Thomas Beth

According to our database1, Thomas Beth authored at least 101 papers between 1978 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2008
Representation-theoretical properties of the approximate quantum Fourier transform.
Appl. Algebra Eng. Commun. Comput., 2008

2006
Computing restrictions of ideals in finitely generated <i>k</i>-algebras by means of Buchberger's algorithm.
J. Symb. Comput., 2006

Mathematical Techniques in Cryptology-Editorial.
Appl. Algebra Eng. Commun. Comput., 2006

2005
New construction of mutually unbiased bases in square dimensions.
Quantum Inf. Comput., 2005

Cryptanalysis of a practical quantum key distribution with polarization-entangled photons.
Quantum Inf. Comput., 2005

Combinatorial aspects of jump codes.
Discret. Math., 2005

Analysis of Human Motion for Humanoid Robots.
Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005

2004
On quantum MDS codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Similarities and varieties in human motion trajectories of predefined grasping and disposing movements.
Proceedings of the 4th IEEE/RAS International Conference on Humanoid Robots, 2004

Balloon Based Vertebra Separation in CT Images.
Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems (CBMS 2004), 2004

Hidden Markov models for the analysis and classification of ultrasound data.
Proceedings of the CARS 2004. Computer Assisted Radiology and Surgery. Proceedings of the 18th International Congress and Exhibition, 2004

Visualisierung von Halswirbelmobilitäten für die Funktions-Diagnostik.
Proceedings of the Bildverarbeitung für die Medizin 2004, Algorithmen - Systeme, 2004

2003
Quasi-order of clocks and their synchronism and quantum bounds for copying timing information.
IEEE Trans. Inf. Theory, 2003

Treating the Independent Set Problem by 2D Ising Interactions with Adiabatic Quantum Computing.
Quantum Inf. Process., 2003

Two QCMA-complete problems.
Quantum Inf. Comput., 2003

Gottfried Wolf 23.8.1940 bis 9.1.2003.
Inform. Spektrum, 2003

On The Computational Power Of Physical Interactions: Bounds On The Number Of Time Steps For Simulating Arbitrary Interaction Graphs.
Int. J. Found. Comput. Sci., 2003

Efficient Quantum Circuits For Non-Qubit Quantum Error-Correcting Codes.
Int. J. Found. Comput. Sci., 2003

A New Class of Designs Which Protect against Quantum Jumps.
Des. Codes Cryptogr., 2003

2002
Universal simulation of Hamiltonians using a finite set of control operations.
Quantum Inf. Comput., 2002

Simulating arbitrary pair-interactions by a given Hamiltonian: graph-theoretical bounds on the time-complexity.
Quantum Inf. Comput., 2002

Quantum algorithm for measuring the eigenvalues of U ⊗ U<sup>-1</sup> for a black-box unitary transformation U.
Quantum Inf. Comput., 2002

Über Quantencomputer und Quantenkryptographie.
Datenschutz und Datensicherheit, 2002

Homogeneous Bent Functions, Invariants, and Designs.
Des. Codes Cryptogr., 2002

Required sample size for learning sparse Bayesian networks with many variables
CoRR, 2002

Merkmalsinduzierte Aufbereitung medizinischer Ultraschallbilddaten.
Proceedings of the Bildverarbeitung für die Medizin 2002: Algorithmen, 2002

2001
On using quantum protocols to detect traffic analysis.
Quantum Inf. Comput., 2001

Lower Bound on the Chromatic Number by Spectra of Weighted Adjacency Matrices
CoRR, 2001

Compensation of motion artifacts in MR mammography by elastic deformation.
Proceedings of the Medical Imaging 2001: Image Processing, 2001

A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH.
Proceedings of the Information Security, 4th International Conference, 2001

Attacking the Affine Parts of SFLASH.
Proceedings of the Cryptography and Coding, 2001

