 162-164.

Türkel, Dr. S. Enciphering With Apparatus and Machines. An Introduction to Cryptography. Graz: 1927, 65 pp. plus 40 pp. of illustrations. Trans. from the German by War Dept., The Army War College, Fort Humphreys, DC.

Türkheim, L. Gioppi di. La Crittografia. Rivista Militare Italiana, Vol. 45, No. 12, Dec. 16, 1900.

Turn, Rein & H.E. Petersen. Security of Computerized Information Systems. Paper presented at 1970 Carnahan Conference on Electronic Crime Countermeasures, Lexington, KY, April 16-18, 1970, 8 pp.

Turn, Rein. Privacy Transformations for Databank Systems. National Computer Conference, 1973, pp. 589-601.

Turn, Rein, ed. Advances in Computer Security. Norwood, MA: Artech House, 1988, 376 pp.

Twentieth Century-Fox Film. Tora, Tora, Tora. Press kit.

Twentieth Century Fund. Task Force on the Future of U.S. Intelligence. In From the Cold: the Report of the Twentieth Century Fund Task Force. NY: The Twentieth Century Fund Press, 1966, 275 pp.

Twigg, Terry. "Need to Keep Digital Data Secure?" Electronic Design 23, Nov. 9, 1972, pp. 68-71.

Two Code Clerks Defect to Soviet; Score U.S. 'Spying.' New York Times, Sept. 7, 1960, pp. 1, 11, 13.

2 Tech Articles Draw Kudos From Code Fans. Letter to Editor, Electronic Design 4, Feb. 15, 1973, p. 7.

Tzonis, Alexander. Hermes and the Golden Thinking Machine. Cambridge, MA: Bradford/MIT Press, 1990, 284 pp.

U Butdz ofn Hpw Tzbu Quhhu. The Key Reporter, July 1959, 1 p.

Udell, Gilman G. Laws Relating to Espionage, Sabotage, etc. Washington: U.S.G.P.O., 1971, 160 pp.

Ulfving, Lars. The Geheimschreiber Secret: Arne Beurling and the success of Swedish signals intelligence. Trans. from the Swedish by Frode Weierud, 3/3/96. Stockholm: Probus Förlag, 1992, 27 pp.

Ultra and the History of the U.S. Strategic Air Force in Europe vs. the German Air Force. Frederick, MD: University Pub. of America, Inc., 1980, 205 pp.

Unbegaun, Boris. Russkaya Tayynopri' XVII Vyeka. Obshchestva Drugly Russkoi Knigi IV (1938) pp. 81-96.

Uncle Sam, Cipher Wizard. The Literary Digest, Nov. 3, 1917, pp. 46-51. (Cryptologic Miscellanea)

Union Route Ciphers. Dover Plains, NY: Goodwin Trading Co., 1997, 28 pp.

U.S. Army Intelligence and Security Command. INSCOM and Its Heritage. “An Organizational History of the Command and Its Units.” Special Historical Series, 1985, 148 pp.

U.S, Army Signal Corps. Signal Achievement-Luzon, An Official Signal Corps History, May 14, 1945, pp. 1, 3.

U.S. Army. Extension course of the Army Security Agency School. Subcourse 20-7, Elementary Cryptanalysis, 1951, 94 pp.

U.S. Army. Elementary Military Cryptography, Special Text No. 165. Washington: USGPO, 1943, 82 pp.

U.S. Army. Cryptanalyst's Manual. (Section 1-3), Glossary of Terms. ASA Manual S-700, Sept., 1946, 41 pp.

U.S. Army. Technical Manual TM 11-5810-221-ESC, Equipment Serviceability Criteria for Communications Security Equipment TSEC/KW-7. Washington: USGPO, 1966, 10 pp.

U.S. Army. Advanced Military Cryptography, Special Text No. 166. Washington: USGPO, 1935, 113 pp.

U.S. Army. Field Manual FM 29-11, Cryptologistics Support to the Army In the Field. Washington: USGPO, 1967, 28 pp.

U.S. Army. Division Field Code No. 4, 1922, 91 pp. (Codes and Code Words)

U.S. Army Security Agency. Army-Navy Descriptive Dictionary of Cryptologic Terms. Army Security Agency, Feb. 1947.

U.S. Army Signal School. Introduction to Electronic Warfare. 1975, 52 pp.

U.S. Air Force. Performance Evaluation of Apprentice Cryptographic Operators, Graduates of ATC Course ALR 29131. March 1963, 13 pp.

U.S. Army War Dept. Field Manual FM 24-5, Basic Field manual-Signal Communications. Washington: USGPO, 1939, 293 pp.

U.S. Army War Dept. Technical Manual TM 11-467, Communications Security. Dec. 1944, 44 pp.

U.S. Army. Cryptanalyst's Manual. Cryptanalytic Data-General. War Dept., Office of the Chief Signal Officer, 1940, 26 pp.

U.S. Army. The "Potomac" Code. General HQ, A.E.F., 1918, 47 pp. (Codes and Code Words)

U.S. War Dept. Articles on Cryptography and Cryptanalysis Reprinted from The Signal Corps Bulletin. Washington: USGPO, 1942, 316 pp.

U.S. Navy Communications Intelligence Organization, Liaison and Collaboration 1941-1945. 1945, 39 pp.

U.S. Navy. Director of Naval Communications. Memoranda on the Congressional Investigation of the Attack on Pearl Harbor. 1946, 43 pp.

U.S. Library of Congress. The U.S. Inteligence Community: A Brief Description of Organization and Functions. Congressional Research Service, Nov. 10, 1971, 36 pp.

U.S. War Dept. An Encipherment of the German Diplomatic Code 7500, C.J. Mendelsohn. Washington: USGPO, 1938, 18 pp.

U.S. War Dept. Advanced Military Cryptography. TM 11-485. Washington: USGPO, 8 June 1944.

U.S. Army. Cryptanalyst's Manual. (Section 10-22), List of Words Used in Military Text Arranged Alphabetically According to Word Pattern (English), ASA, Nov. 1946, 23 pp.

U.S. Army. Cryptanalyst's Manual. (Section 10-21), List of Words Used in Military Text Arranged in Rhyming Order According to Word Length (English), ASA, Nov. 1946, 9 pp.

U.S. Dept, of the Army. Field Manual FM 11-21. Tactical Signal Communicationms Systems, Army, Corps, and Division. Washington: USGPO, 1961, 74+ pp.

U.S. Dept. of Defense. The Militarily Critical Technologies List. Washington: Office of the Under Secretary of Defense, Research and Engineering, 1984, 231 pp.

U.S. Dept. of the Army. Vietnam Studies. Communications-Electronics 1962-1970. Washington: USGPO, 1972, 184 pp.

U.S. Army. Cryptanalyst's Manual. (Section 10-20), List of Words Used in Military Text Arranged Alphabetically According to Word Length (English). ASA Manaul S-700, Nov., 1946, 9 pp.

U.S. Navy. Cryptology. Recruitment brochure, 1974, 20 pp.

U.S. Army. Basic Cryptography. Technical Manual TM 32-220, April 1950, 186 pp. (US Army-Materials on Cryptology).

U.S. Army. Military Cryptology. Instructor's Lesson Plans, CSD-13. Signal Corps Replacement Training Center, Dec. 1942, 68+ pp.

U.S. Army in World War II, The Technical Services.
Terrett, D. The Signal Corps: The Emergency (To Dec. 1941). Washington: Office of the Chief of Military History, USGPO, 1956, (1970 reprint), 383 pp.

U.S. Army in World War II, The Technical Services. Thompson, G.R., D.R. Harris, P.M. Oakes & D. Terrett. The Signal Corps: The Test (Dec. 1941 to July 1943). Washington: Office of the Chief of Military History, USGPO, 1957 (1971 reprint), 621 pp.

U.S. Army in World War II, The Technical Services.
Thompson, G.R. and D.R. Harris. The Signal Corps: The Outcome (Mid-1943 Through 1945). Washington: Office of the Chief of Military History, USGPO, 1966, 720 pp.

U.S. Army. Army Extension Course. Subcourse-Military Cryptanalysis Part I, Monoalphabetic Substitution Systems, ten lessons, 1936-37. Subcourse-Military Cryptanalysis Part II, ten lessions, 1937.

U.S. Army Regulations.
AR 105-31 Communications-Electronics Message Preparation and processing, 1969, 30 pp.
AR 310-25 Dictionary of U.S. Army Terms, 1969, 486+ pp.
AR 340-16 Safeguarding "For Official Use Only" Information, 1970, 7 pp.
AR 380-5 Safeguarding Military Information, 1944, 38+ pp.
AR 380-5 Safeguarding Defense Information, 1969, 31+ pp.
AR 380-26 Policy for Use of Encrypt-For-Transmission-Only (EFTO) Procedure, 1965, 3 pp.
AR 380-6 Automatic, Time-Phased Downgrading and Declassification System, 1962, 12 pp.
AR 380-41 Control of COMSEC Materiel, 1968, 30+ pp.
AR 380-55 Safeguarding Classified Defense Information In Movement of Persons and Things, 1971, 8 pp.
AR 380-150 Access To and Dissemination of Restricted Data, 1969, 10 pp.
AR 604-5 Clearance of Personnel For Access to Classified Defense Information and Material, 1969, 16 pp.

U.S. Air Force. Air Force Communications Network On-Line Operating Procedures. Feb. 1962, 21 pp.

U.S. Army. Field Manual FM 24-5, Signal Communication. Washington: USGPO, 1950, 220 pp.

U.S. Army. Field Manual FM 11-5, Signal Corps Field Manual-Mission, Functions, and Signal Communications in General. Washington: USGPO, 1940, 217 pp.

U.S. Army. Field Manual FM 11-125, Signal Communications, Dec. 1969.

U.S. Army Security Agency. Elements of Cryptography by Captain Roger Baudouin. Trans.from the French by Capt. A.E. Highley.

U.A. Army Security Agency. History of Converter M-134-C, Vol 1, Parts I, II, III. (Sanitized).

(The) United States Army Intelligence and Security Command 25th Anniversary. Fort Belvoir, VA., 2002, 79 p.

U.S. Army Security Agency. The Origin and Development fo the Army Security Agency 1917-1947. Laguna Hills, CA: Aegean Park Press, 1978, 51 pp.

U.S. Army Security. Historical Background of the Signal Security Agency, Vol. One, Codes and Ciphers Prior to WW I,1776-1917.ASA, 1946,139 pp. (Xerox, in binder.)

