Jack Levine Papers 1563-1994

Creator
Levine, Jack, 1907-
Size
20 linear feet
Location

For current information on the location of these materials, please consult the Special Collections Research Center Reference Staff.

Call number
MC 00308

This collection contains materials related to Levine's research interests, as well as those documenting his publications and university career. Correspondence includes letters about general cryptography, articles written by Levine and others, Levine's cryptographic patents book, and cryptographic computer tests. Research contains notes, computer printouts, article reprints, and note cards related to Levine's research interests in cryptography. Writings includes Levine's published and unpublished essays and pamphlets. Teaching Career includes class notes and other student-related material. Collected Works includes articles, books, and bibliographic information of other authors in the fields of mathematics and cryptography. Unprocessed Material contains copies of articles and publications on cryptography. Most of the materials are from Levine's lifetime, but some of the items in the Collected Works series are from as early as 1716.

The Jack Levine Papers documents Levine's career as a crytographic researcher and mathematics professor at North Carolina State College (later North Carolina State University) from 1936 to 1995. The collection contains information on Levine's research, writings, university career, and correspondence. His main interests were tensor analysis, geometrics of generalized spaces, differential geometry, combinatorial analysis, theory of symmetric functions, algebraic cryptography and mathematical physics.

Biographical/historical note

Jack Levine was born on December 15, 1907, in Philadelphia, Pennsylvania. He received his A.B. degree with honors in Mathematics and Physics from the University of California at Los Angeles in 1929, and then spent a year there as an Assistant Professor in Mathematics. He attended Princeton University in 1930, and received his Ph.D. in mathematics in 1934, during which time he was also a part-time instructor. From 1935 to 1936 he was an instructor in mathematics at North Carolina State College. From 1936 to 1939 he served as Assistant Professor, and from 1939 to 1946 as Associate Professor. In 1946 he was appointed a full Professor and served in that capacity until 1976. He continued to teach part time until 1995.

Levine served as Technical Sergeant in the Second Signal Service Battalion of the Signal Corps from 1943 to 1945. In 1946 he was awarded the Legion of Merit Award for his outstanding service with the Army Security Agency. In 1970 Dr. Levine received an Outstanding Teacher Award at North Carolina State University. He was a member of several honorary and professional organizations, including Pi Mu Epsilon, Sigma Xi, American Mathematical Society, Mathematical Association of America, American Society for Engineering Education, and Phi Kappa Phi.

Still active in research after his retirement, his areas of interest included tensor analysis, geometrics of generalized spaces, differential geometry, combinatorial analysis, theory of symmetric functions, algebraic cryptography and mathematical physics. In addition to over one hundred research papers, Levine also published several books, including a definitive four-volume work on pattern word lists used in cryptography and a comprehensive compilation of United States cryptographic patents, 1861-1981.

Levine was also an avid reader, especially of mystery books. He was a life member of the Friends of the Library at North Carolina State University. In 1987 he donated a collection of over 1,500 mystery books to D. H. Hill library at North Carolina State University. In 1992 he donated an additional 665 titles to the collection.

Scope/content

This collection contains materials related to Levine's research interests, as well as those documenting his publications and university career. Correspondence includes letters about general cryptography, articles written by Levine and others, Levine's cryptographic patents book, and cryptographic computer tests. Research contains notes, computer printouts, article reprints, and note cards related to Levine's research interests in cryptography. Writings includes Levine's published and unpublished essays and pamphlets. Teaching Career includes class notes and other student-related material. Collected Works includes articles, books, and bibliographic information of other authors in the fields of mathematics and cryptography. Unprocessed Material contains copies of articles and publications on cryptography. Most of the materials are from Levine's lifetime, but some of the items in the Collected Works series are from as early as 1716.

Physical description

37 archival boxes and 6 oversize folders

Arrangement

The collection is organized into five series: Correspondence, Research, Writings, Teaching Career, and Collected Works. Original order has been preserved as much as possible.

Use of these materials

North Carolina State University does not own copyright to this collection. Individuals obtaining materials from the NCSU Libraries' Special Collections Research Center are responsible for using the works in conformance with United States copyright law as well as any donor restrictions accompanying the materials.

Preferred Citation

[Identification of item], Jack Levine Papers, MC 00308, Special Collections Research Center, North Carolina State University Libraries, Raleigh, NC

Source of acquisition

Gift of Jack Levine, 1995 and 2011. Accession no. (1995.0016) and (2011.0209).

The collection is organized into six principal series:

Correspondence 1940-1994
Size: 0.5 linear feet

This series includes correspondence about general cryptography, articles written by Levine and others, Levine's cryptographic patents book, and cryptographic computer tests. Major correspondents include Joel Brawley, Michael Willet, Louis Kruh, and Cryptologia Magazine.The series is organized chronologically, with the topic or correspondent indicated when available.

