Aegean Park Press

Books and where to read them online

Aegean Park Press was a small specialist publisher founded by Wayne Griswold Barker, putting out books on cryptography, contract bridge, intelligence history, Mayan studies and other subjects from 1976 onward. After Barker's death in 2001 the press disappeared, and the books — many of them reprints of declassified U.S. government documents and other public-domain works — became hard to find in print.

This page lists the titles I have catalogued so far, grouped by subject, with links to free online copies (or borrowable scans on the Internet Archive) wherever I have been able to find them. Roman series codes (B-1, C-1, M-1, MS-1, etc.) are shown as red badges next to the titles.

Sections: Cryptography (99) Intelligence and espionage (28) Mayan studies (7) Bridge (5) Spread spectrum communications (4) Other titles (7)

Cryptography

The Cryptographic Series and related cryptographic books — many are reprints of declassified U.S. Army / NSA / Friedman documents, or Riverbank Laboratory publications.

ISBNTitleYearAuthorOnline sources
0894120018c-1Manual for the Solution of Military Ciphers (Cryptographic Series)1976Parker Hitt
089412000Xc-2Cryptanalysis of the Simple Substitution Cipher With Word Divisions1975Wayne G Barker
0894120026c-3Elements of Cryptanalysis (Cryptographic Series)1976William F Friedman
0894120069c-4Statistical Methods in Cryptanalysis (Cryptographic Series)1976Solomon Kullback
0894120034c-5Cryptography and Cryptanalysis Articles (Cryptographic Series)1976
0894120042c-6Cryptography and Cryptanalysis Articles (Cryptographic Series)1976William F Friedman
0894120107c-7Elementary Military Cryptography1976William Frederick Friedman
0894120115c-8Advanced Military Cryptography (Cryptographic Series)1976William F Friedman
0894120212c-9War Secrets in the Ether1977Wilhelm F Flicke
0894120239c-10War Secrets in the Ether1977Wilhelm F Flicke
0894120190c-11Solving German Codes in World War I (Cryptographic Series)1977William F Friedman
0894120182c-12History of the Use of Codes1977William F Friedman
0894122398c-13Zimmermann Telegram of January 16 1917 and Its Cryptographic1976William F Friedman; Charles J Mendelsohn
0894120166c-14Manual of Cryptography (Cryptographic Series) - Sacco1977Luigi Sacco
0894120174c-15Pattern-Word List Volume 1: Containing Words up to 10 Letters in Length by Frederick D Lynch (1977)1977Frederick D Lynch
0894120255c-16Origin and Development of the Army Security Agency 1917-1947 19781978United States. Army Security Agency.
0894120220c-17Cryptanalysis of the Hagelin Cryptograph (Cryptographic Series) 19771977Wayne G Barker
0894120271c-18The Contribution of the Cryptographic Bureaus in the World War (1978)1978Yves Gyldén
089412028Xc-19Course in Cryptography (Cryptographic Series) - Givierge1978Marcel Givierge; Francis Bacon Library
0894120263c-20History of Codes and Ciphers in the United States Prior to World1978Wayne G Barker
089412031Xc-21History of Codes and Ciphers in the U S During World War 11979Wayne G Barker
0894120395c-22History of Codes and Ciphers in the U.S. During the Period Between1979Wayne G Barker; United States. Army Security Agency. Historical Section.
0894120328c-23The Riverbank Publications, Vol 1 (C-23) publications 15-181979William F Friedman
0894120336c-24The Riverbank Publications, Vol 2 (C-24) publications 19-211979William F Friedman
0894120344c-25The Riverbank Publications, Vol 3 (C-25) publication 22 (IC)1979William F Friedman
0894120379c-26Cryptanalysis of an Enciphered Code Problem: Where an Additive1979Wayne G Barker
0894120387c-27Voynich Manuscript an Elegant Enigma (Cryptographic Series)1981M E D'Imperio
0894120425c-28Manual of Cryptography - British War Office1980Great Britain. War Office.
n/ac-29Cryptanalytic programs for the IBM PC
0894120441c-30Military Cryptanalysis, Part I, Monoalphabetic Substitution Systems1980William F Friedman
0894120468c-31Speech and Facsimile Scrambling and Decoding1981Columbia University. Division of War Research. Summary Reports Group.
0894120506c-32Computer simulation of classical substitution cryptographic systems1981Rudolph F Lauer
0894120522c-33Course in Cryptanalysis: Explanatory Text and Short Exercises/Si1980Great Britain. War Office.
0894120530c-34Course in Cryptanalysis: Figures and Cipher Test/Si Course1980
0894120549c-35Origin and Development of the National Security Agency1981G A Brownell, Brownell G.A.
0894120557c-36Treatise on Cryptography: An English Translation of the Original "Traite De Cryptographie"1981André Lange; E -A Soudart
0894120573c-37Solving Cypher Secrets (Cryptographic Series (C-37))1982M E Ohaver
0894120611c-38Cryptography, A Study on Secret Writings1984André Langie
089412062Xc-39Cryptanalysis of Shift Register Generated Stream Cipher Systems1984Wayne G Barker
0894120646c-40Military cryptanalysis / 2, Simpler varieties of polyalphabetic substitution systems.1984William F Friedman
0894120727c-41Elementary course in probability for the cryptanalyst1985Andrew M Gleason; Walter F Penney
0894120735c-42Military Cryptanalytics, Part I, Volume 1 (Cryptographic Series)1985William Frederick Friedman; Lambros D Callimahos
0894120743c-43Military Cryptanalytics, Part I, Volume 21985William F Friedman; Lambros D Callimahos
0894120751c-44Military Cryptanalytics, Part II, Volume 1 (Cryptographic Series)1985William F Friedman; Lambros D Callimahos; Wayne G Barker