___________________.Historical Background of the Signal Security Agency, Vol.Two, World War I, 1917-1919. ASA, 1946, 246 pp. (Xerox, in binder.)

___________________. Historical Background of the Signal Security Agency, Vol. Three, The Peace,1919-1939. ASA,1948, 416 pp. (Xerox, in binder.)

U.S. Army. Index of Doctrinal, Training, and Organizational Publications. Washington: USGPO, 1971, 32 pp. Also Aug. 1970 edition, 112 pp.

U.S. Army. Historical Sketch of the Signal Corps (1860-1941). Eastern Signal Corps Schools Pamphlet No. 32, 12/10/42, 131 pp.

U.S. Army. AR 380-105, Policy and Procedure Governing Use of Code Words, Nicknames, Short Titles, and Similar Devices, 1968, 5 pp. (Codes and Code Words)

U.S. Army. Cryptographic Division.German Word List. Fort Monmouth, New Jersey, 9/26/1942, 194 pp. Restricted.Orange binding.

___________________________________. Italian Word List. Fort Monmouth, New Jersey, 9/26/1942, 211 pp.
 

____________________________________. Portuguese Word List. Fort Monmouth, New Jersey, 9/26/1942, 194 pp.

____________________________________. Spanish Word List. Fort Monmouth, New Jersey, 9/26/1942,196 pp.

U.S. Army. Advanced Military Cryptography. War Dept. Technical Manual TM 11-485, June 1944, 113 pp.

U.S. Army Security Agency. Guide-Army Security Agency School. May 1949, 10 pp.

U.S. Army. Field Manual FM 24-16, Signal Orders, Records and Reports. May, 1970.

U.S. Army Signal School. Communications Center Fundamentals, Subcourse C 13, Dec. 8, 1961, Fort Monmouth, NJ, 64 pp.

U.S. Army Signal School. Tactics and Technique of Signal Comunication for Infantry. Signal School Pamphlet No. 19. Official File Copy Telegraph Division. 1929-30, 219 pp.

U.S. Army Security Agency. The Achievements of the Signal Security Agency in WW II. Washington: Feb. 20, 1946.

_________________________. History of the Signal Security Agency. Vol. Three. The Japanese Problem: Cryptanalysis. 1942-1945. ASA, 13 May 1947. 435 pp.

U.S. Army Security Agency. Cryptologic Handbook. Washington: Dec. 1947, 62 pp.

U.S. Army. Cryptanalyst's Manual. Cryptanalytic Data Applicable to Any Language. War Dept., Office of the Chief Signal Officer, 1940, 16 pp.

U.S. Army Security Agency. Cryptanalysts's Manual (Section 1-1) Index. Washington, DC: Headquarters, A.S.A., Feb., 1947, 16 pp.

U.S. Army Security Agency. History of the Signal Security Agency. Volume One, Organization, Part II 1942-1945. 13 April 1948, 599 pp. (Xerox)

US Army Signal Center and School. Signal Reference Data. Fort Monmouth, NJ: 1966, 299 pp.

U.S. Army War College. Signals Intelligence Support to U.S. Military Commanders: Past and Present by Penelope S. Horgan. 1991, 164 pp.

_____________________. ULTRA: Its Operatioal Ude in the European Theater of Operations, 1943-1945 by Lt. Col. G. D. Gribble, Jr.,1991,80 pp.

_____________________. The Effect of Ultra on the World War II North African Campaign by Col. A.T. Carey, 1982, 53 pp.

_____________________. Magic and Ultra in the China-Burma-India Theater by Col. S.K. Fitzgerald, 1991, 76 pp.

U.S. Dept. of Commerce. Bureau of Standards. DES Modes of Operation - FIPS 81. Washington: Bureau of Standards, 1980, 26 pp.

U.S. Congress. Senate. Investigation of the Pearl Harbor Attack. Appendix E, The "Winds Code." Washington: USGPO, 1946, pp. 469-486. (Xerox)

U.S. Dept. of the Army. FM 32-6, SIGSEC Techniques. Washington: USGPO, 1977.

U.S. Dept. of Commerce. A Guide to Voice Scramblers for Law Enforcement Agencies. NBS Special Pub. 480-8, Dec. 1976, 34 pp.

U.S. Dept. of Commerce. Computer Security and the Data Encryption Standard. NBS Spec. Pub. 500-27, 1978, 135 pp.

U.S. Dept. of Justice. Voice Privacy Equipment for Law Enforcement Communication Systems. Washington: USGPO, May 1964, 22 pp.

U.S. Congress. Senate. Committee on Armed Services. Enhancing the Security of the U.S. Bill [S. 277] preventing disclosure of codes and ciphers. 1949, 5 pp. (Xerox)

U.S. Dept. of Commerce. Report of the Workshop on Cryptography in Support of Computer Security. Washington: Sept., 1977, 61 pp.

U.S. Congress. Senate. Committee on the Judiciary. Soviet Intelligence and Security Services, 1964-1970. A Selected Bibliography. Washington: USGPO, 1972, 289 pp.

U.S. Office of Naval History. Glossary of U.S. Navbal Code Words. Washington: USGPO, 1947, 33 pp.

U.S. Dept. of the Army. FM 32-7, Signal Security Instructional Packet. Washington: 1977.

U.S. Commission on Protecting and Reducing Government Secrecy. Report. Washington: USGPO, 1997, 231 pp.

U.S. Navy. Shipboard Communications. Bureau of Navy Personnel, NAVPERS 10806, February, 1949, 200 pp.

U.S. Navy Dept., Office of Chief of Naval Operations. Notes on Communication Security. Washington, DC: USGPO, 1935, 46 pp.

U.S. Navy. General Communications, prepared by Bureau of Naval Personnel, Feb., 1949. Marked Restricted.

U.S. Navy. Office of Chief of Naval Operations.Washington: Elementary Course in Cryptanalysis OP-20-GR

_________. Office  of the Chief of Naval Operations. Elementary Course in Cryptanalysis. OP-16-D-4. Revised 1942.

U.S. War Department. Advanced Military Cryptography, TM 11-485, 1944. Mineral, VA: Buckmaster Publishing, 1993, 113 pp.

U.S. Navy. General Communications. Bureau of Navy Personnel, NAVPERS 10805, February 1949, 192 pp.

U.S. National Archives. SRMA-005. Enemy Analysis of Allied Communications, 15 December 1944, 35 pp. (Xerox).

U.S. National Archives. SRH-038. A Selection of Papers Pertaining to Herbert O. Yardley, 192 pp. (Xerox).

U.S. National Archives. SRH-050. Riverbank Laboratory Correspondence, 1919, 12 pp. (Xerox).

U.S. Congress, Permanent Select Committee on Intelligence of the House of Representatives. Compilation of Intelligence Laws and Related Laws and Executive Orders of Interest to the National Intelligence Community. Washington, DC: USGPO, 1993, 675 pp.

U.S. Congress, Report of the Joint Committee on the Investigation of the Pearl Harbor Attack (volume 40). Washington, DC: USGPO, 1946, 580 pp.

U.S. Congress, Permanent Select Committee on Intelligence. House of Representatives. IC21: Intelligence Community in the 21st Century. Washington: USGPO, 1996, 379 pp.

U.S. Army Extension Courses. Subcourse: Military Cryptanalysis, Part IV Transposition and Fractionating Systems, 1941-42. (Introduction and Lesson 1, Lesson 2). Washington: War Dept. Office of the Chief Signal Officer, 5 pp. and 3 pp.

U.S. Congress. House. Committee on Armed Services. Inquiry Into the U.S.S. Pueblo and EC-121 Plane incidents. Washington: USGPO, 1969, pp. 1620-1696.

U.S. Dept. of Defense. National Security Strategy of Realistic Deterrence. Washington: DOD, 1972, 203 pp.

U.S. Department of Defence. The “Magic” Background of Pearl Harbor.Vol. I (Feb. 14, 1941-May 12,1941). USGPO, 1971, 53 pp.plus Appendix 73 pp.

___________________________. The “Magic Background of Pearl Harbor. Vol. II (May 12, 1941-Aug. 6, 1941). USGPO, 212 pp., ND.

___________________________. The “Magic” Background of Pearl Harbor. Vol. II, Appendix 609 pp. USGPO, 1978

___________________________. The “Magic” Backgrpound of Pearl Harbor. Vol.III, (Aug. 5, 1941-Oct. 17,1941) USGPO, 337 pp., 1978.

___________________________. The “Magic” Background of Pearl Harbor. Vol. III, Appendex, 662 pp., USGPO, 1978.

___________________________. The “Magic” Background of Pearl Harbor. Vol. IV, (Oct. 17, 1941-Dec. 7, 1941) USGPO, 281 pp.,1978.

___________________________. The “Magic Background of Pearl Harbor. Vol. IV, Appendix, 544 pp. USGPO, 1978.

____________________________. The “Magic Background of Pearl Harbor, Vol. V, 146 pp. USGPO, 1978.

U.S. Congress. House. Committee on Appropriations. Dept. of Defense Appropriations for 1973, Part 4, Research, Development, Test, and Evaluation. pp. 859, 861-862, 1157, 1161, 1188, 1201, 1234-1248.

U.S. War Dept. Report of the Chief Signal Officer, 1919. Washington: USGPO, 1919, 547 pp.

U.S. War Dept. Intelligence Section, OCSO. General Solution for the ADFGVX Cipher System. Washington: USGPO, 1934, 18 pp.

U.S. War Dept. Studies in German Diplomatic Codes Employed During the World War, C. J. Mendelsohn. Washington: USGPO, 1937, 104 pp. (Xerox)

U.S. Office of the White House Press Secretary. Two page release on changes in the U.S. intelligence community. 11/5/71.

U.S. War Dept. Manual No. 6. Chapter VI. Codes and Ciphers. Visual Signaling, 1910, pp. 84-97. (Xerox)

U.S. War Dept. Signal Corps Bulletin. Articles (ciphers and cipher problems) from #11-#21, #25, #28 and #38. (Xerox)

U.S. War Dept. Military Cryptography, Section II, pp. 204-220, of Basic Field Manual, Vol. IV, Signal Communication. (Xerox)

U.S. War Dept. Office of the Chief Signal Officer. Signal Book, U.S. Army, 1916, Document No. 500. Washington: USGPO, 1916, 64 pp.

U.S. War Dept. Office of the Chief Signal Officer. Manual of Cryptography by Genral Luigi Sacco. Trans. for the original. USGPO, Washing, 1941, 193 pp. Note by W.F. Friedman.

