MC 00308 Guide to the Jack Levine Papers, 1563-1994

The collection is organized into five series: Correspondence, Research, Writings, Teaching Career, and Collected Works. Original order has been preserved as much as possible.
Try experimental container filtering.

Experimental feature. Enter text in the search box to filter/search the container list. Please click here to tell us about your experience with this feature. Feedback

Filter/search the container list:clear No Container Results (Check for highlighting of series/subseries below.)
This series includes correspondence about general cryptography, articles written by Levine and others, Levine's cryptographic patents book, and cryptographic computer tests. Major correspondents include Joel Brawley, Michael Willet, Louis Kruh, and Cryptologia Magazine.The series is organized chronologically, with the topic or correspondent indicated when available.
[Box 1, Folder 1] Statistical Cryptography Tests, 1940,
[Box 1, Folder 2] David Schulman, 1976,
[Box 1, Folder 3] Beale Cypher Association, 1979,
[Box 1, Folder 4] Joel Brawley, 1979-1980,
[Box 1, Folder 5] Cryptologia, 1979-1984,
[Box 1, Folder 6] Michael Willet, 1981,
[Box 1, Folder 7] Various, 1981 -1991,
[Box 1, Folder 8] Patent Serial Numbers, 1982-1985,
[Box 1, Folder 9] Michael Willet, 1983-1984,
[Box 1, Folder 10] Cryptologia, 1985-1993,
[Box 1, Folder 11] Louis Kruh, 1990,
[Box 1, Folder 12] John C. King [Folder 1 of 2], 1991,
[Box 1, Folder 13] John C. King [Folder 2 of 2], 1991,
[Box 1, Folder 14] Joel Brawley, 1991,
[Box 1, Folder 15] Joel Brawley, 1994,
This series is broken down into four subseries: Notes, Computer Printouts, Notecards, and Reprints.
The Notes subseries contains handwritten materials relating to patents, the Hill System of cryptography, and general cryptography.Only a few folders' contents could be clearly identified; the majority of materials did not have dates or titles.Folders are arranged alphabetically, with general topics at the end.
The Computer Printouts subseries also consists of materials relating to general cryptography, the Hill System, and patents.Materials on general cryptographic problems and systems are arranged alphabetically.These materials include oversize items and IBM computer punch cards.The Hill System folders are arranged first by Modulus (Mod) number and then chronologically.At the end of this subseries are materials pertaining to United States patents.These folders are divided into those organized by the name of the patent holder and those organized by classification mode; both types are arranged chronologically.
The notecards in the Notecards subseries list patent names, numbers, and the patent holder.These materials are arranged in original order.
The Reprints subseries consists of photocopies of patent descriptions from the United State patent office.They are arranged in original order.
Notes
[Box 2, Folder 1] Patents, Introduction to the Second Edition [Folder 1 of 2]
[Box 2, Folder 2] Patents, Introduction to the Second Edition [Folder 2 of 2]
[Box 2, Folder 3] Patents [Folder 1 of 6]
[Box 2, Folder 4] Patents [Folder 2 of 6]
[Box 2, Folder 5] Patents [Folder 3 of 6]
[Box 2, Folder 6] Patents [Folder 4 of 6]
[Box 2, Folder 7] Patents [Folder 5 of 6]
[Box 2, Folder 8] Patents [Folder 6 of 6]
[Box 3, Folder 1] Hill System, Hill System with Unknown Cipher Alphabet [Folder 1 of 2]
[Box 3, Folder 2] Hill System, Hill System with Unknown Cipher Alphabet [Folder 2 of 2]
[Box 3, Folder 3] Hill System, The Method of Stages
[Box 3, Folder 4] Hill System, Proposal Outline
[Box 3, Folder 5] Hill System [Folder 1 of 15]
[Box 3, Folder 6] Hill System [Folder 2 of 15]
[Box 3, Folder 7] Hill System [Folder 3 of 15]
[Box 3, Folder 8] Hill System [Folder 4 of 15]
[Box 3, Folder 9] Hill System [Folder 5 of 15]
[Box 3, Folder 10] Hill System [Folder 6 of 15]
[Box 3, Folder 11] Hill System [Folder 7 of 15]
[Box 3, Folder 12] Hill System [Folder 8 of 15]
[Box 3, Folder 13] Hill System [Folder 9 of 15]
[Box 3, Folder 14] Hill System [Folder 10 of 15]
[Box 3, Folder 15] Hill System [Folder 11 of 15]
[Box 3, Folder 16] Hill System [Folder 12 of 15]