1 archival box

Statistical Cryptography Tests 1940,
Box 1, Folder 1
David Schulman 1976,
Box 1, Folder 2
Beale Cypher Association 1979,
Box 1, Folder 3
Joel Brawley 1979-1980,
Box 1, Folder 4
Cryptologia 1979-1984,
Box 1, Folder 5
Michael Willet 1981,
Box 1, Folder 6
Various 1981 -1991,
Box 1, Folder 7
Patent Serial Numbers 1982-1985,
Box 1, Folder 8
Michael Willet 1983-1984,
Box 1, Folder 9
Cryptologia 1985-1993,
Box 1, Folder 10
Louis Kruh 1990,
Box 1, Folder 11
John C. King [Folder 1 of 2] 1991,
Box 1, Folder 12
John C. King [Folder 2 of 2] 1991,
Box 1, Folder 13
Joel Brawley 1991,
Box 1, Folder 14
Joel Brawley 1994,
Box 1, Folder 15
Research
Size: 10.25 linear feet

This series is broken down into four subseries: Notes, Computer Printouts, Notecards, and Reprints.

The Notes subseries contains handwritten materials relating to patents, the Hill System of cryptography, and general cryptography.Only a few folders' contents could be clearly identified; the majority of materials did not have dates or titles.Folders are arranged alphabetically, with general topics at the end.

The Computer Printouts subseries also consists of materials relating to general cryptography, the Hill System, and patents.Materials on general cryptographic problems and systems are arranged alphabetically.These materials include oversize items and IBM computer punch cards.The Hill System folders are arranged first by Modulus (Mod) number and then chronologically.At the end of this subseries are materials pertaining to United States patents.These folders are divided into those organized by the name of the patent holder and those organized by classification mode; both types are arranged chronologically.

The notecards in the Notecards subseries list patent names, numbers, and the patent holder.These materials are arranged in original order.

The Reprints subseries consists of photocopies of patent descriptions from the United State patent office.They are arranged in original order.