U.S. War Dept.Office of the Chief Signal Officer. Analysis of a Mechanico-Electrical Cryptograph, Part II, 1935, 128 pp. Xerox copy.

U.S. War Dept. Office of the Chief Signal Officer, Washington. In the late 1930s and early 1940s this office published a series of hardbound publications on cryptologic subjects, usually stamped with registration numbers. They became known as the Black Books from the color of their binding. Titles and other details on the cover were in gold print.Following are 15 titles in that series with one duplicate.

U.S. War Department. Office of the Chief Signal Officer. Restricted. Register No. 24. Manual of Cryptography by General Luigi Sacco. Translated from the original. USGPO, Washington, 1941, 193 pp. Note by W.F.Friedman.

____________. Articles on Cryptography and Cryptanalysis reprinted from The Signal Corps Bulletin. Restricted, 1942, Foreword by W.F. Friedman.1942, 316 pp.

____________. Confidential. Register No. 58. Further Applications of the Principles of Indirect Symmetry of Position in Secondary Alphabets by Frank Rowlett.1935, 29 pp.Autographed. Also second copy with Register No. 17.

____________. Confidential. Register No. 128. Notes on the Liaison Service and the Liaison Intelligence Service of the German Army During the World War. Foreword by W.F. Friedman.1935, 38 pp.

_____________. Confidential. Register No. 43. Final Report of the Radio Intelligence Section, General Staff General Headquarters American Expeditionary Forces. Forword by W.F. Firedman who credits Lt. Col. Frank Moorman,G.S. as author. 1935, 52 pp.

______________. Confidential. Register No. 124. German Military Ciphers From February To November 1918.Forward by W.F. Friedman who credits First Lt. J.R. Childs as main author.Friedman also contributed. 1935, 55 pp.

______________. Confidential. Register No. 42. Statistical Methods in Cryptanalysis Revised Edition by Solomon Kullback.1938, 194 pp.

_______________. Confidential. Register No. 59. Report of Code Compilation Section General Headquarters American Expeditionary Forces. December 1917-November 1918.Foreword by W.F. Friedman who names Capt. Howard R. Barnes as author. 1935, 44 pp.

_______________. Confidential. Register No. 79. General Solution for the ADFGVX Cipher System.1934, 18 pp.

_______________. Confidential. Register No. 53. The Principles Of Indirect Symmetry Of Position In Secondary Alphabets And Their Appplication In The Solution Of Polyalphabetic Substitution Ciphers by William F. Friedman.1935, 21 pp.

_______________.  Confidential. Register No. 89. Principles Of Solution Of Military Field Codes Used By The German Army In 1917.Foreword by William F.Friedman.1935, 28 pp.

_______________ . Confidential. Register No. 87. FIELD CODES Used BY The German Army During The World War by William F. Friedman.1935, 98 pp.

________________.For Official Use Only. Register No.55. Permutation Tables Involving A Feature Of Non-Transposability By Abraham Sinkov. Ph.D.1934. 8 pp. plus 3 Figures.

________________. For Official Use Only. Register No. 142. The Contribution Of The Cryptographic Bureaus In The World War by Yves Gyldén.1935, 87 pp. includes 2 page note by W.F. Friedman on the Russian Cipher System.

U.S. Congress. House. Committee on Armed Services. Review of Dept. of Defense Worldwide Communications. Phase II. Washington: USGPO, 1972, 16 pp.

U.S. Congress. House. Committee on Armed Services. Review of Dept. of Defense Worldwide Communications. Washington: USGPO, 1971, 42 pp.

U.S. War Dept. Office of the Chief Signal Officer. Principles of Solution of Military Field Codes Used by the German Army in 1917. Washington: USGPO, 1935, 28 pp.

U.S. Congress. House. Committee on Appropriations. Dept. of Defense Appropriations for 1972, Part 4 - Operation and Maintenance. pp. 59-60, 192-197, 201-202, 476-477, 683-690, 705-708, 1198-1199.

U.S. Dept. of State. International Radiotelegraph Conference, Madrid 1932. Washington: USGPO, 1934, 364 pp.

U.S. Congress. House. William F. Friedman. Report No. 260, Committee of the Judiciary, March 21, 1955, 84th Cong. 1st Session.

U.S. Congress. Office of Technology Assessment. Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information. Washington: USGPO, 1987, 187 pp.

U.S. Congress. Senate. Committee on Intelligence. SHAMROCK. Nov. 6, 1975, 7 pp.

U.S. Electronic Espionage: A Memoir. Ramparts, Aug. 1972, pp. 35-50.

U.S. Congress. House. Committee on Armed Services. Report of Special Subcommittee on Defense Agencies. Washington: USGPO, 1962.

U.S. Congress. House. Committee on the Judiciary. Frank B. Rowlett. Report No. 1689, Aug. 4, 1964, 9 pp.

U.S. Congress. House. Security Practices In the National Security Agency. Washington: USGPO, 1962, 23 pp.

U.S. Report of Army Pearl Harbor Board including Navy Court of Inquery: Finding of Facts. 84 pp.

Urban, Mark. The Man Who Broke Napolean’s Codes. NY: HarperCollins Pub., Inc., 2002, 348 pp.

Vail, A. The American Electro Magnetic Telegraph, Section: "Mode of Secret Correspondence." Philadelphia: Lea & Blanchard, 1845, pp. 46-52.

Valério, P.L.E. De la cryptographie: essai sur des méthodes de déchiffrement. 2 vols. Paris: 1893, 1896.

Valerio, Paul. De La Cryptographie: Essai sur les Méthodes De Déchiffrement. Paris: Libraire Militaire de L. Baudoin, 1893, 230 pp.

Van Tassel, D. Cryptographic Techniques pp. 121-130. Chapter from Computer Security Management, Prentice Hall. (Xerox)

Van Der Rhoer, E. Deadly Magic. NY: Charles Scribner's Sons, 1978, 225 pp.

van Tilborg, Henk C.A. An Introduction to Cryptology. Norwell, MA: Kluwer Academic Publishers, 1988, 170 pp.

Van Doren, Carl. Secret History of the American Revolution. NY: Viking Press, 1951, 534 pp.

Van der Vat, Dan. The Pacific Campaign World War II: The US-Japanese Naval War, 1941-1945. NY: Simon & Schuster, 1991, 430 pp.

van Rjndt, Philippe. Last Message to Berlin. NY: G.P. Putnam's Sons, 1984, 444 pp.

Van Dine, S.S. The Scarab Murder Case. NY: Charles Scribner's Sons, 1930, 328 pp.

Van Dyke, Janice. Captivating Cryptograms. NY: Sterling Pub. Co., Inc., 1996, 128 pp.

Van Tassel, Dennis. Computer Security Management. Englewood Cliffs, NJ: Prentice Hall, Inc., 1972, 220 pp.

V-Code: Code of the Vereinigung, des Wollfrandels e.v. Bremem, Germany: H.M. Hauschild, 1950, 213 pp.

Vernam, G.S. Cipher Printing Telegraphy Systems for Secret Wire and Radio Telegraphic Communications. Journal A.I.E.E., Feb. 1926, pp. 109-115. (Xerox)

Verne, Jules. A Journey to the Center of the Earth. NY: Dodd, Mead & Co., Inc., 1959, 226 pp.

Verne, Jules. Hector Servadac. NY: The F.M. Lupton Pub. Co., n.d., 286 pp.

Verne, Jules. Eight Hundred Leagues on the Amazon. NY: P.F. Colliers & Son, n.d., 409 pp.

Viaris, G.H.L. de. The Art of Deciphering Secret Dispatches. Trans. of 1893 publication (extract?)

Viaris, Marquis de H.L. Cryptographie. Trans. from the French. Paris: The Genie Civil, May-June 1888, No. 2-7, 47 pp. (Xerox)

Viemeister, Peter. The Beale Treasure: A History of a Mystery. Bedford, VA: Hamilton's. 1987, 236 pp.

Vines, Russell Dean. Wireless Security Essentials. NY: J. Wiley & Sons, 2002, 345 pp.

Volet, Ch. La Cryptographie. La Nature, 51 (1923):2, 188-192, 203-206. (Xerox)

Volkman, Ernest & Blaine Baggett. Secret Intelligence: The Inside Story of America's Espionage Empire. NY: Doubleday, 1989, 265 pp.

Volkman, Ernest. Spies: The Secret Agents Who Changed the Course of History. NY: John Wiley & Sons, Inc., 1994, 288 pp.

Volkman, Ernest. Warriors of the Night: Spies, Soldiers and American Intelligence. NY: William Morrow & co., 1985, 443 pp.

Volkman, Ernest. Espionage: The Greatest Spy Operations of the 20th Century. NY: John Wiley & Sons, Inc., 1995, 264 pp.

Vollemaere, Dr. A.L. The Deciphering of Mayan Hieroglyphic Writing. Memo from Belgium "Views and Syrveys" No. 162 1973, 47 pp. Brussels: Ministry of Foreign Affairs, External Trade and Cooperation in Development.

Volts, James D. Bibliography of Cryptography, 1938, 18 pp.

von Schwarzenhorn, Rudolf Schmid. Table Pad: Table De Transmutation Chiffrée. Paris: Boyveau & Chevillet, 1904, 31+ pp.

Voorhis, Harold V.B. Masonic Alphabets. Excerpt from A History of Royal Arch Masonry, Vol. III, 1956, E.R. Turnbull & R.V. Denslow, pp. 1355-1377. (Xerox)

Vorstelman, Carel. Geheimschriften. Amsterdam: H.J.W. Becht, 147 pp.

Voynich, W.M. A Preliminery Sketch of the History of the Roger Bacon Cipher Manuscript. Philadelphia: Transactions of the College of Physicians of Philadelphia, Vol. 43, 1921, 415-430. (Xerox).

Wadsworth, G. Secret Writing. London: 1881, 19 pp.

Wagner, Dr. F. Studies in the Art of Secret Writing. 1886-88. English trans.

Wagstaff, Jr., Samuel S. Cryptanalysis of Number Theoretic Ciphers. Boca Raton: Chapman & Hall/CRC, 2003, 318 pp.

Wallin, Vice Admiral Homer N. Pearl Harbor: Why, How, Fleet Salvage and Final Appraisal. Washington: USGPO, 1968, 377 pp.

Walling, Jr., V.C., D.B. Parker & C.C. Wood. Impacts of Federal Policy Options For Nonmilitary Cryptography. SRI Int., April 1981, 53 pp.+

Wark, Wesley K. Espionage: Past, Present, Future? Essex, England: Frank Cass & Co., Ltd., 1994, 159 pp.