[Box 3, Folder 17] Hill System [Folder 13 of 15]
[Box 3, Folder 18] Hill System [Folder 14 of 15]
[Box 3, Folder 19] Hill System [Folder 15 of 15]
[Box 4, Folder 1] General Cryptography, 2 Message Property
[Box 4, Folder 2] General Cryptography, Army Extension Course
[Box 4, Folder 3] General Cryptography, Depth Problems
[Box 4, Folder 4] General Cryptography, Equivalence and Decimations
[Box 4, Folder 5] General Cryptography, Five Letter Words
[Box 4, Folder 6] General Cryptography, Locating a Probable Word
[Box 4, Folder 7] General Cryptography, Log 10 N!
[Box 4, Folder 8] General Cryptography, Multiplication Table
[Box 4, Folder 9] General Cryptography, Probable Word Problems
[Box 4, Folder 10] General Cryptography, Programs for Encipherment
[Box 4, Folder 11] General Cryptography, Progressive Cipher
[Box 4, Folder 12] General Cryptography, Riordan Combinatorial Analysis
[Box 4, Folder 13] General Cryptography, Symmetry, Direct and Indirect
[Box 4, Folder 14] General Cryptography, Variations on the Vigenere
[Box 4, Folder 15] General Cryptography [Folder 1 of 15]
[Box 4, Folder 16] General Cryptography [Folder 2 of 15]
[Box 4, Folder 17] General Cryptography [Folder 3 of 15]
[Box 4, Folder 18] General Cryptography [Folder 4 of 15]
[Box 4, Folder 19] General Cryptography [Folder 5 of 15]
[Box 4, Folder 20] General Cryptography [Folder 6 of 15]
[Box 4, Folder 21] General Cryptography [Folder 7 of 15]
[Box 4, Folder 22] General Cryptography [Folder 8 of 15]
[Box 4, Folder 23] General Cryptography [Folder 9 of 15]
[Box 4, Folder 24] General Cryptography [Folder 10 of 15]
[Box 4, Folder 25] General Cryptography [Folder 11 of 15]
[Box 4, Folder 26] General Cryptography [Folder 12 of 15]
[Box 5, Item 1] General Cryptography, Algebraic Encipherment Wheels (2)
[Box 5, Item 2] General Cryptography, Multiplication Table
[Box 6, Folder 1] General Cryptography, Band Transposition
[Box 6, Folder 2] General Cryptography, Circulant Permanents
[Box 6, Folder 3] General Cryptography [Folder 13 of 15]
[Box 6, Folder 4] General Cryptography [Folder 14 of 15]
[Box 6, Folder 5] General Cryptography [Folder 15 of 15]
Computer Printouts
[Box 6, Folder 6] General Cryptography, A-1
[Box 6, Folder 7] General Cryptography, A-9
[Box 6, Folder 8] General Cryptography, B-1
[Box 6, Folder 9] General Cryptography, B-9
[Box 6, Folder 10] General Cryptography, Cases 1-7
[Box 6, Folder 11] General Cryptography, Prime Factors of Polynomials
[Box 6, Folder 12] General Cryptography, Project M.B0525
[Box 6, Folder 13] General Cryptography [Folder 1 of 2]
[Box 6, Folder 14] General Cryptography [Folder 2 of 2]
[Box 7] General Cryptography, Alphabets (Oversize Material)
[Box 8] General Cryptography, Factor Table (Oversize Material)
[Box 9] General Cryptography, Multiplication Tables. Mod K, K= 5-70 (Oversize Material)
[Box 10] General Cryptography, Pattern Words [1 of 3] (Oversize Material)
[Box 11] General Cryptography, Pattern Words [2 of 3] (Oversize Material)
[Box 12] General Cryptography, Pattern Words [3 of 3] (Oversize Material)
[Box 13] General Cryptography, Plain-text punch cards [1 of 3]
[Box 14] General Cryptography, Plain-text punch cards [2 of 3]
[Box 15] General Cryptography, Plain-text punch cards [3 of 3]
[Box 16, Folder 1] Hill System, Mod 2, July-August 1983
[Box 16, Folder 2] Hill System, Mod 2, undated
[Box 16, Folder 3] Hill System, Mod 5, July 1983
[Box 16, Folder 4] Hill System, Mod 7, June-August 1983
[Box 16, Folder 5] Hill System, Mod 7, June 1984
[Box 16, Folder 6] Hill System, Mod 7, July 1984
[Box 16, Folder 7] Hill System, Mod 7, undated
[Box 16, Folder 8] Hill System, Mod 10, July-August 1983
[Box 16, Folder 9] Hill System, Mod 11, June-August 1983
[Box 16, Folder 10] Hill System, Mod 11, January 1984
[Box 16, Folder 11] Hill System, Mod 11, undated
[Box 16, Folder 12] Hill System, Mod 13, July 11 1983
[Box 16, Folder 13] Hill System, Mod 13, July 14 1983
[Box 16, Folder 14] Hill System, Mod 13, July 29 1983
[Box 16, Folder 15] Hill System, Mod 13, August 1983
[Box 16, Folder 16] Hill System, Mod 13, January 1984
[Box 16, Folder 17] Hill System, Mod 13, July 12 1984
[Box 16, Folder 18] Hill System, Mod 13, July 17 1984
