Thomas Beth
According to our database1,
Thomas Beth
authored at least 101 papers
between 1978 and 2008.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2008
Appl. Algebra Eng. Commun. Comput., 2008
2006
Computing restrictions of ideals in finitely generated <i>k</i>-algebras by means of Buchberger's algorithm.
J. Symb. Comput., 2006
Appl. Algebra Eng. Commun. Comput., 2006
2005
Quantum Inf. Comput., 2005
Cryptanalysis of a practical quantum key distribution with polarization-entangled photons.
Quantum Inf. Comput., 2005
Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005
2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Similarities and varieties in human motion trajectories of predefined grasping and disposing movements.
Proceedings of the 4th IEEE/RAS International Conference on Humanoid Robots, 2004
Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems (CBMS 2004), 2004
Hidden Markov models for the analysis and classification of ultrasound data.
Proceedings of the CARS 2004. Computer Assisted Radiology and Surgery. Proceedings of the 18th International Congress and Exhibition, 2004
Proceedings of the Bildverarbeitung für die Medizin 2004, Algorithmen - Systeme, 2004
2003
Quasi-order of clocks and their synchronism and quantum bounds for copying timing information.
IEEE Trans. Inf. Theory, 2003
Treating the Independent Set Problem by 2D Ising Interactions with Adiabatic Quantum Computing.
Quantum Inf. Process., 2003
On The Computational Power Of Physical Interactions: Bounds On The Number Of Time Steps For Simulating Arbitrary Interaction Graphs.
Int. J. Found. Comput. Sci., 2003
Int. J. Found. Comput. Sci., 2003
Des. Codes Cryptogr., 2003
2002
Quantum Inf. Comput., 2002
Simulating arbitrary pair-interactions by a given Hamiltonian: graph-theoretical bounds on the time-complexity.
Quantum Inf. Comput., 2002
Quantum algorithm for measuring the eigenvalues of U ⊗ U<sup>-1</sup> for a black-box unitary transformation U.
Quantum Inf. Comput., 2002
Über Quantencomputer und Quantenkryptographie.
Datenschutz und Datensicherheit, 2002
Homogeneous Bent Functions, Invariants, and Designs.
Des. Codes Cryptogr., 2002
CoRR, 2002
Merkmalsinduzierte Aufbereitung medizinischer Ultraschallbilddaten.
Proceedings of the Bildverarbeitung für die Medizin 2002: Algorithmen, 2002
2001
CoRR, 2001
Proceedings of the Medical Imaging 2001: Image Processing, 2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Cryptography and Coding, 2001
2000
Appl. Algebra Eng. Commun. Comput., 2000
Proceedings of the IEEE International Symposium on Circuits and Systems, 2000
Proceedings of the Advances in Cryptology, 2000
1999
The state of public-key cryptography - not only after the invention of quantum computers.
Inf. Secur. Tech. Rep., 1999
Proceedings of the Bildverarbeitung für die Medizin 1999: Algorithmen, 1999
Proceedings of the Applied Algebra, 1999
Proceedings of the Applied Algebra, 1999
1998
Spectra of Long Primitive Binary BCH Codes Cannot Approach the Binomial Distribution.
IEEE Trans. Inf. Theory, 1998
Proceedings of the Bildverarbeitung für die Medizin: Algorithmen, 1998
1997
Proceedings of the 1997 International Symposium on Symbolic and Algebraic Computation, 1997
1996
Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue.
Des. Codes Cryptogr., 1996
1995
Proceedings of the Applied Algebra, 1995
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995
1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Obituary: Fighting for Computer Security - Chris Jahl - in Memoriam.
J. Comput. Secur., 1993
The GF(p)-Dimension of the Codes Generated by the Classical Point-Line Geometries over GP(p).
Des. Codes Cryptogr., 1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the CCS '93, 1993
1992
Des. Codes Cryptogr., 1992
Proceedings of the Computer Security, 1992
Parallelrechnernetzwerke mit zyklischer Topologieumschaltung.
Proceedings of the Architektur von Rechensystemen, 1992
Public-Key Cryptography: State of the Art and Future Directions, E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991, Final Report
Lecture Notes in Computer Science 578, Springer, ISBN: 3-540-55215-4, 1992
1991
SIGARCH Comput. Archit. News, 1991
Transputersysteme für topologieunabhängige Programmierung.
Proceedings of the Parallele Datenverarbeitung mit dem Transputer, 1991
Proceedings of the Physik und Informatik, 1991
Proceedings of the 1991 International Symposium on Symbolic and Algebraic Computation, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Computer Aided Systems Theory, 1991
Proceedings of the Applied Algebra, 1991
1990
Zur Sicherheit der Informationstechnik - Zur Diskussion gestellt.
Inform. Spektrum, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the EUROCODE '90, 1990
Proceedings of the Advances in Cryptology, 1990
1989
On the Complexity of Pseudo-Random Sequences - Or: If You Can Describe a Sequence It Can't be Random.
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Computer Aided Systems Theory - EUROCAST'89, A Selection of Papers from the International Workshop EUROCAST'89, Las Palmas, Spain, February 26, 1989
1988
Proceedings of the Advances in Cryptology, 1988
1987
Theor. Comput. Sci., 1987
Proceedings of the Advances in Cryptology, 1987
1986
Proceedings of the Advances in Cryptology, 1986
Introduction: Applicable algebra, error-correcting codes, combinatorics and computer algebra.
Proceedings of the Applied Algebra, 1986
1985
Algebraic and Symbolic Computation in Digital Signal Processing, Coding and Cryptography.
Proceedings of the EUROCAL '85, 1985
On the Arithmetics of Galoisfields and The Like. Algebraic Questions Arising in the Design of Secure Communication Systems.
Proceedings of the Algebraic Algorithms and Error-Correcting Codes, 1985
1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984
1983
Kryptographie - eine Einführung in die Methoden und Verfahren der geheimen Nachrichtenübermittlung.
Leitfäden der angewandten Informatik, Teubner, ISBN: 978-3-519-02465-1, 1983
1982
Kryptologie als Instrument des Datenschutzes.
Inform. Spektrum, 1982
Proceedings of the Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29, 1982
1981
CRC-Codes - Das aktuelle Schlagwort.
Inform. Spektrum, 1981
CODEC - A Program System for the Interactive Development of Error-correcting Coders/Decoders.
J. Inf. Process. Cybern., 1981
ALGEBRA - An Interactive System for Finite Field Arithmetic.
J. Inf. Process. Cybern., 1981
1978