Wark. Wesley K. The Ultimate Enemy: British Intelligence and Nazi Germany, 1933-1939. NY: Cornell University Press, 1985, 304 pp.

Warner, Philip. The Vital Link: The Story of Royal Signals 1945 1985. London: Leo Cooper Ltd., 1989, 353 pp.

Warner, Philip. Secret Forces of World War II. Chelsea, MI: Scarborough House/Publishers, 1991, 245 pp.

Watson, Bruce W. and Peter M. Dunn. Military Intelligence and the Universities: A study of an Ambivalent Relationship. Boulder, CO: 1984, 95 pp.

Watson, Douglas. NSA: Huge Vacuum Cleaner. Washington Post, March 2-4, 1975, 3-part series. Condensed version in Philadelphia Inquirer, March 16, 1975.

Watterson, Barbara. Introducing Egyptian Hieroglypics. Edinburgh, England: Scottish Academic Press, 1993, 152 pp.

Wayner, Peter. Disappearing Cryptography: Being and Nothingness on the Net. Chesnut Hill, MA: A P Professional, 1996, 295 pp.

Weber, H. Ein Beitraz zur Gerschichte der Dechiffrirhunst. Archivalische Zeitschrift, v. 2. Neue Folge, 1891, pp. 45-53. (Xerox)

Weber, Ralph E. The Final Memoranda: Major General Ralph H. Van Demem, USA Retr., 1865-1952: Father of U.S. Military Intelligence. Wilmington, DE: Scholarly Resources, 1986, 191 pp.

Weber, R.E. United States Diplomatic Codes and Ciphers 1775-1938. Chicago: Precident Pub., 1979, 633 pp.

Weber, Ralph. America's First Encrypted Cable. Studies in Intelligence, Vol. 36, No. 5, 1992. pp. 105-109.

Weber, Ralph E. Masked Dispatches: Cryptograms and Cryptology in American History, 1775-1900. Fort Meade, MD: National Security Agency, 1993, 236 pp.

______________. Maksed Dispatches second edition, 2002, 227 pp., 2002,

Weik, M.H. A Minimum "Ones" Binary Code for English Text. Ballistic Research Lab., Sept. 1958, 12 pp.

Weinberger, P.J. An Essay in Computer Security: Decrypting A Former Unix Crypt. Bell Labs Tech. Memo. 78-1271-20, Dec. 29, 1978, 5 pp.

Weintraub, Joseph. Cryptography, An Ancient Art. The American Hebrew, Jan. 31, 1941, pp. 7, 11.

Weintraub, Stanley. Long Day's Journey into War: December 7, 1941. NY: Truman Talley Books/Dutton. 1991, 706 pp.

Weiskopf, Victor. The Weiskopf Bigram Cipher. Washington: 1917, 12 pp.

Weiss, Georg. Actung Geheim. Wurzburg: Arena, 130 pp.

Weiss, Georg. Actung Geheim! Würzburg, Germany: Arena-Verlag, 1956, 116 pp.

Weiss, Wilfred. WRS VHFUHW. Mechanix Ill., May 1950, pp. 98-101, 184-185.

Welchman, Gordon. The Hut Six Story, Breaking the Enigma Codes. NY: McGraw-Hill, 1982, 326 pp. Inscribed by author.

________________.  The Hut Six Story, Breeaking the Enigma Codes. New edition with foreward by Alan Stripp. M & M Baldwin, Kidderminster, UK, 1997, 263 pp.

Welles, B. U.S. Said to Break All of Soviet's Codes. New York Times, July 16, 1972, pp. 1, 3.

Welschenbach, Michael. Cryptography in C and C++. Revised 2nd edition,. With CD-ROM. NY: Apress c/o Springer-Verlag, 2001, 432 pp.

Welsh, Dominic. Codes and Cryptography. NY: Oxford University Press, 1988, 257 pp.

Wenger, Capt. J.N. A Lecture on Communications Intelligence, August 14, 1946, 91 pp.

Werner, Alfred. The Most Mysterious Manuscript. Horizon, Vol. V, No. 3, Jan. 1963, pp. 4-9.

Wescome, John. Bletchley Park and the Luftwaffe: The Fall of France, the Battle of Britain and the Defence of Crete. Bletchley Park, England: BP Trust, Report No. 8, 1997, 28 pp.

Wescombe, John & John Gallehawk. Getting back into "Shark"; H.M.S. Petard and the George Cross. Bletchely Park, England: BP Trust, Report No. 5, 1997, 20 pp.

West, Nigel. A Thread of Deceit: Espionage Myths of World War II. NY: Random House, 1985, 166 pp.

West, Nigel. MI 5. NY: Stein & Day, 1981, 366 pp.

West, Nigel. The Circus - MI 5 Operations 1945-1972. NY: Stein & Day, 1983, 196 pp.

West, Nigel. The Secret Wireless War 1900-86. London: Weidenfeld & Nicolson, 1986, 294 pp.

West, Nigel. The Sigint Secrets: The Signals Intelligence War, 1900 to Today Including the Persecution of Gordon Welchman. NY: William Morrow & Co., 1988, 347 pp.

West, Nigel. Games of Intelligence: The Classified Conflict of International Espionage Revealed. NY: Crown Publishers, Inc. 1989, 248 pp.

West, Nigwel, ed. The Faber Book of Treachery. London: Faber & Faber, 1995, 442 pp.

West, Nigel. MI 6: British Secret Intelligence Service Operations 1909-1945. NY: Random House, 1984, 266 pp.

Westover, John G. A Civil War Secret Service Code. The Journal of Southern History, Nov. 1942, pp. 556-557.

Whaley, B. Codeword Barbarossa. MIT Press, 1974, 376 pp.

Whaley, Barton. Soviet Clandestine Communications Net. Cambridge: MIT, 1969, 199 pp.

Wheatstone, Sir Charles. Historical Document In Cipher, Instructions for the Employment of Wheatstone's Cryptograph. Excerpt from The Scientific Papers of Sir Charles Wheatstone, pp. 321-347. London: The Physical Society of London, 1879.

When BOMB is 6214. Review of The Codebreakers. Newsweek, Oct. 2, 1967, p. 48.

White, Maurice S. Secret Writing. Washington: The Washington Service Bureau, 1938, 24 pp.

White, G.E. Surplus Sidelights column describes TOTEM crypto tape mixing unit used with teletypewriter equipment. CQ, Oct. 1971, pp. 87-88.

White, Major J.A. Military Signal Corps Manual. NY: Wireless Press, Inc., 1918, 562 pp.

White, M.S. Cryptograms. Washington: Washington Service Bureau, 4 pp.

White, William. The Microdot History and Application. Williamstown, NJ: Phillips Pub., 1992, 158 pp.

White, Ared.  The Spy Net.  Cambridge, MA: Riverside Press, 1931, 323 pp.

Whitehead, Capt. Phillip B. Notes on the Liaison Service and the Liaison Intelligence Service of the German Army During the World War. Washington: USGPO, 1935, 38 pp.

Whitehead, David. COBRA (Manuscript) Bristol, England: David Whitehead, 1995, 30 pp.

Whitehouse, Arch. Espionage and Counterespionage: Adventures in Military Intelligence. Garden Citym NY: Doubleday & Co., 1964, 298 pp.

Whiting, Charles. The Spymasters. NY: Saturday Review Press, 1976, 240 pp.

Whittal, Jr., James P. Myth Makers: Epigraphic Illusion in America. Rowley, MA: Early Sites Research Society, 1991, 90 pp.

Whittal, Jr., James P. American Epigraphy at the Crossroads. Rowley, MA: Early Sites Research Society, 1991, 144 pp.

Why he Shake-Up In Intelligence. U.S. News & World Report, Nov. 22, 1971, pp. 40-41.

Why "Spy" Agencies Are Being Shaken Up. U.S. News & World Report, May 7, 1973, pp. 78-80.

Wickware, F.S. The Secret Language of War. Life, Nov. 26, 1945, pp. 63-70.

Widder, Arthur. Adventures in Black. NY: Scholastic Book Services,1966, 122 pp.

Wiener, C.G. Connie's Cryptos. NY: Games Pub., 1981, 96 pp.

Wiener, Michael et al. Advances in Cryptology – Crypto ’99. NY: Springer-Verlag, 1999, 639 pp.

Wig Wag Code. Spark-Gap Times, Dec. 1, 1963, pp. 31-32. Item copied from Blue Jackets Manual of 1902.

Wildman, Ted. The Expendables. Clearwater, FL: Ted Wildman, 1983, 332 pp.

Wilford, Timothy. PearlHarbor Redefined: USN Intelligence inn 1941. Lanham, MD: University Press of America, 2001, 144 pp.

Wilkes, George. Cryptography. 3-part article in Cosmopolitan, Feb. 1904, pp. 475-478; March 1904, pp. 584-590; April 1904, pp. 716-718.

Wilkins, J. The Mathematical and Philosophical Works of the Right Rev. John Wilkins. England: Frank Cass & Co. Ltd., 1970, 526 pp.

Wilkins, John.  Mercury: Or the Swift and Secret Messenger. Philadelphia: John Benjamin Pub. Co., 1984, 232 pp.

Wilkinson, Burke, ed. Cry Spy. NY: Dell Pub., 1976, 271 pp.

Wilkinson, Richard H. Symbol & Magic in Egyptian Art. NY: Thames and Hudson Inc., 1994, 224 pp.

William Friedman Dies; Broke Japanese Code. New York Times, Nov. 3, 1969.

Williams, H.C. Advances in Cryptology -- Crypto '85 Proceedings. NY: Springer-Verlag NY Inc., 1986, 548 pp.

Williams, J.M. Selected System Concepts for Encryption. 1978 National Telecommunications Conference. Vol. 1, pp. 26.3.1-26.3.5

Williams, E. An Invitation to Cryptograms. NY: Simon & Schuster, 1959, 123 pp.

Williams, Jr., Brig. Gen. C.E. Impact of LSI on the Family of TENLEY Secure Equipment. Signal, Aug. 1974, pp. 38-39.

Williams, M.R. A History of Computing Technology. Englewood Cliffs, Prentice-Hall Inc., 1985, 432 pp.

Williams, J.J. Cryptanalysis Techniques. Alamogordo, NM: Consumertronics Co., 1986, 16 pp.