[Box 16, Folder 19] Hill System, Mod 13, undated [Folder 1 of 6]
[Box 16, Folder 20] Hill System, Mod 13, undated [Folder 2 of 6]
[Box 16, Folder 21] Hill System, Mod 13, undated [Folder 3 of 6]
[Box 17, Folder 1] Hill System, Mod 13, undated [Folder 4 of 6]
[Box 17, Folder 2] Hill System, Mod 13, undated [Folder 5 of 6]
[Box 17, Folder 3] Hill System, Mod 13, undated [Folder 6 of 6]
[Box 17, Folder 4] Hill System, Mod 14, August 1983
[Box 17, Folder 5] Hill System, Mod 19, July 14 1983
[Box 17, Folder 6] Hill System, Mod 19, July 29 1983
[Box 17, Folder 7] Hill System, Mod 19, April 1984
[Box 17, Folder 8] Hill System, Mod 19, July 10 1984
[Box 17, Folder 9] Hill System, Mod 19, July 17 1984
[Box 17, Folder 10] Hill System, Mod 19, undated [Folder 1 of 65]
[Box 17, Folder 11] Hill System, Mod 19, undated [Folder 2 of 5]
[Box 17, Folder 12] Hill System, Mod 19, undated [Folder 3 of 5]
[Box 17, Folder 13] Hill System, Mod 19, undated [Folder 4 of 5]
[Box 17, Folder 14] Hill System, Mod 19, undated [Folder 5 of 65]
[Box 18, Folder 1] Hill System, Mod 22, August 1983
[Box 18, Folder 2] Hill System, Mod 26, August 1983
[Box 18, Folder 3] Hill System, Mod 26, March 11 1984
[Box 18, Folder 4] Hill System, Mod 26, March 19 1984 [Folder 1 of 2]
[Box 18, Folder 5] Hill System, Mod 26, March 19 1984 [Folder 2 of 2]
[Box 18, Folder 6] Hill System, Mod 26, April 1984
[Box 18, Folder 7] Hill System, Mod 26, undated [Folder 1 of 6]
[Box 18, Folder 8] Hill System, Mod 26, undated [Folder 2 of 6]
[Box 18, Folder 9] Hill System, Mod 29, August 1983
[Box 18, Folder 10] Hill System, Mod 29, undated
[Box 18, Folder 11] Hill System, Mod 10 and Mod 2, undated
[Box 18, Folder 12] Hill System, Mod 10 and Mod 5, undated
[Box 18, Folder 13] Hill System, Mod 26 and Mod 2, undated
[Box 19, Folder 1] Hill System, Mod 26 and Mod 13, undated [Folder 1 of 2]
[Box 19, Folder 2] Hill System, Mod 26 and Mod 13, undated [Folder 2 of 6]
[Box 19, Folder 3] Hill System, Program Listings, July-August 1983
[Box 19, Folder 4] Hill System, Problems 8-13, July-August 1983
[Box 19, Folder 5] Hill System, Unknown Cipher Alphabet, July 1983
[Box 19, Folder 6] Hill System, Unknown Cipher Alphabet, January 1984
[Box 19, Folder 7] Hill System, Unknown Mod, May 1983-April 1984
[Box 19, Folder 8] Hill System, Unknown Mod, March 16 1984
[Box 19, Folder 9] Hill System, Unknown Mod, March 18 1984 [Folder 1 of 2]
[Box 19, Folder 10] Hill System, Unknown Mod, March 18 1984 [Folder 2 of 2]
[Box 19, Folder 11] Hill System, Unknown Mod, April 6 1984
[Box 19, Folder 12] Hill System, Unknown Mod, undated
[Box 20, Folder 1] Hill System, Mod 5, undated
[Box 20, Folder 2] Hill System, Mod 11, undated [Folder 1 of 4]
[Box 20, Folder 3] Hill System, Mod 11, undated [Folder 2 of 4]
[Box 20, Folder 4] Hill System, Mod 11, undated [Folder 3 of 4]
[Box 20, Folder 5] Hill System, Mod 11, undated [Folder 4 of 4]
[Box 20, Folder 6] Hill System, Mod 13, undated [Folder 1 of 4]
[Box 20, Folder 7] Hill System, Mod 13, undated [Folder 2 of 4]
[Box 20, Folder 8] Hill System, Mod 13, undated [Folder 3 of 4]
[Box 20, Folder 9] Hill System, Mod 13, undated [Folder 4 of 4]
[Box 20, Folder 10] Hill System, Mod 19, undated [Folder 1 of 8]
[Box 20, Folder 11] Hill System, Mod 19, undated [Folder 2 of 8]
[Box 20, Folder 12] Hill System, Mod 19, undated [Folder 3 of 8]
[Box 20, Folder 13] Hill System, Mod 19, undated [Folder 4 of 8]
[Box 20, Folder 14] Hill System, Mod 19, undated [Folder 5 of 8]
[Box 20, Folder 15] Hill System, Mod 19, undated [Folder 6 of 8]
[Box 20, Folder 16] Hill System, Mod 19, undated [Folder 7 of 8]
[Box 20, Folder 17] Hill System, Mod 19, undated [Folder 8 of 8]
[Box 20, Folder 18] Hill System, Mod 29, undated
[Box 20, Folder 19] Hill System, Unknown Mod, undated
[Box 21, Folder 1] Patents, Names, 1861-1989
[Box 21, Folder 2] Patents, Names, 1887-1981
[Box 21, Folder 3] Patents, Names, 1982-1989 [Folder 1 of 3]
[Box 21, Folder 4] Patents, Names, 1982-1989 [Folder 2 of 3]
[Box 21, Folder 5] Patents, Names, 1982-1989 [Folder 3 of 3]
[Box 21, Folder 6] Patents, Names, 1982-1985
[Box 21, Folder 7] Patents, Names, 1985-1987
[Box 21, Folder 8] Patents, Names, 1987-1989