On Homogeneous Bent Functions.
Proceedings of the Applied Algebra, 2001

2000
Quantum Computing - Applicable Algebra goes to Physics.
Appl. Algebra Eng. Commun. Comput., 2000

Quantum computing: an introduction.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2000

Weaknesses in the SL<sub>2</sub>(IF<sub>s<sup>2</sup></sub>) Hashing Scheme.
Proceedings of the Advances in Cryptology, 2000

1999
The state of public-key cryptography - not only after the invention of quantum computers.
Inf. Secur. Tech. Rep., 1999

How to Play M13?
Des. Codes Cryptogr., 1999

Auswertung von Funtions-CT oberer Halswirbel zur Diagnose von Weichteildistorsionen.
Proceedings of the Bildverarbeitung für die Medizin 1999: Algorithmen, 1999

Fast Quantum Fourier Transforms for a Class of Non-Abelian Groups.
Proceedings of the Applied Algebra, 1999

Calculating Generators for Invariant Fields of Linear Algebraic Groups.
Proceedings of the Applied Algebra, 1999

Quantum Reed-Solomon Codes.
Proceedings of the Applied Algebra, 1999

1998
Spectra of Long Primitive Binary BCH Codes Cannot Approach the Binomial Distribution.
IEEE Trans. Inf. Theory, 1998

Computing the Intersection of finitely generated fields.
SIGSAM Bull., 1998

Filterbankstrukturen zur verlustfreien Kompression medizinischer Bilddaten.
Proceedings of the Bildverarbeitung für die Medizin: Algorithmen, 1998

1997
Decomposing a Permutation into a Conjugated Tensor Product.
Proceedings of the 1997 International Symposium on Symbolic and Algebraic Computation, 1997

1996
Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue.
Des. Codes Cryptogr., 1996

Designs, Codes and Crypts - A Puzzle Altogether.
Des. Codes Cryptogr., 1996

Watching the Bhang Meter and Flying through Dirt.
Des. Codes Cryptogr., 1996

1995
Which Families of Long Binary Lianea Codes Have a Binomial Weight Distribution?
Proceedings of the Applied Algebra, 1995

The ART behind IDEAS.
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995

1994
Trust-Based Navigation in Distribution Systems.
Comput. Syst., 1994

TESS: A security system based on discrete exponentiation.
Comput. Commun., 1994

Valuation of Trust in Open Networks.
Proceedings of the Computer Security, 1994

Cryptanalysis of Cryptosystems Based on Remote Chaos Replication.
Proceedings of the Advances in Cryptology, 1994

Towards Acceptable Key Escrow Systems.
Proceedings of the CCS '94, 1994

Multifeature Security through Homomorphic Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Arithmetic Operations in GF(2<sup>m</sup>).
J. Cryptol., 1993

Obituary: Fighting for Computer Security - Chris Jahl - in Memoriam.
J. Comput. Secur., 1993

The GF(p)-Dimension of the Codes Generated by the Classical Point-Line Geometries over GP(p).
Des. Codes Cryptogr., 1993

Authentication services in distributed systems.
Comput. Secur., 1993

Trust relationships in secure systems-a distributed authentication perspective.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

On Almost Perfect Nonlinear Permutations.
Proceedings of the Advances in Cryptology, 1993

Verifiable Secret Sharing for Monotone Access Structures.
Proceedings of the CCS '93, 1993

1992
Design Machines: Algebraically Well Described Interconnection Networks.
Des. Codes Cryptogr., 1992

Efficient Zero-Knowledge Identification Schemes for Smart Cards.
Comput. J., 1992

Timely Authentication in Distributed Systems.
Proceedings of the Computer Security, 1992

Parallelrechnernetzwerke mit zyklischer Topologieumschaltung.
Proceedings of the Architektur von Rechensystemen, 1992

Public-Key Cryptography: State of the Art and Future Directions, E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991, Final Report
Lecture Notes in Computer Science 578, Springer, ISBN: 3-540-55215-4, 1992