Williams, Wayne R. The Dell Book of Cryptograms. NY: Dell Publishing, 1989, 95 pp.

Williams, Kathleen Broome. Secret Weapon: U.S. High-Frequency Direction Finding in the Battle of the Atlantic. Annapolis, MD: Naval Institute Press, 1996, 289 pp.

Williams, Wayne. Stan Lee presents Doctor Strange Mystic Number Puzzles. NY: Grosset and Dunlop, 1978, 64 pp.

Williams, Kit. Masquerade. Schocken Books, 1980, 39 pp.

Williams, Stephen. Fantastic Archaeology: The Wild Side of North American Prehistory. Philadelphia, PA: University of Pennsylvania Press, 1991, 407 pp.

Willoughby, E.E. The Bible Cryptogram Book. Boston: W.A. Wilde Co., 1949, 36 pp.

Wimsatt, Jr. W.K. What Poe Knew About Cryptography. PMLA, Sept. 1943, pp. 754-779.

Winkel, B.J. Cryptology: A Course To Think About. 1975, 4 pp., privately processed.

Winks, Robin W. Cloak & Gown: Scholars in the Secret War, 1939-1961. NY: William Morrow & Co., 1987, 607 pp.

Winn, Dilys. Murder Ink, The Mystery Readers Companion. NY: Workman Publishing Co., Inc., 1977, 522 pp.

Winn, Dilys. Murder Ink - Revised. NY: Workman Pub., 1984, 398 pp.

Winter, Ralph A. Secure Voice Communications. 10 page brochure, Jan. 1976.

Winter, Jack. Solving Cryptarithms. NP: American Cryptogram Association, 1984, 28 pp.

Winterbotham, F.W. The Ultra Secret. NY: Harper & Row, 1974, 199 pp.

Winterbotham, F.W. The Ultra Spy: A Autobiography. London: Macmillan London Ltd., 1989, 258 pp.

Winterbotham, F.W. The Ultra Secret. Book Digest magazine. Part I, May 1975, pp. 32-59; Part II, July 1975, pp. 74-96.

Winton, John. Ultra in the Pacific: How Breaking Japanese Codes and Ciphers Affected Naval Operations Against Japan. Annapolis, MD: Naval Institute Press, 1993, 247 pp.

Winton, John.  Ultra at Sea.  NY: William Morrow & Co., 1989, 207 pp.

Wisniewski, Richard I. Pearl Harbor and the USS Arizona Memorial, A Pictorial History.Pacific Basin Enterprises, Honolulu, Hawaii. 1986, 66 pp.

Wise, David & Thomas B. Ross. The Invisible Government. NY: Random House, 1964, 375 pp.

Wise, David & Thomas B. Ross. The Espionage Establishment. NY: Random House, 1967, 308 pp.

Wobst, Reinhard. Abenteur Kryptologie: Methoden, Risihen und Nutzen de Datenverschlüsselung. Bonn, Germany: Addison-Wesley-Longman, 1997, 360 pp. plus CD-ROM.

Wohlstetter, Roberta. Pearl Harbor: Warning and Decision. Stanford: Stanford University Press, 1962, 426 pp.

Wojtkiewicz, S.S. Sekret Enigmy. Warsaw, Poland: Iskry, 1979, 169 pp.

Wolfe, J.M. A First Course in Cryptanalysis. NY: Brooklyn College Press, 1943, Part I-187 pp.; Part II-208 pp.; Part III-185 pp.

Wolfe, J.R. Secret Writing. NY: McGraw-Hill, 1970, 192 pp.

Wood, Lt. Chester C. The Flow of Strategic Intelligence. US Naval Institute, Sept. 1933, pp. 1296-1304.

Woods, David L. A History of Tactical Communications Techniques. Orlando: Martin-Marietta Corp., 1965, 266 pp. plus app.

Woods, David L., ed. Signaling and Communicating at Sea. NY: Arno Press, 1980, two volumes.

Woods, E.F. Uncle Sam's Super-Hush-Hush Agency. St. Louis Post-Dispatch, Oct. 18, 1954.

Woodward, Bob. Veil: The Secret Wars of the CIA 1981-1987. NY: Simon & Schuster, 1987, 543 pp.

Woodward, Frank. Francis Bacon's Cipher Signatures. London: Grafton & Co., 1923, 88 pp. plus 72 pp. of illustrations.

Woodworth, H.S. A Simple Cipher Code. Letter to Editor, Scientific American, Oct. 2, 1915, p. 291.

Woolley, Sir Leonard. Digging Up the Past. Baltimore: Penguin Books, 1963, 142 pp.

Workshop on Selected Areas in Cryptography (SAC '95) Ottawa, Canada: School of Computer Science, Carleton University, 1995.

Worth,Jr., Roland. Secret Allies in the Pacific: Covert Intelligence and Code Breaking Cooperation Between the United States, Great Britain, and Other Nations Prior to the Attack on Pearl Harbor. Jefferson, NC: McFarland & Co., 2001, 214 pp.

Woytak, Richard. Polish Military Intelligence and Enigma. Boulder, CO: East European Quarterly, XXV, No. 1 (March 1991) 49-57.

Worstell, M.V. Tommy's Alphabet. Harper's Young People, Nov. 10, 1891, pp. 28-29.

Woytak, R.A. The Origins of the Ultra-Secret Code in Poland, 1937-1938. The Polish Review, Vol. XXIII No. 3, 1978, pp. 79-85.

Wren, Lassiter & Randle McKay. The Mystery Puzzle Book. NY: Thomas Y. Crowell Co., 1933, 180 pp.

Wright, Glover. Blood Enemies. NY: Arbor House, 1987, 244 pp.

Wright, John R., Phd. Secure Communications: Cryptographic programs for the inexpensive Timex?Sincliar Microcomputer, 13 pp.

Wright, Peter. Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer. NY: Viking Penguin Inc., 1987, 392 pp.

Wright, Michael, ed. The World At Arms: The Reader's Digest Illustrated History of World War II. London: The Reader's Digest Association Limited, 1989, 480 pp.

Wright, Bob. The Secret Code Mystery. Novato, CA High Noon Books, 1984, 44 pp.

Wrixon, Fred B. Codes, Ciphers and Secret Languages. NY: Bonanza Books, 1989, 266 pp.

Wrixon, Fred B. Codes and Ciphers: An A to Z of Covert Communications, from the Clay Tablet to the Microdot. NY: Prentice Hall General Reference, 1992, 260 pp.

Wrixon, Fred B. Harrap's Book of Codes, Ciphers, and Secret Languages. London, England: Harrap Books Ltd., 1989, 266 pp.

______________. Codes, Ciphers & Other Cryptic & Clandestine Communication. NY: Black Dog & Leventhal, 1998, 704 pp.

Wu, William W. Elements of Digital Satellite Communications, Rockville, MD: Computer Science Press, Vol. I, 1984, 607 pp.; Vol II, 1985, 642 pp.

Wylie, Jr. C.R. 101 Puzzles in Thought and Logic. NY: Dover Pub., 1957, unpaged.

Yardley, H. O. The American Black Chamber. Indianoplis: Bobbs-Merrill, 1931, 375 pp.

Yardley, H.O. The American Black Chamber. NY: Ballantine Books, 1981, 250 pp.

Yardley, Herbert O. The Beautiful Secret Agent. Liberty,    Dec. 30, 1933, pp. 30-35.

Yardley, Herbert O. Amerikas Svarta Kammare. Stockholm, Tiden, 1938, 280 pp.

Yardley, H.O. Yardleygrams. Indianoplis: Bobbs-Merrill, 1932, 190 pp.

Yardley, Herbert O. The Blond Countess. NY: Longmans, Green & Co., 1934, 314 p.

Yardley, H.O. Cryptograms and Their Solution. Saturday Evening Post, Nov. 21, 1931, pp. 21, 63-65.

Yardley, H.O. Codes. Saturday Evening Post, April 18, 1931, pp. 16-17, 141-142.

Yardley, Herbert O. Red Sun of Nippon. NY: Longmans, Green & Co., 1934, 247 pp.

Yardley, H.O. The American Black Chamber. Japanese edition, 467 pp.

Yardley, Herbert O. Secret Inks. Saturday Evening Post,  April 4, 1931, pp. 3-5, 140-142, 145.

Yardley, H.O. Ciphers. Saturday Evening Post, May 9, 1931, pp. 35, 144-146, 148-149.

Yardley, H.O. The Achievements of the Cipher Bureau (MI-8) During the First World War: Documents by Major Herbert O. Yardley. Prepared by the Office of the Chief Signal Officer, May 25, 1945, 15 pp.

Yardley, Herbert O. A Method of Obtaining the Primary Alphabet from Any One of Its Secondary Alphabets. Memorandum to: Chief, Military Intelligence Section, Jan 5, 1918, 4 pp.

Yardley, Herbert O. Ciphergrams. London: Hutchinson & Co., 1932, 190 pp.

Yardley, Herbert O. Stories of the Black Chamber – Secret Ink. 21 printed radio program scripts for 1935 radio serial aired 1/21/1935 – 3/8/1935. Covering letter sighned by H.O. Yardley. Cardboard bound with paper fastners.

___________________. Stories of the Black Chamber – The Spy Exchange. 22 printed radio scripts aired 3/11/35 – 4/29/1935. Covering letter signed by H.O Yardley. Cardbound with paper fastners.

Yardley, Herbert O. Le Cabinet Noir Americain. Paris: Editions De La Nouvelle Revue Critique, 1935, 249 pp.

Yardley, H.O. H-27, The Blond Woman from Antwerp. Liberty, pp. 22-29.

Yardley, H.O. Are We Giving Away Our State Secrets? Liberty, Dec. 17, 1931, pp. 8-13.

Yardley, H.O. The Education of a Poker Player. NY: Simon & Schuster, 1957, 129 pp.

Yardley, H.O. The Chinese Black Chamber. Boston: Houghton Mifflin, 1983, 225 pp.

Yardley, H.O. The Commissioner Turns Cryptographer. Detection Fiction Weekly, pp. 45-57.

Yardley. H.O. and Carl Grabo. Crows Are Black Everywhere. NY: G.P. Putnam's Sons, 1945, 247 pp.

Yardley, H.O. Correspondence. Includes letters, 1953-1959 to and from his agent, friends, etc. After he died, the coorespondence is between his wife and friends trying write a biography of Yardley.

Yasaki, E.K. Encryption Algorithm: Key Size is the Thing. Datamation, March 1976, pp. 164, 166.