[Box 21, Folder 9] Patents, Classification Modes, August 9 1989
[Box 21, Folder 10] Patents, Classification Modes, August 10 1989
[Box 21, Folder 11] Patents, Classification Modes, September-October 1989
[Box 21, Folder 12] Patents, Classification Modes, March 1990
[Box 21, Folder 13] Patents, Classification Modes, undated [Folder 1 of 4]
[Box 21, Folder 14] Patents, Classification Modes, undated [Folder 2 of 4]
[Box 21, Folder 15] Patents, Classification Modes, undated [Folder 3 of 4]
[Box 21, Folder 16] Patents, Classification Modes, undated [Folder 4 of 4]
Notecards
[Card Box 22] Patents [1 of 2]
[Card Box 23] Patents [2 of 2]
Reprints
[Box 24, Folder 1] Patents, Alphabetic Index of U.S. Cryptographic Patents, 1861-1989
[Box 24, Folder 2] Patents, List of Primary Patents, 1861-1989
[Box 24, Folder 3] Patents, List of Secondary Patents, 1861-1989
[Box 24, Folder 4] Patents, U.S. Patents, Cryptographic Devices
[Box 24, Folder 5] Patents [Folder 1 of 25]
[Box 24, Folder 6] Patents [Folder 2 of 25]
[Box 24, Folder 7] Patents [Folder 3 of 25]
[Box 24, Folder 8] Patents [Folder 4 of 25]
[Box 24, Folder 9] Patents [Folder 5 of 25]
[Box 24, Folder 10] Patents [Folder 6 of 25]
[Box 25, Folder 1] Patents [Folder 7 of 25]
[Box 25, Folder 2] Patents [Folder 8 of 25]
[Box 25, Folder 4] Patents [Folder 9 of 25]
[Box 25, Folder 4] Patents [Folder 10 of 25]
[Box 25, Folder 5] Patents [Folder 11 of 25]
[Box 25, Folder 6] Patents [Folder 12 of 25]
[Box 25, Folder 7] Patents [Folder 13 of 25]
[Box 25, Folder 8] Patents [Folder 14 of 25]
[Box 25, Folder 9] Patents [Folder 15 of 25]
[Box 25, Folder 10] Patents [Folder 16 of 25]
[Box 25, Folder 11] Patents [Folder 17 of 25]
[Box 25, Folder 12] Patents [Folder 18 of 25]
[Box 26, Folder 1] Patents [Folder 19 of 25]
[Box 26, Folder 2] Patents [Folder 20 of 25]
[Box 26, Folder 3] Patents [Folder 21 of 25]
[Box 26, Folder 4] Patents [Folder 22 of 25]
[Box 26, Folder 5] Patents [Folder 23 of 25]
[Box 26, Folder 6] Patents [Folder 24 of 25]
[Box 26, Folder 7] Patents [Folder 25 of 25]
This series contains published articles and typewritten or handwritten manuscripts.They are grouped by publisher or title and are arranged chronologically.Articles without dates are at the end of the series and are organized alphabetically.
[Box 26, Folder 8] American Mathematical Society, 1935-1960
[Box 26, Folder 9] Duke Mathematical Society, 1949-1974
[Box 26, Folder 10] "Note on the Number of Pattern Sequences of a Given Length," 1952
[Box 26, Folder 11] "Some Permutation Problems Related to Circulant Permanents," 1954
[Box 26, Folder 12] Mathematics Magazine, 1958-1961
[Box 26, Folder 13] Various Publishers, 1958-1975
[Box 26, Folder 14] American Mathematical Monthly, 1959-1962
[Box 26, Folder 15] German Publisher, 1963-1967
[Box 26, Folder 16] Cryptologia, 1977-1979
[Box 26, Folder 17] Cryptologia, 1980-1981
[Box 27, Folder 1] "Characteristic Functional Structure of Infintesimal Symmetry Mappings of Classical Dynamical Systems,", 1985-1988
[Box 27, Folder 2] Cryptologia, 1987
[Box 27, Folder 3] Cryptologia Essay, 1989
[Box 27, Folder 4] Cryptographic Patents Book (Revisions), 1991 [Folder 1 of 5]
[Box 27, Folder 5] Cryptographic Patents Book (Revisions), 1991 [Folder 2 of 5]
[Box 27, Folder 6] Cryptographic Patents Book (Revisions), 1991 [Folder 3 of 5]
[Box 27, Folder 7] Cryptographic Patents Book (Revisions), 1991 [Folder 4 of 5]
[Box 27, Folder 8] Cryptographic Patents Book (Revisions), 1991 [Folder 5 of 5]
[Box 27, Folder 9] Cryptologia, 1993
[Box 27, Folder 10] "A Class of Symmetries for Conservative Dynamical Systems," undated
[Box 27, Folder 11] "A Trigraphic Frequency of 20,000 Letters," undated
[Box 27, Folder 12] "Circulant Permanents," undated
[Box 27, Folder 13] "Cryptographs and Enciphering Machines," undated
[Box 27, Folder 14] Cryptologia Publications, undated
[Box 27, Folder 15] "Note on Continuant Permanents," undated
[Box 27, Folder 16] "Problems in Cryptanalysis," undated
[Box 27, Folder 17] "Simple Substitution Ciphers," undated
[Box 27, Folder 18] "Some Further Cryptographic Applications of Permutation Polynomials," undated
[Box 27, Folder 19] Untitled, undated