19.5 archival boxes and 6 oversize folders

Notes
Patents, Introduction to the Second Edition [Folder 1 of 2]
Box 2, Folder 1
Patents, Introduction to the Second Edition [Folder 2 of 2]
Box 2, Folder 2
Patents [Folder 1 of 6]
Box 2, Folder 3
Patents [Folder 2 of 6]
Box 2, Folder 4
Patents [Folder 3 of 6]
Box 2, Folder 5
Patents [Folder 4 of 6]
Box 2, Folder 6
Patents [Folder 5 of 6]
Box 2, Folder 7
Patents [Folder 6 of 6]
Box 2, Folder 8
Hill System, Hill System with Unknown Cipher Alphabet [Folder 1 of 2]
Box 3, Folder 1
Hill System, Hill System with Unknown Cipher Alphabet [Folder 2 of 2]
Box 3, Folder 2
Hill System, The Method of Stages
Box 3, Folder 3
Hill System, Proposal Outline
Box 3, Folder 4
Hill System [Folder 1 of 15]
Box 3, Folder 5
Hill System [Folder 2 of 15]
Box 3, Folder 6
Hill System [Folder 3 of 15]
Box 3, Folder 7
Hill System [Folder 4 of 15]
Box 3, Folder 8
Hill System [Folder 5 of 15]
Box 3, Folder 9
Hill System [Folder 6 of 15]
Box 3, Folder 10
Hill System [Folder 7 of 15]
Box 3, Folder 11
Hill System [Folder 8 of 15]
Box 3, Folder 12
Hill System [Folder 9 of 15]
Box 3, Folder 13
Hill System [Folder 10 of 15]
Box 3, Folder 14
Hill System [Folder 11 of 15]
Box 3, Folder 15
Hill System [Folder 12 of 15]
Box 3, Folder 16
Hill System [Folder 13 of 15]
Box 3, Folder 17
Hill System [Folder 14 of 15]
Box 3, Folder 18
Hill System [Folder 15 of 15]
Box 3, Folder 19
General Cryptography, 2 Message Property
Box 4, Folder 1
General Cryptography, Army Extension Course
Box 4, Folder 2
General Cryptography, Depth Problems
Box 4, Folder 3
General Cryptography, Equivalence and Decimations
Box 4, Folder 4
General Cryptography, Five Letter Words
Box 4, Folder 5
General Cryptography, Locating a Probable Word
Box 4, Folder 6
General Cryptography, Log 10 N!
Box 4, Folder 7
General Cryptography, Multiplication Table
Box 4, Folder 8
General Cryptography, Probable Word Problems
Box 4, Folder 9
General Cryptography, Programs for Encipherment
Box 4, Folder 10
General Cryptography, Progressive Cipher
Box 4, Folder 11
General Cryptography, Riordan Combinatorial Analysis
Box 4, Folder 12
General Cryptography, Symmetry, Direct and Indirect
Box 4, Folder 13
General Cryptography, Variations on the Vigenere
Box 4, Folder 14
General Cryptography [Folder 1 of 15]
Box 4, Folder 15
General Cryptography [Folder 2 of 15]
Box 4, Folder 16
General Cryptography [Folder 3 of 15]
Box 4, Folder 17
General Cryptography [Folder 4 of 15]
Box 4, Folder 18
General Cryptography [Folder 5 of 15]
Box 4, Folder 19
General Cryptography [Folder 6 of 15]
Box 4, Folder 20
General Cryptography [Folder 7 of 15]
Box 4, Folder 21
General Cryptography [Folder 8 of 15]
Box 4, Folder 22
General Cryptography [Folder 9 of 15]
Box 4, Folder 23
General Cryptography [Folder 10 of 15]
Box 4, Folder 24
General Cryptography [Folder 11 of 15]
Box 4, Folder 25
General Cryptography [Folder 12 of 15]
Box 4, Folder 26
General Cryptography, Algebraic Encipherment Wheels (2)
Box 5, Item 1
General Cryptography, Multiplication Table
Box 5, Item 2
General Cryptography, Band Transposition
Box 6, Folder 1
General Cryptography, Circulant Permanents
Box 6, Folder 2
General Cryptography [Folder 13 of 15]
Box 6, Folder 3
General Cryptography [Folder 14 of 15]
Box 6, Folder 4
General Cryptography [Folder 15 of 15]
Box 6, Folder 5
Computer Printouts
General Cryptography, A-1
Box 6, Folder 6
General Cryptography, A-9
Box 6, Folder 7
General Cryptography, B-1
Box 6, Folder 8
General Cryptography, B-9
Box 6, Folder 9
General Cryptography, Cases 1-7
Box 6, Folder 10
General Cryptography, Prime Factors of Polynomials
Box 6, Folder 11
General Cryptography, Project M.B0525
Box 6, Folder 12
General Cryptography [Folder 1 of 2]
Box 6, Folder 13
General Cryptography [Folder 2 of 2]
Box 6, Folder 14
General Cryptography, Alphabets (Oversize Material)
Box 7
General Cryptography, Factor Table (Oversize Material)
Box 8
General Cryptography, Multiplication Tables. Mod K, K= 5-70 (Oversize Material)
Box 9
General Cryptography, Pattern Words [1 of 3] (Oversize Material)
Box 10
General Cryptography, Pattern Words [2 of 3] (Oversize Material)
Box 11
General Cryptography, Pattern Words [3 of 3] (Oversize Material)
Box 12
General Cryptography, Plain-text punch cards [1 of 3]
Box 13
General Cryptography, Plain-text punch cards [2 of 3]
Box 14
General Cryptography, Plain-text punch cards [3 of 3]
Box 15
Hill System, Mod 2, July-August 1983
Box 16, Folder 1
Hill System, Mod 2, undated
Box 16, Folder 2
Hill System, Mod 5, July 1983
Box 16, Folder 3
Hill System, Mod 7, June-August 1983
Box 16, Folder 4
Hill System, Mod 7, June 1984
Box 16, Folder 5
Hill System, Mod 7, July 1984
Box 16, Folder 6
Hill System, Mod 7, undated
Box 16, Folder 7
Hill System, Mod 10, July-August 1983
Box 16, Folder 8
Hill System, Mod 11, June-August 1983
Box 16, Folder 9
Hill System, Mod 11, January 1984
Box 16, Folder 10
Hill System, Mod 11, undated
Box 16, Folder 11
Hill System, Mod 13, July 11 1983
Box 16, Folder 12
Hill System, Mod 13, July 14 1983
Box 16, Folder 13
Hill System, Mod 13, July 29 1983
Box 16, Folder 14
Hill System, Mod 13, August 1983
Box 16, Folder 15
Hill System, Mod 13, January 1984
Box 16, Folder 16
Hill System, Mod 13, July 12 1984
Box 16, Folder 17
Hill System, Mod 13, July 17 1984
Box 16, Folder 18
Hill System, Mod 13, undated [Folder 1 of 6]
Box 16, Folder 19
Hill System, Mod 13, undated [Folder 2 of 6]
Box 16, Folder 20
Hill System, Mod 13, undated [Folder 3 of 6]
Box 16, Folder 21
Hill System, Mod 13, undated [Folder 4 of 6]
Box 17, Folder 1
Hill System, Mod 13, undated [Folder 5 of 6]
Box 17, Folder 2
Hill System, Mod 13, undated [Folder 6 of 6]
Box 17, Folder 3