Yerian, Cameron and Margaret Yerian, eds. Fun Time Activities: Codes & Mystery Messages. Chicago: Childrens Press, 1975, 46 pp.

Yerian, Cameron & Margaret, eds. Codes & Mystery Messages. Chicago: Childrens Press, 1975, 50 pp.

Yoshikawa, T. and Lt. Col. N. Stanford. Top Secret Assignment. U.S. Naval Institute Proceedings, Dec. 1960, pp. 27-39.

Yost. G. Spy-Talk. NY: Facts on File Pub., 1985, 288 pp.

Young, A.K. The Secret Fate of Fitchew. Ellery Queen's Mystery Magazine, Jan. 14, 1980, pp. 16-29.

Young, Irene. Enigma Variations: Love, War and Bletchley Park. Edinburgh,UK, 2000, 181 pp.

Zacharias, Ellis M. Secret Missions. NY: G.P. Putnam's Sons, 1946, 433 pp.

Zanotti, Mario. Crittografia. Milan, Italy: Ulrico Hoepli, 1976 reprint of 1928 book, 154 pp.

Zanotti, Mario. Manuale di crittografia. English translation. Milan: Ulrico Hoeph, 1928, 126 pp.

Zanotti, M. Cryptography - Secret Writing. Translated from the Italian, 70 pp.

Zaugg, Harold E. The Ultra-American: The Life of a Missionary Educator Who Served His God and Two Countries. Lake Forest, IL: Harold E. Zaug (unpublished paper), 1991, 149 pp.

Zauzich, Karl-Theodor. Hieroglyphs Without Mystery: An Introduction to Ancient Egyptian Writing. Austin, TX: University of Texas Press, 1992, 121 pp.

Zim, Herbert S. Codes and Secret Writing. NY: William Morrow & Co., 1948, 154 pp.

Zim, Herbert S. Codes and Secret Writing. NY: Scholastic Book Services, 1967, 115 pp.

Zim, Herbert S. Codes and Secret Writing. London: Pan Books, 1977, 126 p.

Zimansky, C.A. William F. Friedman and the Voynich Manuscript. Iowa City: U. of Iowa, Philological Quarterly, Vol. XLIX, No. 4, (Oct. 1970)433-443.

Zimmermann, Philip R. The Official PGP User's Guide. Cambridge, MA: The MIT Press, 1995, 127 pp.

Zlotnick, Jack. National Intelligence. Washington: Indistrial College of the Armed Forces, 1964, 75 pp.

Zolo, Don. Legion of Roots. City of Industry, CA: General Means Inc., 1982, 178 pp.

Zolton, Revay. Titkosirasok. Budapest: Zrinyl Katonai Kando, 1978, 240 pp.

Zorpette, Glenn. The Edison of Secret Codes. NY: The American Heritage of Invention & Technology, Summer, 1994, Vol. 10 /No.  1, pp. 34-43 (Illustrated).

_______________. Breaking The Enemy’s Code. NY:IEEE Spectrum, Vol. 24 No 9, September 1987, pp. 47-51.
 

CIPHER DEVICES, MACHINES, ETC. (START)

Circular grille, KAL-SSB. With operating instructions,Code Tables and settings for Day 18.

Cipher machine code wheels/rotors(plastic).U.S.,machine unknown.

CP-III Manual Encryption Device. Uses a polyalphabetic substitution system to transmit information. Includes encryption board, message sequence generator and enciphering/deciphering tables with 20-page instruction manual. Concord, MA: Technical Communication Corp.

Hagelin C-446A cipher machine. A.B. Cryptoteknik, Stockholm, Sweden.

Hagelin C-52 cipher machine.(possibly jammed) Zug, Switzerland: Crypto AG.

C-389-A. A.B. Cryptoteknik, Sweden.

CD-57. New, with extra set of key wheels, and manual. Zug, Switzerland: Crypto AG.

Hagelin Cryptos Type BC-543. An electrically driven version of the C-446-A with manual. Stockholm, Sweden: A.B. Cryptoteknik.

Pocket Cipher Disk. Boston, MA: Army and Navy Signal Publications, 1917.

Printer Unit Model #109000 made for NSA by Teletype Corp. 3/54. For use in SIGABA (?).

SIGABA Index Rotor (W/O wiring)

SIGABA Rotor (Wiring removed)

Slidex RT Code with folding case, code cards and cursors, long and short. Case has frame to hold card and cursors. Includes instructions. Designed for use by Allied forces for invasion of Normandy.

Sliding code device marked SECRET. Possibly produced overseas by local U.S. Navy unit.

Swedish cipher machine HC-9

TST 1221 Pocket Cipher Set with a key period of 1080  to the 80th. Microprocesor controlled with C-MOS integrated circuits. New with charger and instructions. Poecking, Germany: Tele Security Timmann.

U.S. Army Signal Corps, Celluloid Cipher Disk (ca.1910).

U.S. Army Signal Corps 30-strip cipher device, M-138-A, folding aluminum board, with simulated strips and original carrying case, 1938.

Another M-138-A with simulated strips w/o carrying case.

U.S. Army Signal Corps. M-209-B. L.C. Smith & Corona Typewriter, Inc. New condition with manual, all accessories and carrying case.

U.S. Army Signal Corps. M-94 cylindrical pocket cipher device with 25 disks.

U.S. Army M-325 (Invented by W.F. Friedman)

U.S. Army Tape Coder, MX-4496/GRA-71

U.S. Coding Device marked M9. Rectangular (3½” x 7”) rotating code device.

U.S. Navy. Bureau of Naval Personnel. Training Aid 40-061 for Semaphore Signalling.

U.S. Navy 30-Strip Cipher Device (Penelope System(?) Folding aluminum board. Similar to U.S. Army M-138-A but smaller. Contains many of the original strips.

Swiss (NEue Maschine) NEMA Cipher Machine. Type T-d No. 261. Zellweger A.C.
CIPHER DEVICES, MACHINES, ETC. END.
 

DESCRIPTIVE LITERATURE – CIPHER MACHINES AND CIPHER DEVICES START.

a.b. Cryptograph. Portable cryptograph type A-22, Electro-Cryptographer type B-13. 4 pp. leaflet.

Aktiebolaget Cryptograph catalogue, 1922, 22 pp.

Ciphering Typewriter – Enigma. 16 pp. brochure.

Com/Tech Systems Inc. Secre/Data Models 101-114.

Data Transmission Sciences, Inc. Telephones for Voice Privacy. Descriptive literature.

Datotek, Inc. Datacoder model DC-110, Datacoder 108, Datacoder model DC-105. Descriptive literature on each model plus advertising.

DDT 970, Computer Cryptographic System brochure. TKG, W. Germany. Timmann Tele-Kommunikations, Geraete.

Com/Tech Systems Inc. Secre/Data Models 101-114, descriptive literature plus Electronic News photo (9/6/91).

Ciphering Typewriter - Enigma. 16 page brochure.

Card Key Systems. Securiti-Lock Access Control Systems and Machine Readable Credentials.

Cyberlock Data Encryption. Uses 56-bit high-level Data Encryption Standard plus addition of Random Coding and Random Transpostion for added protection. Design Automation Systems  Inc., Houston, TX.

Crypto AG. Brochures on H-4605 Cryptrol, Cryptoplex MCC 314, Cryptovox CSE-280, Cryptovox cvx-396 CV-196,  Cryptocom CRM-008, Tape Translator PEH-72

Crypto AG (Hagelin-Cryptos) Binder (36 pp.) containing brochures describing CD-57, C-52, B-621, PEB-61 and TCE-55.

Crypto AG (Hagelin-Cryptos) Binder (21 pp.) with brochures describing the new ciphering machine Type H-460, The Shift Register, and the “MM” Movement.

Crypto AG (Hagelin-Cryptos) Binder. Description of CRYPTOGRAPHERS “HAGELIN” TYPE CX-52. 36 pp. plus 14 illustrations. Aug. 1956.

____________________________. Effect of computers on the security of Hagelin cryptographer type C-52. Oct. 1962, 7 pp.

____________________________. Electronic On-Line Cipher Equipment Cryptrol Cryptographer Type H-460, VFH/UHF Voice Ciphering transceiver Cryptovox cse-280. (Descriptive color brochures)

____________________________. Usage of Hagelin cryptographer C-52. 10/10/62, 27 pp.

____________________________.Cryptomatic HC-500 System. Brochure No. 250.

____________________________. Crypto Presents Crypto. Large glossy full color illustrated brochure with description abd photographs of its facilities.

Crypto Industries. Model 213 Crypto Generator. (Decriptivr folder.)

Data Transmission Sciences, Inc. Telephones for Voice Privacy.(Descriptive literature)

Datotek, Inc. Datocoder Model DC-110, Datocoder 108, Datocoder Model DC-105.

DDT 970, Computer Cryptographic System brochure. West Germany: Timmann-Tele-Kommunikations.

Description et Fonctionnement du Cryptographe Hagelin B-211. Paris: La Techniques Française, 16 pp. plus 6 pp. of diagrams of B-211.

DH-26 Handheld Encryption Unit. A Learnig Text Owner’s Manual. Dallas, TX: Datotech, Inc. 1972, 30 pp.

Directions for Captain Sommerfeldt’s Secret Writing Apparatus, 1883. Copy of Danish paper plus English translation.

Equipment Serviceability Criteria for Communications Security Equipment TSEC/KW-7. Washington, DC: Dept. of the Army Technical Manual TM 11-5810-221-ESC, 12pp.

Evans Jr., A. and W. Kantrowitz. A User Athentication Scheme not requiring Secrecy in the Computer. Communications of the ACM, Aug. 1974, 437-442.

Exhibition at Eurocrypt ’87 Amsterdam. Brief descriptin of 17 cipher devices/machines.

Gretacoder 101 Speech Scrambler.

Gretacoder 905 spec sheet.

Gretag, The Concept of Ciphering, 11 pp.

Gretag TC-800 Automatic off-line ciphering system. Business coder System. Descriptive literature on each.

Gretag TC 802/B. 5pp.

Gretag. Im Dienate Militärischer Nachrichten-übermittlung. CIBA-Blättern No. 216, Juli/Aug, 1968.

Gretag. Your partner in communications Security. Encryptio, Authentication, Indentification. 4-page folder featuring Gretacoder 518, 519, 715, and 517.

Guide to the use of Gr. Orloff’s Cipher Machine. Copy of Danish paper plus English translation, 12 pp.

Ground/data Corp. Data Sequestor model JJC-3. Voice Sequestor Developmental Model 201. Ground/data Corp.