This series is organized alphabetically by topic, such as class notes, programs, reports.When available, the class number is indicated.
The following course descriptions are taken from North Carolina State College catalogs. Some courses have more than one course number, in which case all course numbers are listed (i.e. MA202/242). Each description is followed by a year in parentheses, indicating from which catalog the course description was taken.
MA202/242, Calculus II (prerequisite: MA201): Methods of integration; definite integral with applications to length of arc, surface area, volumes, centroids and moments of inertia; Simpson's rule; indeterminant forms, infinite series, expansion of functions, hyperbolic functions, partial differentiation; multiple integration. (1959-1960 catalog)
MA405, Introduction to Determinants and Matrices (prerequisite: MA202): Properties of determinants; differentiation; products; theorems of Laplace and Jacobi; systems of linear equations.Elementary operations with matrices; inverse rank, characteristic roots and eigenvectors.Introduction to algebraic forms. (1959-1960 catalog)
MA522, Theory of Probability (prerequisite: MA 401): Definitions, discrete and continuous sample spaces, combinatorial analysis, Stirling's formula, simple occupancy and ordering problems, conditional probability, repeated trials, compound experiments, Bayes' theorem, binomial, Poisson and normal distributions, the probability integral, random variables, expectation. (1959-1960 catalog)
[Box 28, Folder 1] Class Notes, MA202/242
[Box 28, Folder 2] Class Notes, MA405
[Box 28, Folder 3] Class Notes, MA522
[Box 28, Folder 4] Class Notes, General [Folder 1 of 13]
[Box 28, Folder 5] Class Notes, General [Folder 2 of 13]
[Box 28, Folder 6] Class Notes, General [Folder 3 of 13]
[Box 28, Folder 7] Class Notes, General [Folder 4 of 13]
[Box 28, Folder 8] Presentation Program
[Box 28, Folder 9] Student Report, 1973
[Box 28, Folder 10] Student Report, undated
[Box 29, Folder 1] Class Notes, MA202/242
[Box 29, Folder 2] Class Notes, General [Folder 5 of 13]
[Box 29, Folder 3] Class Notes, General [Folder 6 of 13]
[Box 29, Folder 4] Class Notes, General [Folder 7 of 13]
[Box 29, Folder 5] Class Notes, General [Folder 8 of 13]
[Box 29, Folder 6] Class Notes, General [Folder 9 of 13]
[Box 29, Folder 7] Class Notes, General [Folder 10 of 13]
[Box 29, Folder 8] Class Notes, General [Folder 11 of 13]
[Box 29, Folder 9] Class Notes, General [Folder 12 of 13]
[Box 29, Folder 10] Class Notes, General [Folder 13 of 13]
This series is divided into three subseries.Reprints are organized chronologically, then alphabetically by author and subject.Reprints without dates are at the end of the series and are organized alphabetically by author and subject.Bibliographies are organized chronologically.Notecards are organized alphabetically by author.
Reprints
[Box 30, Folder 1] British Museum Deciphers of Diplomatic Papers, 1716
[Box 30, Folder 2] John Davys, 1737
[Box 30, Folder 3] British Museum Deciphers of Diplomatic Papers, 1780
[Box 30, Folder 4] Leon Gambetta, 1870
[Box 30, Folder 5] Cryptographie, 1888
[Box 30, Folder 6] Berry Benson, 1896-1917
[Box 30, Folder 7] Memento Cryptographie, 1898
[Box 30, Folder 8] Etienne Bazeries, 1901
[Box 30, Folder 9] Aloys Meister, 1902
[Box 30, Folder 10] A. Bundovets, 1904
[Box 30, Folder 11] Aloys Meister, 1906
[Box 30, Folder 12] Unknown Author, 1917-1918
[Box 30, Folder 13] Yves Gylden and Ivor Damm, 1918
[Box 30, Folder 14] Carl Kostka, 1918
[Box 30, Folder 15] Victor Weiskopf, 1918
[Box 30, Folder 16] Flynn's Weekly, 1924-1928 [Folder 1 of 2]
[Box 30, Folder 17] Flynn's Weekly, 1924-1928 [Folder 2 of 2]
[Box 30, Folder 18] W.H. Conklin, 1925
[Card Box 31] Problems: The Command and General Staff School, 1926-1927
[Box 32, Folder 1] Merle OHaver, 1926
[Box 32, Folder 2] George Hamel, 1926-1927
[Box 32, Folder 3] Siegfried Turkel, 1927
[Box 32, Folder 4] Flynn's Weekly, 1928
[Box 32, Folder 5] Schurr and Kopff, 1928
[Box 32, Folder 6] Yves Gylden, 1929
[Box 32, Folder 7] M.K. Dirigo, 1930s-1940s [Folder 1 of 3]
[Box 32, Folder 8] M.K. Dirigo, 1930s-1940s [Folder 2 of 3]
