The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Thomas Beth: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Thomas Beth
    Codes, groups and invariants. [Citation Graph (0, 0)][DBLP]
    AAECC, 1984, pp:71-78 [Conf]
  2. Thomas Beth
    On the Arithmetics of Galoisfields and The Like. Algebraic Questions Arising in the Design of Secure Communication Systems. [Citation Graph (0, 0)][DBLP]
    AAECC, 1985, pp:2-16 [Conf]
  3. Thomas Beth
    Introduction. [Citation Graph (0, 0)][DBLP]
    AAECC, 1986, pp:1-4 [Conf]
  4. Chris Charnes, Martin Rötteler, Thomas Beth
    On Homogeneous Bent Functions. [Citation Graph (0, 0)][DBLP]
    AAECC, 2001, pp:249-259 [Conf]
  5. Thomas Beth, Hakam Kalouti, Dejan E. Lazic
    Which Families of Long Binary Lianea Codes Have a Binomial Weight Distribution? [Citation Graph (0, 0)][DBLP]
    AAECC, 1995, pp:120-130 [Conf]
  6. Thomas Beth, F. Schaefer
    Arithmetic on Non-Supersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    AAECC, 1991, pp:74-81 [Conf]
  7. Markus Grassl, Willi Geiselmann, Thomas Beth
    Quantum Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:231-244 [Conf]
  8. Jörn Müller-Quade, Thomas Beth
    Calculating Generators for Invariant Fields of Linear Algebraic Groups. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:392-403 [Conf]
  9. Markus Püschel, Martin Rötteler, Thomas Beth
    Fast Quantum Fourier Transforms for a Class of Non-Abelian Groups. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:148-159 [Conf]
  10. Thomas Beth, Volker Hatz, Stephan Teiwes
    Parallelrechnernetzwerke mit zyklischer Topologieumschaltung. [Citation Graph (0, 0)][DBLP]
    ARCS, 1992, pp:177-188 [Conf]
  11. Thomas Beth
    Multifeature Security through Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:1-17 [Conf]
  12. Matthias Hahn, Ingo Wuttke, Thomas Beth
    Visualisierung von Halswirbelmobilitäten für die Funktions-Diagnostik. [Citation Graph (0, 0)][DBLP]
    Bildverarbeitung für die Medizin, 2004, pp:214-218 [Conf]
  13. Matthias Hahn, Detlef Zerfowski, H. Friedburg, Thomas Beth
    Auswertung von Funtions-CT oberer Halswirbel zur Diagnose von Weichteildistorsionen. [Citation Graph (0, 0)][DBLP]
    Bildverarbeitung für die Medizin, 1999, pp:150-154 [Conf]
  14. Martin Haimerl, Jörg Moldenhauer, Ulrich Mende, Thomas Beth
    Merkmalsinduzierte Aufbereitung medizinischer Ultraschallbilddaten. [Citation Graph (0, 0)][DBLP]
    Bildverarbeitung für die Medizin, 2002, pp:99-102 [Conf]
  15. Andreas Klappenecker, Frank U. May, Thomas Beth
    Filterbankstrukturen zur verlustfreien Kompression medizinischer Bilddaten. [Citation Graph (0, 0)][DBLP]
    Bildverarbeitung für die Medizin, 1998, pp:- [Conf]
  16. Jörg Moldenhauer, Thomas Beth, Ulrich Mende
    Hidden Markov models for the analysis and classification of ultrasound data. [Citation Graph (0, 0)][DBLP]
    CARS, 2004, pp:231-236 [Conf]
  17. Matthias Hahn, Thomas Beth
    Balloon Based Vertebra Separation in CT Images. [Citation Graph (0, 0)][DBLP]
    CBMS, 2004, pp:310-315 [Conf]
  18. Thomas Beth, Hans-Joachim Knobloch, Marcus Otten
    Verifiable Secret Sharing for Monotone Access Structures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:189-194 [Conf]
  19. Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann
    Towards Acceptable Key Escrow Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:51-58 [Conf]
  20. Thomas Beth, B. M. Cook, Dieter Gollmann
    Architectures for Exponentiation in GF(2n). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:302-310 [Conf]
  21. Thomas Beth, Yvo Desmedt
    Identification Tokens - or: Solving the Chess Grandmaster Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:169-177 [Conf]
  22. Thomas Beth, Dejan E. Lazic, A. Mathias
    Cryptanalysis of Cryptosystems Based on Remote Chaos Replication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:318-331 [Conf]
  23. Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth
    Weaknesses in the SL2(IFs2) Hashing Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:287-299 [Conf]
  24. Kwok-Yan Lam, Thomas Beth
    Timely Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:293-303 [Conf]
  25. Thomas Beth, Malte Borcherding, Birgit Klein