The Concept of Ciphering. Regensdorf-Zurich, Switzerland: Gretag Ltd., 1966, 6 pp.

The Japanese Jade, Coral, Purple and Red Machines. Two page summary for each machine. First page describes enciphering operation and second page is a flow chart of the enciphering process.

The Secret Manual for the Siemans Teletypewriter Type 52 (Geheimschreiber) Berlin, 1937. Produced by the Supreme Command of the Navy, 57 pp.

The Hagelin Cryptographer. March 25, 1948, 4 pp.

_________________________. Ciphering machine type B-211 and C-36. Dec. 1936.

_________________________. Type C-48A. Maech 1942, 10 pp. + 2 photographs.

_________________________. Type CX-52 (Condensed instructions) Zug, Swutzerland: May 1955, 12 pp. + 4 photographs.

_________________________. Type C-52. Instructions for operation. Zug, Switzerland: 32 pp. + 8 illustrations, 6/7/60.

________________________. Type C-446A. July 1946, 12 pp.

U.S. War Dept. Technical Manual 11-380. Converter M-209-B, 20 Sept. 1943, 42 pp. (TM 11-380B).

The Hagelin Cryptographers. March 25, 1948, 4 pp.

The Hagelin Cryptographers, Ciphering Machines type B-211 and C-36. Dec. 1936.

The Hagelin Cryptographer type C-446A. July 1946, 12 pp.

History of Converter M-325. Washington: National Archives, 47 pp.

U.S. Army Security Agency. Operating Keying Instructions for Converter M-325 (T). July 1948, 20 pp.

Herbern Electric Code, Inc. Copy of booklet on Hebern code machine plus 2 US Navy reports on tests of Herbern machines.

Hughes Microelectronics System Div., CA. Folders on communications security products.

IBM. White Plais, NY. Brochures on data encryption devices and publications. IBM 3844 cryptographic unit. Produce description and operating procedures.

Instructions for hemmelig skrift. Krisliania, Norway, 1916, 11 pp.

Intellicon. Chatsworth, CA. Brochures on microcipher data security system.

Jeray Proc. The KL7 off-line crypt unit. 3 pp.

Bedienungsanweising zur Chiffriermaschine "Kryha-Standard."  10 pp.

The Kryha Ciphering and Deciphering Machine. Description and instructions. 28 pp.

Die Kryha – Chiffrier-Maschine. 12 pp.

Grimsen, G. Cryptographic Telegraph Equipment Mi 544. Electrical Communications No. 3, 1958, pp. 209-214.

Kryha Standard & Liliput plus other models.

Lynch Communications Systems Inc. Solid State Spech Scrambler E75.

Livert Voor Chiffreermachines Hagelin C-446-A. Netherlands Naval Communications Maintenance Log for C-446-A. 2/16/49. 6 pp.

Marconi Communications Systems, Chelmsford, England. Brochures on security products.

Marconi Space and Defense Systems. 7 brochures.

Mieco, Division of Polarod Electronics Corp.Leaflets, descriptive sheets and price list for scramblers.

Motorola Data Security Modules booklet.

Motorola Info-guard Secret Code System

Motorola, Inc. Scottsdale, AZ: Brochures/ads on security products.

Objects in Cipher Machine Exhibit. The National Museum of American History. 1981-1982. Washington: Smithsonian Institute, 11 pp.

Operating and Keying Instructions for Converter M-325(T). Headquarters, Army Security Agency, July 1948, 20 pp.

Operatig Instructions for Converter M-161-c, short title SIGLSV (redacted copy). Washigton: WD, Office of the CSO, 24 pp.

Operatig Instructions for the Enigma Cipher machine dated Jue 12, 1940. Ciphering instructions for the Enigma, 6/8/37.
Ciphering Instructions for the Enigma Cipher Machine dated June 8, 1937.

Operation manual for ciphering machine HC-9. Complementary description of the cryptologic function of the H-C machine. Stockholn, Sweden: Ab Transvertex.

Philips Defense Eletronic. Jarfalla, Sweden: Brochires and folders on HADAX Digita; Message Device 9 SB 600.

9 EC 450. Philips on-line Crypto Eequipment brochure.

Philips On-Line Crypto Equipment. Brochure.

Product survey and presentations of Transvertex – producers of ciphering equipment. Details on HC-9, TA-1, TC-13, SR-22, SRL-12 and SV-22. Norsborg, Sweden: AB Transvertex, 4 pp.

Racal-Datacom Ltd. Salisbury, England. Brochures MA 4210 Alphanumeric Pocket Cipher.

Racal Milgo, Miami, FL. Brochures and articles on security products.

Ricoh Corp. West Caldwell, NJ. Brochuires on security  equipment.

Rockex Cipher Machine. Documents from Australian archives.

Rockwell International. CR-300 Encryptor Card. 1 page.

Secure Computing Corp, Roseville, MN. Three folders describing security equipment.

Securiti-Lock Access Control Systems and Machnine Readable Credentials. Card Key Systems.

Security Systems Int. Folder on Secure Communications Terminal, SSI Fatype; Alpha Numeric Data Cipher System, DC-24 Series; color photo.

Several foldrs on security products. Tucker, GA: AO Electronic, Inc.

Standard Security Systems. Catalog and price list. June 1, 1971.

TM 11-5835-224-12. Operator and Organizational Maintenance Manual, Coder-Burst Transmission Group AN/GRA--71. Washington, DC: HQ, Dept. of the Army, May 1964, 76 pp. plus June 1966 update, 19 pp.

Technical Communications Corp. Concord, MA. Brochures on communications security equipment.

Technical Communications Corp. Data Privacy System, DPD-72 and other privacy devices.

Tele Security Timmans (TST) More than 14 product sheets and folders on cipher machines plus manual for TST 1221.

Telsy six pp. folder on Scrambler secure communications plus 4-page folder on TDS 1000 series.

TM 11-380. Technical Manual. Converter M-209. Washington, DC: War Dept., April 27, 1942.

TM 11-380B. Technical Manual. Converter M-209-B. Washington, DC: War Dept., 20 Sept. 1943, 46 pp. (2).

TM 11-380. War Dept. Technical Manual. Converter M-209, M-209-A, M-209-B (cipher). Washington, DC: War Dept., 17 March 1944, 79 pp.

TM 11-380. War Dept. Technical Manual. Converter M-209, M-209-A, M-209-B (Cipher). Washington, DC: War Dept., May 1947, 170 pp. (2) plus 6 pp. update, 10 April 1951.

U.S. War Department. Technical Manual TM 11-380, RESTRICTED, Converter M-209, April 27, 1942, 32 pp. + 2 foldouts of M-209.

____________________. Technicl Manual TM 11-380, Converter M-209-B, 20 September 1943, 42 pp. + 2 foldouts of M-209-B. 2 copies.

_____________________. Technical Manual TM 11-380, Converter M-209, M-209-A, M-209-B (cipher), 17 March 1944, illustrated, 79 pp.

_____________________. Technical Manual TM 11-380, Converter M-209, M-209-A, M-209-B (cipher), May 1947, illustrated with five chapters: Introduction, Operating Instructions, Preventive Maintenance, Auxiliary Equipment, and Repair Instructions plus 6 appendices. 170 pp. 2 copies.

U.S. Army Signal Corps Message Book M-210 (2 copies)

SRMA-003. U.S. Converter M-228 (Short Title SIGCUM), 10 pp.

Type C-36. French War Dept. Instruction Manual. 14 pp.

Vérifications du Cryptographe B-211 Sérce F. 4 pp.

Xanthos Xoftware, Inc. Cipher/1 module.
DISCRIPTIVE LITERATURE – CIPHER MACHINES AND CIPHER DEVICES END

VIDEO/AUDIO TAPES start

Decoding Nazi Secrets. Boston: WGBH, NOVA Special, 11/9/99, 2 hour TV program.

Codebreakers. Boston: NOVA, WGBH, 1993, 1 hour TV program.

Hinsley, Sir Harry. Colossus and the German High Grade Cyphers. England: History of Technology Meeting,3/26/87, Two audio tapes.

History Mysteries: America’s Most Secret Agency. NY: History Channel, Videotape,1 hour., 1/8/01.

Look What I Found. Making Codes and Solving Mysteries. Projects and Activities. Cambridge, MA: Intervideo,Inc., 45-minute videotape.

Navaho Code Talkers: The Epic Story. Glendale, CA: KCET/DIMAC, Videotape, 55 minutes.

Randell, Brian et al. Code Breaking Computers of 1944. England: History of Technology Meeting, 3/26/87, two audio tapes.

Rendezvous. 1935 MGM film with William Powell & Rosalind Rissell. 91 minutes (Videotape). Based on book by Herbert O. Yardley, The Blonde Countess.

Sekret Enigmy. Videotape. Sarasota, FL: POLart, 1979, 158 minutes.

60 Minutes. The Ultra Secret. TV Script. CBS TV, Aug. 3, 1975.

The Secret Code. 1942 15-chapter serial with Paul Kelly. With code lessons by Henry Lysing at end of each chapter. Columbia Pictures. (Videotape)

The Secret War, Vol. 3, Deadly Waves & Still Secret. Nashville, TN: British Regalia Imports, Videotape, 102 minutes.

Sworn to Secrecy: Battle of the Atlantic. NT: The History Channel,Secrets of War, 1998, 1 hour videotape.

Sworn to Secrecy: Breaking the Japanese Code. NY: The History Channel, 1 hour videotape.

Sworn to Secrecy: The Ultra Enigma. NY: The History Channel,  Secrets of War, 1998, 1 hour.

Sworn to Secrecy: The Ultra Enigma and Battle of the Atlantic, The History Channel, 1 hour videotape.

U.S. War Dept. Training Film for M-209. Video tape. VIDEO/AUDIO TAPES. end

MISCELLANEOUS. START
Advertising Post Card Coded Message. Palmer, MA: E.S. Gibbons, dealer in boots and shoes.

Advertising Poster, 48”x13” for Cadbury’s Caramilk Bar featuring a cipher.

Coleman, William. Letter dated June 14, 1796 contains message in old shorthand system. Coleman was friend of Alexander Hamilton and editor/publisher of New York Post.

Commemorative medal of Boris Hagelin issued by Crypto-AG, 1955.

Conet Project: Recordings of Shortwave Numbers Stations. London: IRDIAL-Disks, 1997. irdial@irdialsys.win-uk.net

Framed First Day Cover of Polish postage stamp issued to commemorate the 50th anniversary of breakig German Enigma cipher machine messages by the three Polish cryptanalysts pictured on the cover. Includes strip of five postage stamps.