[Box 32, Folder 9] M.K. Dirigo, 1930s-1940s [Folder 3 of 3]
[Box 33, Folder 1] Yves Gylden, 1930
[Box 33, Folder 2] Yves Gylden, 1933
[Box 33, Folder 3] M.H. Martin, 1934
[Box 33, Folder 4] Randolph Church, 1935
[Box 33, Folder 5] Luigi Sacco, 1936 [Folder 1 of 2]
[Box 33, Folder 6] Luigi Sacco, 1936 [Folder 2 of 2]
[Box 33, Folder 7] L.R. Trilling, 1936
[Box 33, Folder 8] Vernon Gavel, 1938
[Box 33, Folder 9] Karl-Albert Mugge, 1938
[Box 33, Folder 10] Andre Langie, 1944
[Box 33, Folder 11] I.J. Good, 1946
[Box 33, Folder 12] Elizabeth MacGibson, 1947
[Box 33, Folder 13] Hans Rohrbach, 1948 [Folder 1 of 4]
[Box 33, Folder 14] Hans Rohrbach, 1948 [Folder 2 of 4]
[Box 33, Folder 15] Hans Rohrbach, 1948 [Folder 3 of 4]
[Box 33, Folder 16] Hans Rohrbach, 1948 [Folder 4 of 4]
[Box 33, Folder 17] H.O. Foulkes, 1949
[Box 33, Folder 18] Howard Oakley, 1950 [Folder 1 of 2]
[Box 33, Folder 19] Howard Oakley, 1950 [Folder 2 of 2]
[Box 33, Folder 20] Richard Powell, 1950
[Box 33, Folder 21] Probability and Statistics in Cryptanalysis, 1952
[Box 33, Folder 22] Charles Eyraud, 1953
[Box 33, Folder 23] A.M. Gleason, 1953
[Box 33, Folder 24] Maurits de Vries, 1953 [Folder 1 of 3]
[Box 33, Folder 25] Maurits de Vries, 1953 [Folder 2 of 3]
[Box 33, Folder 26] Maurits de Vries, 1953 [Folder 3 of 3]
[Box 33, Folder 27] A.H. Deonier, 1954
[Box 33, Folder 28] Lester Hill, 1955
[Box 34, Folder 1] Lester Hill, 1956 [Folder 1 of 3]
[Box 34, Folder 2] Lester Hill, 1956 [Folder 2 of 3]
[Box 34, Folder 3] Lester Hill, 1956 [Folder 3 of 3]
[Box 34, Folder 4] Henry Langen, 1956
[Box 34, Folder 5] Hans Rohrbach, 1957
[Box 34, Folder 6] Luigi Sacco, 1957
[Box 34, Folder 7] Rudolf Schauffler, 1957
[Box 34, Folder 8] Eve and V.J. Bofinger, 1958
[Box 34, Folder 9] Ronald Webb Davis, 1958
[Box 34, Folder 10] Kenneth Ellis, 1958
[Box 34, Folder 11] Howard Oakley, 1958
[Box 34, Folder 12] H.W Gould, 1959 [Folder 1 of 2]
[Box 34, Folder 13] H.W. Gould, 1959 [Folder 2 of 13]
[Box 34, Folder 14] F.D. Lynch, 1960
[Box 34, Folder 15] Irma Reiner, 1960
[Box 34, Folder 16] Gloria Silvern, 1960
[Box 34, Folder 17] David Kahn, 1960-1962
[Box 34, Folder 18] Wayne Baker, 1961 [Folder 1 of 2]
[Box 34, Folder 19] Wayne Baker, 1961 [Folder 2 of 2]
[Box 34, Folder 20] David Kahn, 1961
[Box 34, Folder 21] W.M. Bowers, 1962 [Folder 1 of 2]
[Box 34, Folder 22] W.M. Bowers, 1962 [Folder 2 of 2]
[Box 34, Folder 23] Cryptography Article, 1962
[Box 34, Folder 24] Elizabeth Friedman, 1962
[Box 34, Folder 25] Maurits de Vries, 1962
[Box 34, Folder 26] David E. Daykin, 1963
[Box 34, Folder 27] Philip Geffe, 1963
[Box 34, Folder 28] Kaljo Kaarik, 1963
[Box 34, Folder 29] William Friedman, 1964
[Box 34, Folder 30] Rudolf Schauffler, 1964
[Box 34, Folder 31] Dan Laksov, 1965
[Box 34, Folder 32] Machines for Secret, 1966
[Box 35, Folder 1] David Kahn, 1967
[Box 35, Folder 2] Carl Hammer, 1968
[Box 35, Folder 3] David Kahn, 1968
[Box 35, Folder 4] H.J. Ryser, 1968
[Box 35, Folder 5] Translated by Steven Taylor, 1969
[Box 35, Folder 6] James Reeds, 1970
[Box 35, Folder 7] Eugen Mauler, 1972
[Box 35, Folder 8] Clayton Pierce, 1972
[Box 35, Folder 9] James Reeds, 1972 [Folder 1 of 5]
[Box 35, Folder 10] James Reeds, 1972 [Folder 2 of 5]
[Box 35, Folder 11] James Reeds, 1972 [Folder 3 of 5]
[Box 35, Folder 12] James Reeds, 1972 [Folder 4 of 5]
[Box 35, Folder 13] James Reeds, 1972 [Folder 5 of 5]
[Box 35, Folder 14] Michael Willet, 1972-1982
[Box 35, Folder 15] Pattern Word List, 1973
[Box 35, Folder 16] James Reeds, 1973
[Box 35, Folder 17] Bryant Tuckerman, 1973
[Box 35, Folder 18] J.V. Brawley, 1973-1993
[Box 35, Folder 19] Unknown, 1975-1976
[Box 35, Folder 20] L. Carlitz, 1976
[Box 35, Folder 21] Nicholas J. Rose, 1976
[Box 35, Folder 22] Edna Grossman and Bryant Tuckerman, 1977
[Box 35, Folder 23] James Reeds, 1977
[Box 35, Folder 24] Rivest, Shamir, and Adleman, 1977
[Box 35, Folder 25] Brian J. Winkel, 1977
[Box 35, Folder 26] Cryptographic Textbook (partial copy), 1978 [Folder 1 of 3]
[Box 35, Folder 27] Cryptographic Textbook (partial copy), 1978 [Folder 2 of 3]
[Box 35, Folder 28] Cryptographic Textbook (partial copy), 1978 [Folder 3 of 3]
[Box 35, Folder 29] D.W. Davies and D.A. Bell, 1978