Hill System, Mod 14, August 1983
Box 17, Folder 4
Hill System, Mod 19, July 14 1983
Box 17, Folder 5
Hill System, Mod 19, July 29 1983
Box 17, Folder 6
Hill System, Mod 19, April 1984
Box 17, Folder 7
Hill System, Mod 19, July 10 1984
Box 17, Folder 8
Hill System, Mod 19, July 17 1984
Box 17, Folder 9
Hill System, Mod 19, undated [Folder 1 of 65]
Box 17, Folder 10
Hill System, Mod 19, undated [Folder 2 of 5]
Box 17, Folder 11
Hill System, Mod 19, undated [Folder 3 of 5]
Box 17, Folder 12
Hill System, Mod 19, undated [Folder 4 of 5]
Box 17, Folder 13
Hill System, Mod 19, undated [Folder 5 of 65]
Box 17, Folder 14
Hill System, Mod 22, August 1983
Box 18, Folder 1
Hill System, Mod 26, August 1983
Box 18, Folder 2
Hill System, Mod 26, March 11 1984
Box 18, Folder 3
Hill System, Mod 26, March 19 1984 [Folder 1 of 2]
Box 18, Folder 4
Hill System, Mod 26, March 19 1984 [Folder 2 of 2]
Box 18, Folder 5
Hill System, Mod 26, April 1984
Box 18, Folder 6
Hill System, Mod 26, undated [Folder 1 of 6]
Box 18, Folder 7
Hill System, Mod 26, undated [Folder 2 of 6]
Box 18, Folder 8
Hill System, Mod 29, August 1983
Box 18, Folder 9
Hill System, Mod 29, undated
Box 18, Folder 10
Hill System, Mod 10 and Mod 2, undated
Box 18, Folder 11
Hill System, Mod 10 and Mod 5, undated
Box 18, Folder 12
Hill System, Mod 26 and Mod 2, undated
Box 18, Folder 13
Hill System, Mod 26 and Mod 13, undated [Folder 1 of 2]
Box 19, Folder 1
Hill System, Mod 26 and Mod 13, undated [Folder 2 of 6]
Box 19, Folder 2
Hill System, Program Listings, July-August 1983
Box 19, Folder 3
Hill System, Problems 8-13, July-August 1983
Box 19, Folder 4
Hill System, Unknown Cipher Alphabet, July 1983
Box 19, Folder 5
Hill System, Unknown Cipher Alphabet, January 1984
Box 19, Folder 6
Hill System, Unknown Mod, May 1983-April 1984
Box 19, Folder 7
Hill System, Unknown Mod, March 16 1984
Box 19, Folder 8
Hill System, Unknown Mod, March 18 1984 [Folder 1 of 2]
Box 19, Folder 9
Hill System, Unknown Mod, March 18 1984 [Folder 2 of 2]
Box 19, Folder 10
Hill System, Unknown Mod, April 6 1984
Box 19, Folder 11
Hill System, Unknown Mod, undated
Box 19, Folder 12
Hill System, Mod 5, undated
Box 20, Folder 1
Hill System, Mod 11, undated [Folder 1 of 4]
Box 20, Folder 2
Hill System, Mod 11, undated [Folder 2 of 4]
Box 20, Folder 3
Hill System, Mod 11, undated [Folder 3 of 4]
Box 20, Folder 4
Hill System, Mod 11, undated [Folder 4 of 4]
Box 20, Folder 5
Hill System, Mod 13, undated [Folder 1 of 4]
Box 20, Folder 6
Hill System, Mod 13, undated [Folder 2 of 4]
Box 20, Folder 7
Hill System, Mod 13, undated [Folder 3 of 4]
Box 20, Folder 8
Hill System, Mod 13, undated [Folder 4 of 4]
Box 20, Folder 9
Hill System, Mod 19, undated [Folder 1 of 8]
Box 20, Folder 10
Hill System, Mod 19, undated [Folder 2 of 8]
Box 20, Folder 11
Hill System, Mod 19, undated [Folder 3 of 8]
Box 20, Folder 12
Hill System, Mod 19, undated [Folder 4 of 8]
Box 20, Folder 13
Hill System, Mod 19, undated [Folder 5 of 8]
Box 20, Folder 14
Hill System, Mod 19, undated [Folder 6 of 8]
Box 20, Folder 15
Hill System, Mod 19, undated [Folder 7 of 8]
Box 20, Folder 16
Hill System, Mod 19, undated [Folder 8 of 8]
Box 20, Folder 17
Hill System, Mod 29, undated
Box 20, Folder 18
Hill System, Unknown Mod, undated
Box 20, Folder 19
Patents, Names, 1861-1989
Box 21, Folder 1
Patents, Names, 1887-1981
Box 21, Folder 2
Patents, Names, 1982-1989 [Folder 1 of 3]
Box 21, Folder 3
Patents, Names, 1982-1989 [Folder 2 of 3]
Box 21, Folder 4
Patents, Names, 1982-1989 [Folder 3 of 3]
Box 21, Folder 5
Patents, Names, 1982-1985
Box 21, Folder 6
Patents, Names, 1985-1987
Box 21, Folder 7
Patents, Names, 1987-1989
Box 21, Folder 8
Patents, Classification Modes, August 9 1989
Box 21, Folder 9
Patents, Classification Modes, August 10 1989
Box 21, Folder 10
Patents, Classification Modes, September-October 1989
Box 21, Folder 11
Patents, Classification Modes, March 1990
Box 21, Folder 12
Patents, Classification Modes, undated [Folder 1 of 4]
Box 21, Folder 13
Patents, Classification Modes, undated [Folder 2 of 4]
Box 21, Folder 14
Patents, Classification Modes, undated [Folder 3 of 4]
Box 21, Folder 15
Patents, Classification Modes, undated [Folder 4 of 4]
Box 21, Folder 16
Notecards
Patents [1 of 2]
Card box 22
Patents [2 of 2]
Card box 23
Reprints
Patents, Alphabetic Index of U.S. Cryptographic Patents, 1861-1989
Box 24, Folder 1
Patents, List of Primary Patents, 1861-1989
Box 24, Folder 2
Patents, List of Secondary Patents, 1861-1989
Box 24, Folder 3
Patents, U.S. Patents, Cryptographic Devices
Box 24, Folder 4
Patents [Folder 1 of 25]
Box 24, Folder 5
Patents [Folder 2 of 25]
Box 24, Folder 6
Patents [Folder 3 of 25]
Box 24, Folder 7
Patents [Folder 4 of 25]
Box 24, Folder 8
Patents [Folder 5 of 25]
Box 24, Folder 9
Patents [Folder 6 of 25]
Box 24, Folder 10
Patents [Folder 7 of 25]
Box 25, Folder 1
Patents [Folder 8 of 25]
Box 25, Folder 2
Patents [Folder 9 of 25]
Box 25, Folder 4
Patents [Folder 10 of 25]
Box 25, Folder 4
Patents [Folder 11 of 25]
Box 25, Folder 5
Patents [Folder 12 of 25]
Box 25, Folder 6
Patents [Folder 13 of 25]
Box 25, Folder 7
Patents [Folder 14 of 25]
Box 25, Folder 8
Patents [Folder 15 of 25]
Box 25, Folder 9
Patents [Folder 16 of 25]
Box 25, Folder 10
Patents [Folder 17 of 25]
Box 25, Folder 11
Patents [Folder 18 of 25]
Box 25, Folder 12
Patents [Folder 19 of 25]
Box 26, Folder 1
Patents [Folder 20 of 25]
Box 26, Folder 2
Patents [Folder 21 of 25]
Box 26, Folder 3
Patents [Folder 22 of 25]
Box 26, Folder 4
Patents [Folder 23 of 25]
Box 26, Folder 5
Patents [Folder 24 of 25]
Box 26, Folder 6
Patents [Folder 25 of 25]
Box 26, Folder 7
Writings
Size: 0.75 linear feet