089412076Xc-45Military Cryptanalytics, Part II, Volume 2: Includes Problems and Computer Programs1985William F Friedman
0894121359c-46Pattern Words: Three Letters to Eight Letters in Length1986Sheila Carlisle
0894121456c-47Cryptology and the personal computer : with programming in BASIC1986Waldo T Boyd; Aegean Park Press.
0894121464c-48Pattern Words Nine-Letters in Length1986Sheila Carlisle
0894121375c-49The Index of Coincidence and Its Applications in Cryptanalysis1987William F Friedman
0894121502c-50Cryptographic Significance of the Knapsack Problem Plus Exercises1988Luke J O'Connor; Jennifer Seberry
0894121529c-51Breakthrough '32 : the Polish solution of the Enigma (90 pages, 1988, Deavours)1988Cipher A Deavours
0894121545c-52The American Black Chamber (Cryptographic Series)1989Herbert O Yardley
0894121618c-53Traffic Analysis and the Zendian Problem (Cryptographic Series)1989Lambros D Callimahos
0894121650c-54The History of Codes and Ciphers in the U.S. During the Period Between the World Wars: 1930-19391989Wayne G Barker; United States. Army Security Agency. Historical Section.
0894121693c-55Introduction to the Analysis of the Data Encryption Standard - Barker1991Wayne G Barker
0894121731c-56Elementary Cryptography and Cryptanalysis (Cryptography Series)1992Donald D Millikin
0894121758c-57Secret ciphers of the 1876 presidential election1991D Beaird Glover
0894121782c-58Solving Cipher Problems (Cryptographic Series)1992Frank W Lewis
0894121928c-59Cryptanalysis of the single columnar transposition cipher1992Wayne G Barker
0894121960c-60Military Cryptanalysis: Simpler Varieties of Aperiodic Substitution1992William F Friedman
0894121987c-61Military Cryptanalysis: Transposition and Fractionating Systems1992William F Friedman
0894122045c-62Pattern words : ten-letters and eleven-letters in length1993Robert W Wallace
0894122061c-63Pattern words : twelve-letters and greater in length1993Robert W Wallace
0894122223c-64U.S. naval cryptographic activities in the Philippines prior to World War II1992Sheila Carlisle; United States. Navy.
0894122290c-65U.S. naval communications intelligence activities1994Laurance F Safford; J N Wenger
0894122452c-66Fundamentals of traffic-analysis (radio-telagraph).1994United States. Department of the Army.; United States. Department of the Air Force.
0894122460c-67Six Lectures Concerning Cryptography and Cryptanalysis1996William F Friedman
0894122487c-68The Des: An Extensive Documentation and Evaluation of the Data1995Mikael J Simovits
0894122541c-69Cryptanalysis of the Double Transposition Cipher: Includes Problems1995Wayne G Barker
0894122509c-70Achievements of the Signal Security Agency in World War II1995United States. Signal Security Agency.
0894122525c-71An historical and analytical bibliography of the literature of cryptology.1996Joseph Stanislaus Galland
0894122614c-72Secret & Urgent: The Story of Codes & Ciphers1996Fletcher Pratt
0894122622c-73Cryptanalysis of the single rotor cipher machine1996Donald A Dawson
0894122630c-74Classical Cryptography Course, Volume 11996Randall K Nichols
0894122657c-75Venona, Soviet Espionage and the American Response (C-75)1996Robert Louis Benson; Michael Warner; Förenta staterna. National Security Agency.; Förenta staterna. Central Intelligence Agency.
0894122649c-76Classical cryptography course1998Nichols K Randall
0894122665c-77Descriptive dictionary of cryptologic terms : including foreign terms1997United States. Army Security Agency.
0894122673c-78Cryptology, System Identification and Key-Clustering (C-78)1997I J Kumar
089412272Xc-79Basic Cryptanalysis, Field Manual 34-40-21997United States. Department of Defense.
0894122746c-80U.S. Army Signals Intelligence in World War II (Cryptography)2000James L Gilbert; John Patrick Finnegan; Center of Military History.
0894122738c-81The Story of Magic, Memoirs of an American Cryptologic Pioneer2002Frank B Rowlett
0894122754c-82Briefing Notes Concerning Analysis of German Air-Force Low-Level1999Government Code & Cypher School (GCCS)
0894122770c-83NSA Cryptologic Documents2002United States. National Security Agency.
0894122789c-84General solution for the double transposition cipher1990Solomon Kullback
0894122797c-85Russian Cryptology During World War II1999Alex Dettman; et al
0894122800c-86Vatican Code Systems (Cryptographic Series (C-86))1999United States. National Security Agency.
0894122827c-87U.S. Revolutionary Period Cryptography2002Signal Security Agency.
0894122843c-88General Solution of the ADFGVX Cipher System2002J Rives Childs
0894122894c-89NSA Reveals How Codes of Mexico Were Broken (Cryptography Series)2000
0894122916c-90Handbook for Cryptanalysis (Cryptographic Series)2001United States. Army Security Agency.
0894122908c-91Big Machines (A Crytographic Series)2001Stephen J Kelley
0894121332Intelligence and Cryptanalytic Activities of the Japanese During1986J W Bennett; W A Hobart; J B Spitzer
0894122401Ultra in the Atlantic: The German Naval Grid and Its Ciphers1994Jeffrey K Bray
0894120433Cryptograms1980Wayne G Barker
0894120484Shift Register Sequences1982Solomon W Golomb
0894120638Algebraic Coding Theory1984Elwyn R Berlekamp
0894120581Cryptograms in Spanish (M-9)1985Wayne G Barker
0894121316Cryptograms in Portuguese1986Stewart Todd
0894121480Solution of the Voynich Manuscript1987Leo Levitov