[Box 36, Folder 1] Hugo Brandstorm, 1979
[Box 36, Folder 2] David Kahn, 1979
[Box 36, Folder 3] Unknown Author, 1979
[Box 36, Folder 4] Robert Hartwig, 1981
[Box 36, Folder 5] Si Si, 1981
[Box 36, Folder 6] Advances in Cryptography, 1982
[Box 36, Folder 7] Cynthia Krauss, 1984
[Box 36, Folder 8] Spanish Books, 1986
[Box 36, Folder 9] James R. Chiles, 1987
[Box 36, Folder 10] Alberti on Deciphering, undated
[Box 36, Folder 11] Analysis of a Periodic P.A.S. undated
[Box 36, Folder 12] Analyzing Cryptograms undated
[Box 36, Folder 13] Richard V. Andree, undated
[Box 36, Folder 14] Autokey, Cipher Text as Key, undated
[Box 36, Folder 15] Autokey Ciphers, undated
[Box 36, Folder 16] Autokey, Plain Text as Key, undated
[Box 36, Folder 17] Charles Babbage, undated [Folder 1 of 2]
[Box 36, Folder 18] Charles Babbage, undated [Folder 2 of 2]
[Box 38, Folder 19] Bacon Library Collection on Cryptology, undated
[Box 36, Folder 20] Joel V. Brawley, undated
[Box 36, Folder 21] Joel V. Brawley and Richard Millman, undated
[Box 36, Folder 22] Lambus Callimahos, undated
[Box 36, Folder 23] Joaquin Carmona, undated [Folder 1 of 2]
[Box 36, Folder 24] Joaquin Carmona, undated [Folder 2 of 2]
[Box 37, Folder 1] R.L. Cave and L.P. Neuwirth, undated
[Box 37, Folder 2] Moise Ceffis, undated
[Box 37, Folder 3] Poe Cipher Solution, undated
[Box 37, Folder 4] Columnar Transposition, undated
[Box 37, Folder 5] Criptografia, undated
[Box 37, Folder 6] Cryptanalysis I, undated
[Box 37, Folder 7] Cryptanalysis of a Public-Key Cryptosystem, undated
[Box 37, Folder 8] Delastelle Cipher Systems, undated
[Box 37, Folder 9] Different Systems of Cipher, undated
[Box 37, Folder 10] George Fabyan, undated
[Box 37, Folder 11] Herbert Flesch, undated
[Box 37, Folder 12] B.J. Gilpin, undated
[Box 37, Folder 13] Yves Gylden, undated
[Box 37, Folder 14] Robert Hammell, undated
[Box 37, Folder 15] Kasiski Method, undated
[Box 37, Folder 16] Kasiski Method, undated [Folder 1 of 2]
[Box 37, Folder 17] Don Kooken, undated [Folder 2 of 2]
[Box 37, Folder 18] Carl Kosta, undated
[Box 37, Folder 19] Kryha Machine Examples and Solutions, undated
[Box 37, Folder 20] Henry Langen, undated
[Box 37, Folder 21] Henry Langen, undated
[Box 38, Folder 1] Edmund Locard, undated
[Box 38, Folder 2] Harris MacNeish, undated
[Box 38, Folder 3] Charles Mendelsohn, undated [Folder 1 of 2]
[Box 38, Folder 4] Charles Mendelsohn, undated [Folder 2 of 2]
[Box 38, Folder 5] Nihilist Substitution Cipher, undated
[Box 38, Folder 6] Nihilist Transposition, undated
[Box 38, Folder 7] Nyphos Robot System, undated
[Box 38, Folder 8] Howard Oakley, undated
[Box 38, Folder 9] Periodic Ciphers, undated
[Box 38, Folder 10] Donald Pollack, undated
[Box 38, Folder 11] Probability Definitions, undated
[Box 38, Folder 12] Probable Diagram Method, undated
[Box 38, Folder 13] Progressive Keys, undated
[Box 38, Folder 14] The Quagmire Question, undated
[Box 38, Folder 15] James Reeds, undated [Folder 1 of 3]
[Box 38, Folder 16] James Reeds, undated [Folder 2 of 2]
[Box 38, Folder 17] James Reeds, undated [Folder 3 of 3]
[Box 38, Folder 18] Marian Rejewski, undated
[Box 38, Folder 19] Luigi Sacco, undated
[Box 38, Folder 20] Gustavus J. Simmons, undated
[Box 38, Folder 21] Spotting Vowels in Simple Substitution Ciphers, undated
[Box 38, Folder 22] Paul Stein, undated
[Box 38, Folder 23] The Vigenere, undated
[Box 38, Folder 24] The Zendian Problem, undated
[Box 38, Folder 25] Unknown, undated [Folder 1 of 2]
[Box 38, Folder 26] Unknown, undated [Folder 2 of 2]
Bibliographies
[Box 38, Folder 27] 1973-1974
[Box 38, Folder 28] 1983
[Box 38, Folder 29] undated
Reprints
[Box 39, Folder 1] Yves Gylden and Ivar Damm, 1918 [Folder 1 of 2]
[Box 39, Folder 2] Yves Gylden and Ivar Damm, 1918 [Folder 2 of 2]
[Box 39, Folder 3] Charles-Hubert Desnoyers, 1967
[Box 39, Folder 4] Cryptography Seminars, 1970s-1980s
[Box 39, Folder 5] Unknown Author, undated
[Box 31] Book entitled 'Map Problems', 1926-1927
Notecards
[Box 40] Notecards
[Box 41] Notecards
[Carton 42] Copies of articles and publications on cryptography, 1563-1970
[Carton 43] Copies of articles and publications on cryptography, 1563-1970