This series contains published articles and typewritten or handwritten manuscripts.They are grouped by publisher or title and are arranged chronologically.Articles without dates are at the end of the series and are organized alphabetically.

1.5 archival boxes

American Mathematical Society, 1935-1960
Box 26, Folder 8
Duke Mathematical Society, 1949-1974
Box 26, Folder 9
"Note on the Number of Pattern Sequences of a Given Length," 1952
Box 26, Folder 10
"Some Permutation Problems Related to Circulant Permanents," 1954
Box 26, Folder 11
Mathematics Magazine, 1958-1961
Box 26, Folder 12
Various Publishers, 1958-1975
Box 26, Folder 13
American Mathematical Monthly, 1959-1962
Box 26, Folder 14
German Publisher, 1963-1967
Box 26, Folder 15
Cryptologia, 1977-1979
Box 26, Folder 16
Cryptologia, 1980-1981
Box 26, Folder 17
"Characteristic Functional Structure of Infintesimal Symmetry Mappings of Classical Dynamical Systems," 1985-1988
Box 27, Folder 1
Cryptologia, 1987
Box 27, Folder 2
Cryptologia Essay, 1989
Box 27, Folder 3
Cryptographic Patents Book (Revisions) 1991 [Folder 1 of 5]
Box 27, Folder 4
Cryptographic Patents Book (Revisions) 1991 [Folder 2 of 5]
Box 27, Folder 5
Cryptographic Patents Book (Revisions) 1991 [Folder 3 of 5]
Box 27, Folder 6
Cryptographic Patents Book (Revisions) 1991 [Folder 4 of 5]
Box 27, Folder 7
Cryptographic Patents Book (Revisions) 1991 [Folder 5 of 5]
Box 27, Folder 8
Cryptologia, 1993
Box 27, Folder 9
"A Class of Symmetries for Conservative Dynamical Systems," undated
Box 27, Folder 10
"A Trigraphic Frequency of 20,000 Letters," undated
Box 27, Folder 11
"Circulant Permanents," undated
Box 27, Folder 12
"Cryptographs and Enciphering Machines," undated
Box 27, Folder 13
Cryptologia Publications, undated
Box 27, Folder 14
"Note on Continuant Permanents," undated
Box 27, Folder 15
"Problems in Cryptanalysis," undated
Box 27, Folder 16
"Simple Substitution Ciphers," undated
Box 27, Folder 17
"Some Further Cryptographic Applications of Permutation Polynomials," undated
Box 27, Folder 18
Untitled, undated
Box 27, Folder 19
Teaching Career
Size: 1 linear foot

This series is organized alphabetically by topic, such as class notes, programs, reports.When available, the class number is indicated.

The following course descriptions are taken from North Carolina State College catalogs. Some courses have more than one course number, in which case all course numbers are listed (i.e. MA202/242). Each description is followed by a year in parentheses, indicating from which catalog the course description was taken.

MA202/242, Calculus II (prerequisite: MA201): Methods of integration; definite integral with applications to length of arc, surface area, volumes, centroids and moments of inertia; Simpson's rule; indeterminant forms, infinite series, expansion of functions, hyperbolic functions, partial differentiation; multiple integration. (1959-1960 catalog)

MA405, Introduction to Determinants and Matrices (prerequisite: MA202): Properties of determinants; differentiation; products; theorems of Laplace and Jacobi; systems of linear equations.Elementary operations with matrices; inverse rank, characteristic roots and eigenvectors.Introduction to algebraic forms. (1959-1960 catalog)

MA522, Theory of Probability (prerequisite: MA 401): Definitions, discrete and continuous sample spaces, combinatorial analysis, Stirling's formula, simple occupancy and ordering problems, conditional probability, repeated trials, compound experiments, Bayes' theorem, binomial, Poisson and normal distributions, the probability integral, random variables, expectation. (1959-1960 catalog)