Framed first day covers(2)of U.S. postge stamp celebrating “Allies decipher secret enemy codes,” 1942.

Framed series of six Austrian postate stamps featuring secret writing.

Framed stamps issued by Egypt and France in 1972 to commemorate the 15oth anniversary of the decipherment of the Rosetta Stone by J.F. Champollian.

Lecture Bureau 4-page, 8 ½ ”x 11”, folder promoting Donald Millikin, Code and Cipher Expert as a speaker on Secret Communications and related topics.

Littlefield, Jack. BIINC (Melancholy Notes on a Cablegram Code Book). Reprinted from the New Yorker. New York: Acme Code Company, 8 pp.

Mann, Alan. Charts & Ciphers. An artist’s interpretation. “The five ‘ciphers’ have elements of language within them.” The five charts contain elements of travel or of a voyage. Ballarat, Victria, Australia: This book is #20 in an edition of 60. Packaged in a black wooden box with a sliding cover.

Photograph of W.F. Friedman, Col. G. Fabyan, E. Smith (Friedman) & others, seated in front of U.S. Army officers who had just completed 1918 training course in cryptology by Friedman. They are posed to depict the message, “Knowledge is Power” in the Baconian cipher. (Full size framed copy, 48”x15”)

Post Card with photograph of The Phaistos Disk

Poster (framed-18”x24”) Old Time Radio Premiums, Decoders, etc..

The Poly-Alphabets-Riverbank Laboratories-Geneva, Illinois. Pencil imprinted with alphabets (1917?)

U.S. Army Insignia.
Army Security Agency 2nd Signal Co., ASA Signal School 3rd Signal School, Signal School 5th Signal Bn.,U.S. Signal Corps (Enamel) 93rd Signal Bn., U.S. Army Signal Corps (Brass) 123rd Signal Bn., U.S. Army Signal Corps (Patch) 212 Signal Bn., Military Intelligence 1962, 560 Signal Bn. Reserve Army Security Branch.
MISCELLANEOUS END

NON-MILITARY Ciphers,DEVICES/CODES: AMATEUR,JUVENILE,DECODERS,ETC. START

Alphabet slide rule.

Bobby Benson’s Code Book. Uses Playfair cipher as Bobby’s own code. Hecker-H-O Company, Inc. 1935, 24 pp.

Bobby Benson’s Code Rule. Hecker-H-O Co.,Inc.. 1935

Buck Rogers Satellite Pioneers – How to Write in Code. 4-page leaflet.

Buck Rogers TWIKI Communications Set. Includes two cipher disks. Long Beach, NY: H.G. Toys Inc.

Burnoy,Codemaker, Six-level cipher disk. Chicago, IL: B.W. Burke, 1934.

Cap’n Crunch Detective Kit Official Code Breaker. (1986).

Cap’n Crunch Sercet Decoder.

Cap’n Crunch Detective Crunch Squad with official Code Breaker. 1970s.

Captain Midnight Dial Code-o-Graph. Brass decoder, 1941.

________________ Key-O-Matic Code-O-Grapg. Brass Decoder, 1949.

________________ Photomatic Decoder. Brass Badge, 1942.

________________ Mirro-Magic Brass/Plastic Decoder, 1948.

________________ Mirro-Flash Code-O-Graph. Brass Decoder, 1946.

________________ Captain Midnight Silver Dart “SQ” Jet Plane Decoder. Plastic Badge, 1957.

________________ Whistling Code-O-Graph. Plastic Decoser, 1947.

Chex Agent Ring Decoder.

Cipher Disk (Plastic with container) Naval Electronics Systems, Security Engineering Center.

Representation of the Confederate Cipher Disk, circa 1863. Naval Electronic Systems, Security Engineering Center.

Crypto AG Cipher Disk, with instruction sheet, has blank spaces for user to fill with cipher alphabet. Disk allows user to select cipher key. (Plastic promotion item) Zug, Switzerland: Hagelin-Cryptos.

Code-A- Graph, alternating letter code system. Playganes Inc., 1934.

Code and Decode Message Kit. Includes battery operated telegraph key, code & decode cipher disk and a grille. Bklyn, NY: Pressman Toy Corp., 1957 (?).

Code-Maker Slide Rule with Three Alphabet rows and two rows of numbers. Chicago, IL.: Fun Inc.

Crypt-Fun Puzzles for the Crypto fan. 1938 game invested by R.B. Reimer.

CRYPTEX Hardware Encryption Package for Computers. 1977.

The Crypto-riter.

The Crypto-Set-A Mechanical System of Secret Writing. “Headquarters” Army Game invented by R.B. Reimer. 1937.

Dan Sorkin’s Nifty KSFO Decoder and Love Object.

Dick Tracy “Code-Maker.”

Dick Tracy Grille Decoder.

Dig ‘EM’s Secret Decoder. Kellogg, 1988.

Dragnet Code Chart. Cipher Disk, 1955.

Need to Know Electronic Decoder H10-100. Mt. Holly, NJ: Franklin Electronic Publishers.

HNF German Krypto Disk (5 ½” Cardboard). Paderborn, Germany: Heinz Nixdorf Forum.

Hoppy’s Secret Code. Hopalong Cassidy Badge.

Hush Puppies Club 26 Secret Password Decoder. Wolverine World Wide Inc.1968.

Inter-Galactic Space Decoder (Large), 1978.

Jackson, Robert. Secret Codes: Create and Send Your Own Hidden Messages and Cryptic Communications. (Includes two Jefferson wheels, Morse code units, semaphores, and more.) Philadelphia) PA: Running Press Books Pub., 2002, 32 pp.

Junior Federal Agent Secret Code Chart. NY: Transogram Co., Inc. 1947.

Magic Monster Decoder (cardboard).

Marvel Super Heroes Secret Wars Decoder Wheel, 1984.

Motorola Info-guard Secret Code Syatem. (Large cioher disk with 50 positions.)

Mystery Code Finder. A master code wheel for sending and receiving secret messages. Contains the new International Phonetic Alphabet and how to use it in secret messages.

Mystery Writing: The Wonders of Secret Ink as use by Spies in the Great War. Included instructions for using ther Code-O-Graph. Playgames, Inc., 1934.

Ovaltine Secret Decoder Ring. Ca. 2000.

OUI Decoder Cipher Ring. NY: OUI Magazine, 1974.

Promotion poster for OUI Decoder Cipher Ring.

P.F. Dolphin « Magic Whistle » with message flasher, Decoder, Sundail, and secret compartment. Ca. 196.

The Phantom Sheriff’s Secret Code & Cypher Key with instructions for use (cipher disk).

A Puck Cryptogame by Col. Parker Hitt.

Random Number Pad (replica) with instructions. 40 pp.

ROA (Radio Orphan Annue) Brass Decoder, 1935.

ROA Secret Compartment Brass Decoder, 1936.

ROA’s Secret Society. Ten page booklet provides Annie’s new 1937 Secret Signs and Symbols.

ROA Speed-O-Matic Brass Decoder Badge, 1940.

ROA Sunburst Brass Decoder Badge, 1937.

ROA Telematic Brass Decoder Badge, 1938.

ROA Mysto-Matic Brass Decoder Badge, 1939.

Reynard, Robert. Secret Code Breaker Cipher Slide. Includes instructions for four different cipher systems. Jacksonville, FL: Smith & Daniel Pub., 1998, 10 pp.

ROTOCODE CODER. Commercial grille device. Toronto, Canada, 1995.

Spider-Man Decoder.

Spy King’s Spy Detecto Writer (decoder).

The AppleJacks – Kids Secret Decoder (plastic). Kellogg, 1983.

The Squirrels Secret Decoder with four alphabets. Glendale Federal Savings.

Strip Cipher Device made of wood by craftsman,Henrik W. Langen, with 26 movable strips, based on device invented by Captain Parker Hitt.

Syllabic Cipher Disk. Hand-masde by M.E. Ohaver.

The Pocket Signal Disk. U.S. Service Issue. An original time saving device for instructions and review in the General Service and Semaphore Signal Codes. La Jolla, CA: The Standard Novelty Co., 1942.

Tom Corbett Space Cadet Code, 1951. Cardboard decoder.

Top Secret Code Writer. Two grilles and message pads with instructions on writing secret messages. Bridgeport, CT: V.S. Corp.

United States Army and Navy Semaphore Code. The International Morse Code and Semaphore or Two-Flag Code. Tuscarore, MD: Flag Signal Instructor Co., 1917.

Usborne Publishing Spycraft Kit. Tulsa, OK: EDC Pub. Co., 1997.

Various (6) cipher disks apparently handmade as prototype for The Crypto-Set by R.B. Reimer.

The Williams Mechanical Cipher inscribed to M.E. Ohaver from Warner W. Williams. This is a cipher disk with 6 wheels. Boston: MA: Williams Cipher Co., 1932.

Non-Military Ciphers,Devices/Codes: Amateur, Juvenile, Decoders,etc. END.

CRYPTOLOGIC GAMES AND TOYS: START
ALEX Undercover Detective Activity Kit. Englewood, NJ: Panlines U.S.A.

Code Kit. Oxfordshire, England: John Adams Trading Co., Ltd.

Decipher. Decode your opponents secret word. New York, NY: Pressmony Toy Corp., 1977.

Decipher. Jigsaw puzzle with number cipher. $100.000 award to first correct solver. Stillwater, OK: Pente Games,Inc., 1983

Decipher III Puzzle. Two-sided jigsaw puzzle with three coded messages with $100,000 prize to winner. Norfolk, VA: Decipher, Inc., 1987.

Fargo North, Decoder Secret Word Game. Springfield, MA: Milton Bradley Co., 1978.

My Ultra Secret Spy Stuff. Van Nugs, CA: Swingset Press, 2001

Nancy Drew – Secrets Can Kill. Computer game with CD-ROM. Solve over 75 cryptic codes and puzzles hiden throughout the game. Bellevue, WA: Herinteractive. COM, 1996.

Secret Agent Kit. Anderson, NC: Royco Inc., 2001

Spy Master Code Kit. Contains 2 code watches, 2 Scytale staffs, combination cypher and two “Enigma” code cards. Far Rockaway, NY: Natural Science Industries, 1996.

Spy Tech.Spy Code Watch. Includes three interchangeable code disks for watch with instruction booklet. Morristown, NJ: Tyco Inductries, 1987.