Intelligence and espionage

The Intelligence Series and related books on signals intelligence, codebreaking history, defections and military intelligence.

ISBNTitleYearAuthorOnline sources
0894120662The Defection of Igor Gouzenko, Volume 11984Kellock–Taschereau Royal Commission (Canada)
0894120670The Defection of Igor Gouzenko, Volume 21984Kellock–Taschereau Royal Commission (Canada)
0894120689The Defection of Igor Gouzenko, Volume 31984Kellock–Taschereau Royal Commission (Canada)
0894121561Evolution and Organization of Intelligence Activities in the United1988Harold C Relyea
0894122029Selection of personnel for clandestine operations : assessment of men.1993Donald W Fiske
0894122312The history of the special branch, M.I.S. in World War II1994Alfred McCormack
0894122355Ultra in the Atlantic1994Jeffrey K Bray
0894122363Ultra in the Atlantic: U-Boat Operations (Intelligence Series , Vol1994Jeffrey K Bray
0894122371Ultra in the Atlantic: German Naval Communications Intelligence1994Jeffrey K Bray
089412238XUltra in the Atlantic: Technical Intelligence from Allied1994Jeffrey K Bray
089412241XUltra in the Atlantic: Appendices (Intelligence Series , Vol 6, No1994Jeffrey K Bray
0894122819General Washington's Spies, on Long Island and in New York2000Morton Pennypacker
0894122851U.S. Military Intelligence Personnel, 1944-19452000United States / National Security Agency.
089412286XCIA Briefings of the Presidential Candidates, 1952,19922000John L Helgerson; United States. Central Intelligence Agency.
0894122878Selected Intelligence Monographs Volume 12000United States. Central Intelligence Agency.
0894122924Robert Philip Hanssen : Alleged KGB "Mole" Within the FBI2001Förenta staterna. Federal Bureau of Investigation.
0894122347Investigation of the Pearl Harbor Attack: Report of the Joint1994United States. Congress. Joint Committee on the Investigation of the Pearl Harbor Attack.
0894122339War Secrets in the Ether1994Wilhelm F Flicke; Sheila Carlisle
0894120417The Anatomy of Two Traitors: The Defection of Bernon F. Mitchell1981Wayne G Barker; Rodney E Coffman
0894120697Operational History of Japanese Naval Communication: December1995Wayne G Barker
0894122304Press Pass, The Journalist's Tale1994Sidney L James
0894122436Attack on the Uss Liberty1996William D Gerhard; Sheila A Carlisle
0894122495Antisubmarine Warfare in World War II1990Charles M Sternhell; Alan M Thorndike; United States. Office of the Chief of Naval Operations. Operations Evaluation Group.
0894122517Direction Finding1996United States Navy.
0894122533Mine Warfare in the Russo-Soviet Navy1995Jeffrey K Bray
0894122711Japanese Radar and Related Weapons of World War II (M-27)1997Yasuzō Nakagawa; Louis Brown; John H Bryant; Naohiko Koizumi
0894122886The War with Japan and Two Decisions2000James F Nihan
0894122932Japanese Diplomatic Secrets2001Emil H Levine; United States. National Archives and Records Administration.