2 archival boxes

Class Notes, MA202/242
Box 28, Folder 1
Class Notes, MA405
Box 28, Folder 2
Class Notes, MA522
Box 28, Folder 3
Class Notes, General [Folder 1 of 13]
Box 28, Folder 4
Class Notes, General [Folder 2 of 13]
Box 28, Folder 5
Class Notes, General [Folder 3 of 13]
Box 28, Folder 6
Class Notes, General [Folder 4 of 13]
Box 28, Folder 7
Presentation Program
Box 28, Folder 8
Student Report, 1973
Box 28, Folder 9
Student Report, undated
Box 28, Folder 10
Class Notes, MA202/242
Box 29, Folder 1
Class Notes, General [Folder 5 of 13]
Box 29, Folder 2
Class Notes, General [Folder 6 of 13]
Box 29, Folder 3
Class Notes, General [Folder 7 of 13]
Box 29, Folder 4
Class Notes, General [Folder 8 of 13]
Box 29, Folder 5
Class Notes, General [Folder 9 of 13]
Box 29, Folder 6
Class Notes, General [Folder 10 of 13]
Box 29, Folder 7
Class Notes, General [Folder 11 of 13]
Box 29, Folder 8
Class Notes, General [Folder 12 of 13]
Box 29, Folder 9
Class Notes, General [Folder 13 of 13]
Box 29, Folder 10
Collected Works 1716-1989
Size: 5.5 linear feet

This series is divided into three subseries.Reprints are organized chronologically, then alphabetically by author and subject.Reprints without dates are at the end of the series and are organized alphabetically by author and subject.Bibliographies are organized chronologically.Notecards are organized alphabetically by author.