1991
A restricted crossbar implementation and its applications.
SIGARCH Comput. Archit. News, 1991

Transputersysteme für topologieunabhängige Programmierung.
Proceedings of the Parallele Datenverarbeitung mit dem Transputer, 1991

Optisches Rechnen.
Proceedings of the Physik und Informatik, 1991

Physik und Informatik. Synergie für Forschung, Lehre und Entwicklung.
Proceedings of the Physik und Informatik, 1991

Finding (good) Normal Bases in Finite Fields.
Proceedings of the 1991 International Symposium on Symbolic and Algebraic Computation, 1991

Non Supersingular Elliptic Curves for Public Key Cryptosystems.
Proceedings of the Advances in Cryptology, 1991

Algebraic System Modelling and Implementation.
Proceedings of the Computer Aided Systems Theory, 1991

Arithmetic on Non-Supersingular Elliptic Curves.
Proceedings of the Applied Algebra, 1991

1990
Zur Sicherheit der Informationstechnik - Zur Diskussion gestellt.
Inform. Spektrum, 1990

Lower Bounds for the Linear Complexity of Sequences over Residue Rings.
Proceedings of the Advances in Cryptology, 1990

A family of binary codes with asymptotically good distance distribution.
Proceedings of the EUROCODE '90, 1990

Identification Tokens - or: Solving the Chess Grandmaster Problem.
Proceedings of the Advances in Cryptology, 1990

1989
Algorithm engineering for public key algorithms.
IEEE J. Sel. Areas Commun., 1989

On the Complexity of Pseudo-Random Sequences - Or: If You Can Describe a Sequence It Can't be Random.
Proceedings of the Advances in Cryptology, 1989

Computer Algebra and Computer Aided Systems Theory.
Proceedings of the Computer Aided Systems Theory - EUROCAST'89, A Selection of Papers from the International Workshop EUROCAST'89, Las Palmas, Spain, February 26, 1989

1988
Efficient Zero-Knowledge Identification Scheme for Smart Cards.
Proceedings of the Advances in Cryptology, 1988

1987
On the Computational Complexity of the General Discrete Fourier Transform.
Theor. Comput. Sci., 1987

Generalized Fourier Transforms.
Proceedings of the Trends in Computer Algebra, 1987

Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators.
Proceedings of the Advances in Cryptology, 1987

1986
Architectures for Exponentiation in GF(2<sup>n</sup>).
Proceedings of the Advances in Cryptology, 1986

Introduction: Applicable algebra, error-correcting codes, combinatorics and computer algebra.
Proceedings of the Applied Algebra, 1986

1985
Generalizing the discrete fourier transform.
Discret. Math., 1985

Algebraic and Symbolic Computation in Digital Signal Processing, Coding and Cryptography.
Proceedings of the EUROCAL '85, 1985

On the Arithmetics of Galoisfields and The Like. Algebraic Questions Arising in the Design of Secure Communication Systems.
Proceedings of the Algebraic Algorithms and Error-Correcting Codes, 1985

1984
The Stop-and-Go Generator.
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984

Codes, groups and invariants.
Proceedings of the Applied Algebra, 1984

1983
Kryptographie - eine Einführung in die Methoden und Verfahren der geheimen Nachrichtenübermittlung.
Leitfäden der angewandten Informatik, Teubner, ISBN: 978-3-519-02465-1, 1983

1982
Kryptologie als Instrument des Datenschutzes.
Inform. Spektrum, 1982

Introduction.
Proceedings of the Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29, 1982

1981
CRC-Codes - Das aktuelle Schlagwort.
Inform. Spektrum, 1981

CODEC - A Program System for the Interactive Development of Error-correcting Coders/Decoders.
J. Inf. Process. Cybern., 1981

ALGEBRA - An Interactive System for Finite Field Arithmetic.
J. Inf. Process. Cybern., 1981

1978
Some filing schemes based on finite groups of automorphisms.
Computing, 1978


  Loading...