Mayan studies

The Mayan Studies series — Förstemann, Knorozov, Villacorta and others on Maya codices, calendar and writing.

ISBNTitleYearAuthorOnline sources
0894121804Commentary on the Dresden Codex (Mayan Studies Series)1992Ernst Förstemann
0894121820The Writing of the Mayan Indians, Selected Chapters1992Yuri V. Knorozov; Tatiana Proskouriakoff
0894121847The Dresden Codex: Drawings of the Pages (Mayan Studies : No 3)1992Carlos A Villacorte; J Antonio Villacorta C
0894121901The Humboldt celt : the key to the lost Olmec world1992Paul Douglas Campbell
0894121944Astronomy and the Maya Calendar Correlation (Mayan Studies Series)1992Paul Douglas Campbell
0894122169Book of Chilam Balam of Chumayel (Mayan Studies)1993
0894122444The book of Chumayel : the counsel book of the Yucatec Maya, 1539-16381996Richard N Luxton

Bridge

Five contract-bridge titles published by Aegean Park Press.

ISBNTitleYearAuthorOnline sources
089412255XTwo-Over-One Game Force Bidding Problems, No 1 (B-1)1996J N Larone
0894122584The Play of the Cards- Self-Quizzes at Bridge (B-2)1998Fred L Karpin
0894122576The Drawing of Trumps and Its Postponement (B-3)1998Fred L Karpin
0894122606Splinters and Other Shortness Bids (B-4)1998Max Hardy
0894122592New Minor, Fourth Suit, Forcing Notrump Responses : The Complete1998Mark Adams; Ron Andersen

Spread spectrum communications

The Spread Spectrum Series — direct-sequence, frequency-hopping and detection techniques.

ISBNTitleYearAuthorOnline sources
0894120719Direct Sequence Spread Spectrum Techniques (Spread Spectrum Series)1982J E Hershey
0894121294Potential Use of Spread Spectrum Techniques in Non-Government1986Walter C Scales
0894122207Practical spread spectrum1993Charles O Phillips
089412224XPractical spread spectrum : frequency hopping.1996Charles O Phillips

Other titles

Miscellaneous Aegean Park Press titles — UFO, world slavery, genealogy, Marxism, medical, intelligence-adjacent and uncategorised.

ISBNTitleYearAuthorOnline sources
0894122320Medical Records and How They Affect Legal Issues (M-7)1994Arleen Kaizer
0894121715The Marxist Empire, Communist Dream-World Nightmare1991James F Nihan
0894121596Genealogical evidence : a guide to the standard of proof relating to pedigrees, ancestry, heirship and family history1989Noel C Stevenson
089412188XUnidentified Flying Objects, Fact or Fiction?1992Lillian Crowner Desguin
0894122479Nuclear Waste Disposal, Gambling on Yucca Mountain1995Sarah Ginsburg
0894122762World Slavery, A Documented History1999James F Nihan
0894120352Wanderwill1979Jerrywayne.