12 archival boxes

Reprints
British Museum Deciphers of Diplomatic Papers 1716
Box 30, Folder 1
John Davys 1737
Box 30, Folder 2
British Museum Deciphers of Diplomatic Papers 1780
Box 30, Folder 3
Leon Gambetta 1870
Box 30, Folder 4
Cryptographie 1888
Box 30, Folder 5
Berry Benson 1896-1917
Box 30, Folder 6
Memento Cryptographie 1898
Box 30, Folder 7
Etienne Bazeries 1901
Box 30, Folder 8
Aloys Meister 1902
Box 30, Folder 9
A. Bundovets 1904
Box 30, Folder 10
Aloys Meister 1906
Box 30, Folder 11
Unknown Author 1917-1918
Box 30, Folder 12
Yves Gylden and Ivor Damm 1918
Box 30, Folder 13
Carl Kostka 1918
Box 30, Folder 14
Victor Weiskopf 1918
Box 30, Folder 15
Flynn's Weekly 1924-1928 [Folder 1 of 2]
Box 30, Folder 16
Flynn's Weekly 1924-1928 [Folder 2 of 2]
Box 30, Folder 17
W.H. Conklin 1925
Box 30, Folder 18
Problems: The Command and General Staff School 1926-1927
Card box 31
Merle OHaver 1926
Box 32, Folder 1
George Hamel 1926-1927
Box 32, Folder 2
Siegfried Turkel 1927
Box 32, Folder 3
Flynn's Weekly 1928
Box 32, Folder 4
Schurr and Kopff 1928
Box 32, Folder 5
Yves Gylden 1929
Box 32, Folder 6
M.K. Dirigo 1930s-1940s [Folder 1 of 3]
Box 32, Folder 7
M.K. Dirigo 1930s-1940s [Folder 2 of 3]
Box 32, Folder 8
M.K. Dirigo 1930s-1940s [Folder 3 of 3]
Box 32, Folder 9
Yves Gylden 1930
Box 33, Folder 1
Yves Gylden 1933
Box 33, Folder 2
M.H. Martin 1934
Box 33, Folder 3
Randolph Church 1935
Box 33, Folder 4
Luigi Sacco 1936 [Folder 1 of 2]
Box 33, Folder 5
Luigi Sacco 1936 [Folder 2 of 2]
Box 33, Folder 6
L.R. Trilling 1936
Box 33, Folder 7
Vernon Gavel 1938
Box 33, Folder 8
Karl-Albert Mugge 1938
Box 33, Folder 9
Andre Langie 1944
Box 33, Folder 10
I.J. Good 1946
Box 33, Folder 11
Elizabeth MacGibson 1947
Box 33, Folder 12
Hans Rohrbach 1948 [Folder 1 of 4]
Box 33, Folder 13
Hans Rohrbach 1948 [Folder 2 of 4]
Box 33, Folder 14
Hans Rohrbach 1948 [Folder 3 of 4]
Box 33, Folder 15
Hans Rohrbach 1948 [Folder 4 of 4]
Box 33, Folder 16
H.O. Foulkes 1949
Box 33, Folder 17
Howard Oakley 1950 [Folder 1 of 2]
Box 33, Folder 18
Howard Oakley 1950 [Folder 2 of 2]
Box 33, Folder 19
Richard Powell 1950
Box 33, Folder 20
Probability and Statistics in Cryptanalysis 1952
Box 33, Folder 21
Charles Eyraud 1953
Box 33, Folder 22
A.M. Gleason 1953
Box 33, Folder 23
Maurits de Vries 1953 [Folder 1 of 3]
Box 33, Folder 24
Maurits de Vries 1953 [Folder 2 of 3]
Box 33, Folder 25
Maurits de Vries 1953 [Folder 3 of 3]
Box 33, Folder 26
A.H. Deonier 1954
Box 33, Folder 27
Lester Hill 1955
Box 33, Folder 28
Lester Hill 1956 [Folder 1 of 3]
Box 34, Folder 1
Lester Hill 1956 [Folder 2 of 3]
Box 34, Folder 2
Lester Hill 1956 [Folder 3 of 3]
Box 34, Folder 3
Henry Langen 1956
Box 34, Folder 4
Hans Rohrbach 1957
Box 34, Folder 5
Luigi Sacco 1957
Box 34, Folder 6
Rudolf Schauffler 1957
Box 34, Folder 7
Eve and V.J. Bofinger 1958
Box 34, Folder 8
Ronald Webb Davis 1958
Box 34, Folder 9
Kenneth Ellis 1958
Box 34, Folder 10
Howard Oakley 1958
Box 34, Folder 11
H.W Gould 1959 [Folder 1 of 2]
Box 34, Folder 12
H.W. Gould 1959 [Folder 2 of 13]
Box 34, Folder 13
F.D. Lynch 1960
Box 34, Folder 14
Irma Reiner 1960
Box 34, Folder 15
Gloria Silvern 1960
Box 34, Folder 16
David Kahn 1960-1962
Box 34, Folder 17
Wayne Baker 1961 [Folder 1 of 2]
Box 34, Folder 18
Wayne Baker 1961 [Folder 2 of 2]
Box 34, Folder 19
David Kahn 1961
Box 34, Folder 20
W.M. Bowers 1962 [Folder 1 of 2]
Box 34, Folder 21
W.M. Bowers 1962 [Folder 2 of 2]
Box 34, Folder 22
Cryptography Article 1962
Box 34, Folder 23
Elizabeth Friedman 1962
Box 34, Folder 24
Maurits de Vries 1962
Box 34, Folder 25
David E. Daykin 1963
Box 34, Folder 26
Philip Geffe 1963
Box 34, Folder 27
Kaljo Kaarik 1963
Box 34, Folder 28
William Friedman 1964
Box 34, Folder 29
Rudolf Schauffler 1964
Box 34, Folder 30
Dan Laksov 1965
Box 34, Folder 31
Machines for Secret 1966
Box 34, Folder 32
David Kahn 1967
Box 35, Folder 1
Carl Hammer 1968
Box 35, Folder 2
David Kahn 1968
Box 35, Folder 3
H.J. Ryser 1968
Box 35, Folder 4
Translated by Steven Taylor 1969
Box 35, Folder 5
James Reeds 1970
Box 35, Folder 6
Eugen Mauler 1972
Box 35, Folder 7
Clayton Pierce 1972
Box 35, Folder 8
James Reeds 1972 [Folder 1 of 5]
Box 35, Folder 9
James Reeds 1972 [Folder 2 of 5]
Box 35, Folder 10
James Reeds 1972 [Folder 3 of 5]
Box 35, Folder 11
James Reeds 1972 [Folder 4 of 5]
Box 35, Folder 12
James Reeds 1972 [Folder 5 of 5]
Box 35, Folder 13
Michael Willet 1972-1982
Box 35, Folder 14
Pattern Word List 1973
Box 35, Folder 15
James Reeds 1973
Box 35, Folder 16
Bryant Tuckerman 1973
Box 35, Folder 17
J.V. Brawley 1973-1993
Box 35, Folder 18
Unknown 1975-1976
Box 35, Folder 19
L. Carlitz 1976
Box 35, Folder 20
Nicholas J. Rose 1976
Box 35, Folder 21
Edna Grossman and Bryant Tuckerman 1977
Box 35, Folder 22
James Reeds 1977
Box 35, Folder 23
Rivest, Shamir, and Adleman 1977
Box 35, Folder 24
Brian J. Winkel 1977
Box 35, Folder 25
Cryptographic Textbook (partial copy) 1978 [Folder 1 of 3]
Box 35, Folder 26
Cryptographic Textbook (partial copy) 1978 [Folder 2 of 3]