Creator

Levine, Jack, 1907-

Quantity

20.0 Linear feet

General Physical Description note

37 archival boxes and 6 oversize folders

Location

For current information on the location of these materials, please consult the Special Collections Research Center Reference Staff external link.

Language

English

Acquisition Information

Gift of Jack Levine, 1995 and 2011. Accession no. (1995.0016) and (2011.0209).

Processing

Processed by: Katie Brightman; machine-readable finding aid created by: Katie Brightman

Revised

2011 September, <date calendar="gregorian" normal="2005" era="ce">2005</date><item>Converted to EAD 2002</item>updated by Judy Allen Dodson September 2011

Scope and Content Note

This collection contains materials related to Levine's research interests, as well as those documenting his publications and university career. Correspondence includes letters about general cryptography, articles written by Levine and others, Levine's cryptographic patents book, and cryptographic computer tests. Research contains notes, computer printouts, article reprints, and note cards related to Levine's research interests in cryptography. Writings includes Levine's published and unpublished essays and pamphlets. Teaching Career includes class notes and other student-related material. Collected Works includes articles, books, and bibliographic information of other authors in the fields of mathematics and cryptography. Unprocessed Material contains copies of articles and publications on cryptography. Most of the materials are from Levine's lifetime, but some of the items in the Collected Works series are from as early as 1716.

Biographical Note

Jack Levine was born on December 15, 1907, in Philadelphia, Pennsylvania. He received his A.B. degree with honors in Mathematics and Physics from the University of California at Los Angeles in 1929, and then spent a year there as an Assistant Professor in Mathematics. He attended Princeton University in 1930, and received his Ph.D. in mathematics in 1934, during which time he was also a part-time instructor. From 1935 to 1936 he was an instructor in mathematics at North Carolina State College. From 1936 to 1939 he served as Assistant Professor, and from 1939 to 1946 as Associate Professor. In 1946 he was appointed a full Professor and served in that capacity until 1976. He continued to teach part time until 1995.

Levine served as Technical Sergeant in the Second Signal Service Battalion of the Signal Corps from 1943 to 1945. In 1946 he was awarded the Legion of Merit Award for his outstanding service with the Army Security Agency. In 1970 Dr. Levine received an Outstanding Teacher Award at North Carolina State University. He was a member of several honorary and professional organizations, including Pi Mu Epsilon, Sigma Xi, American Mathematical Society, Mathematical Association of America, American Society for Engineering Education, and Phi Kappa Phi.

Still active in research after his retirement, his areas of interest included tensor analysis, geometrics of generalized spaces, differential geometry, combinatorial analysis, theory of symmetric functions, algebraic cryptography and mathematical physics. In addition to over one hundred research papers, Levine also published several books, including a definitive four-volume work on pattern word lists used in cryptography and a comprehensive compilation of United States cryptographic patents, 1861-1981.

Levine was also an avid reader, especially of mystery books. He was a life member of the Friends of the Library at North Carolina State University. In 1987 he donated a collection of over 1,500 mystery books to D. H. Hill library at North Carolina State University. In 1992 he donated an additional 665 titles to the collection.

Access to Collection

This collection is open for research; access requires at least 24 hours advance notice.

For more information contact us via mail, phone, fax, or our web form.

Mail

Special Collections Research Center
Box 7111
Raleigh, NC, 27695-7111

Telephone

(919) 515-2273

Fax

(919) 513-1787

Preferred Citation

[Identification of item], Jack Levine Papers, MC 00308, Special Collections Research Center, North Carolina State University Libraries, Raleigh, North Carolina.

Access to Collection

North Carolina State University does not own copyright to this collection. Individuals obtaining materials from the NCSU Libraries' Special Collections Research Center are responsible for using the works in conformance with United States copyright law as well as any donor restrictions accompanying the materials.