Box 35, Folder 27
Cryptographic Textbook (partial copy) 1978 [Folder 3 of 3]
Box 35, Folder 28
D.W. Davies and D.A. Bell 1978
Box 35, Folder 29
Hugo Brandstorm 1979
Box 36, Folder 1
David Kahn 1979
Box 36, Folder 2
Unknown Author 1979
Box 36, Folder 3
Robert Hartwig 1981
Box 36, Folder 4
Si Si 1981
Box 36, Folder 5
Advances in Cryptography 1982
Box 36, Folder 6
Cynthia Krauss 1984
Box 36, Folder 7
Spanish Books 1986
Box 36, Folder 8
James R. Chiles 1987
Box 36, Folder 9
Alberti on Deciphering, undated
Box 36, Folder 10
Analysis of a Periodic P.A.S. undated
Box 36, Folder 11
Analyzing Cryptograms undated
Box 36, Folder 12
Richard V. Andree, undated
Box 36, Folder 13
Autokey, Cipher Text as Key, undated
Box 36, Folder 14
Autokey Ciphers, undated
Box 36, Folder 15
Autokey, Plain Text as Key, undated
Box 36, Folder 16
Charles Babbage, undated [Folder 1 of 2]
Box 36, Folder 17
Charles Babbage, undated [Folder 2 of 2]
Box 36, Folder 18
Bacon Library Collection on Cryptology, undated
Box 38, Folder 19
Joel V. Brawley, undated
Box 36, Folder 20
Joel V. Brawley and Richard Millman, undated
Box 36, Folder 21
Lambus Callimahos, undated
Box 36, Folder 22
Joaquin Carmona, undated [Folder 1 of 2]
Box 36, Folder 23
Joaquin Carmona, undated [Folder 2 of 2]
Box 36, Folder 24
R.L. Cave and L.P. Neuwirth, undated
Box 37, Folder 1
Moise Ceffis, undated
Box 37, Folder 2
Poe Cipher Solution, undated
Box 37, Folder 3
Columnar Transposition, undated
Box 37, Folder 4
Criptografia, undated
Box 37, Folder 5
Cryptanalysis I, undated
Box 37, Folder 6
Cryptanalysis of a Public-Key Cryptosystem, undated
Box 37, Folder 7
Delastelle Cipher Systems, undated
Box 37, Folder 8
Different Systems of Cipher, undated
Box 37, Folder 9
George Fabyan, undated
Box 37, Folder 10
Herbert Flesch, undated
Box 37, Folder 11
B.J. Gilpin, undated
Box 37, Folder 12
Yves Gylden, undated
Box 37, Folder 13
Robert Hammell, undated
Box 37, Folder 14
Kasiski Method, undated
Box 37, Folder 15
Kasiski Method, undated [Folder 1 of 2]
Box 37, Folder 16
Don Kooken, undated [Folder 2 of 2]
Box 37, Folder 17
Carl Kosta, undated
Box 37, Folder 18
Kryha Machine Examples and Solutions, undated
Box 37, Folder 19
Henry Langen, undated
Box 37, Folder 20
Henry Langen, undated
Box 37, Folder 21
Edmund Locard, undated
Box 38, Folder 1
Harris MacNeish, undated
Box 38, Folder 2
Charles Mendelsohn, undated [Folder 1 of 2]
Box 38, Folder 3
Charles Mendelsohn, undated [Folder 2 of 2]
Box 38, Folder 4
Nihilist Substitution Cipher, undated
Box 38, Folder 5
Nihilist Transposition, undated
Box 38, Folder 6
Nyphos Robot System, undated
Box 38, Folder 7
Howard Oakley, undated
Box 38, Folder 8
Periodic Ciphers, undated
Box 38, Folder 9
Donald Pollack, undated
Box 38, Folder 10
Probability Definitions, undated
Box 38, Folder 11
Probable Diagram Method, undated
Box 38, Folder 12
Progressive Keys, undated
Box 38, Folder 13
The Quagmire Question, undated
Box 38, Folder 14
James Reeds, undated [Folder 1 of 3]
Box 38, Folder 15
James Reeds, undated [Folder 2 of 2]
Box 38, Folder 16
James Reeds, undated [Folder 3 of 3]
Box 38, Folder 17
Marian Rejewski, undated
Box 38, Folder 18
Luigi Sacco, undated
Box 38, Folder 19
Gustavus J. Simmons, undated
Box 38, Folder 20
Spotting Vowels in Simple Substitution Ciphers, undated
Box 38, Folder 21
Paul Stein, undated
Box 38, Folder 22
The Vigenere, undated
Box 38, Folder 23
The Zendian Problem, undated
Box 38, Folder 24
Unknown, undated [Folder 1 of 2]
Box 38, Folder 25
Unknown, undated [Folder 2 of 2]
Box 38, Folder 26
Bibliographies
1973-1974
Box 38, Folder 27
1983
Box 38, Folder 28
undated
Box 38, Folder 29
Reprints
Yves Gylden and Ivar Damm 1918 [Folder 1 of 2]
Box 39, Folder 1
Yves Gylden and Ivar Damm 1918 [Folder 2 of 2]
Box 39, Folder 2
Charles-Hubert Desnoyers 1967
Box 39, Folder 3
Cryptography Seminars 1970s-1980s
Box 39, Folder 4
Unknown Author, undated
Box 39, Folder 5
Book entitled 'Map Problems' 1926-1927
Card box 31
Notecards
Notecards
Box 40
Notecards
Box 41
Unprocessed material 1563-1970
Copies of articles and publications on cryptography 1563-1970
Carton 42
Copies of articles and publications on cryptography 1563-1970
Carton 43

Access to the collection

This collection is open for research; access requires at least 48 hours advance notice.

For more information contact us via mail, phone, or our web form.

Mailing address:
Special Collections Research Center
Box 7111
Raleigh, NC, 27695-7111

Phone: (919) 515-2273

Preferred Citation

[Identification of item], Jack Levine Papers, MC 00308, Special Collections Research Center, North Carolina State University Libraries, Raleigh, NC

Use of these materials

North Carolina State University does not own copyright to this collection. Individuals obtaining materials from the NCSU Libraries' Special Collections Research Center are responsible for using the works in conformance with United States copyright law as well as any donor restrictions accompanying the materials.