    Valuation of Trust in Open Networks. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:3-18 [Conf]
  26. Thomas Beth
    Algebraic and Symbolic Computation in Digital Signal Processing, Coding and Cryptography. [Citation Graph (0, 0)][DBLP]
    European Conference on Computer Algebra (1), 1985, pp:93-101 [Conf]
  27. Thomas Beth
    Algebraic System Modelling and Implementation. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 1991, pp:21-31 [Conf]
  28. Thomas Beth, Michael Clausen, Dieter Gollmann
    Computer Algebra and Computer Aided Systems Theory. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 1989, pp:161-169 [Conf]
  29. Thomas Beth, Dejan E. Lazic, Vojin Senk
    A family of binary codes with asymptotically good distance distribution. [Citation Graph (0, 0)][DBLP]
    EUROCODE, 1990, pp:30-41 [Conf]
  30. Thomas Beth
    Efficient Zero-Knowledge Identification Scheme for Smart Cards. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:77-84 [Conf]
  31. Thomas Beth
    Introduction. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1982, pp:1-30 [Conf]
  32. Thomas Beth, Zong-Duo Dai
    On the Complexity of Pseudo-Random Sequences - Or: If You Can Describe a Sequence It Can't be Random. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:533-543 [Conf]
  33. Thomas Beth, Cunsheng Ding
    On Almost Perfect Nonlinear Permutations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:65-76 [Conf]
  34. Thomas Beth, Fred Piper
    The Stop-and-Go Generator. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:88-92 [Conf]
  35. Thomas Beth, F. Schaefer
    Non Supersingular Elliptic Curves for Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:316-327 [Conf]
  36. Zong-Duo Dai, Thomas Beth, Dieter Gollmann
    Lower Bounds for the Linear Complexity of Sequences over Residue Rings. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:189-195 [Conf]
  37. Sibylle Mund, Dieter Gollmann, Thomas Beth
    Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1987, pp:25-35 [Conf]
  38. Thomas Beth
    Generalized Fourier Transforms. [Citation Graph (0, 0)][DBLP]
    Trends in Computer Algebra, 1987, pp:92-118 [Conf]
  39. Willi Geiselmann, Rainer Steinwandt, Thomas Beth
    Attacking the Affine Parts of SFLASH. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:355-359 [Conf]
  40. Thomas Beth, Willi Geiselmann, F. Meyer
    Finding (good) Normal Bases in Finite Fields. [Citation Graph (0, 0)][DBLP]
    ISSAC, 1991, pp:173-178 [Conf]
  41. Sebastian Egner, Markus Püschel, Thomas Beth
    Decomposing a Permutation into a Conjugated Tensor Product. [Citation Graph (0, 0)][DBLP]
    ISSAC, 1997, pp:101-108 [Conf]
  42. Rainer Steinwandt, Willi Geiselmann, Thomas Beth
    A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:280-293 [Conf]
  43. Thomas Beth
    Physik und Informatik. Synergie für Forschung, Lehre und Entwicklung. [Citation Graph (0, 0)][DBLP]
    Physik und Informatik, 1991, pp:65- [Conf]
  44. Thomas Beth, Volker Hatz, Stephan Teiwes
    Optisches Rechnen. [Citation Graph (0, 0)][DBLP]
    Physik und Informatik, 1991, pp:122-131 [Conf]
  45. Volker Hatz, Thomas Beth
    Transputersysteme für topologieunabhängige Programmierung. [Citation Graph (0, 0)][DBLP]
    Transputer-Anwender-Treffen, 1991, pp:1-8 [Conf]
  46. Thomas Beth, Markus Grassl
    Quantum Computing - Applicable Algebra goes to Physics. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2000, v:10, n:4/5, pp:269-272 [Journal]
  47. Thomas Beth, Willi Geiselmann, Rainer Steinwandt
    Mathematical Techniques in Cryptology-Editorial. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:377-378 [Journal]
  48. Mike Burmester, Yvo Desmedt, Thomas Beth
    Efficient Zero-Knowledge Identification Schemes for Smart Cards. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1992, v:35, n:1, pp:21-29 [Journal]
  49. Thomas Beth, Fritz Bauspieß, Hans-Joachim Knobloch, Steffen Stempel
    TESS: A security system based on discrete exponentiation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:466-475 [Journal]
  50. Dieter Gollmann, Thomas Beth, Frank Damm
    Authentication services in distributed systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:8, pp:753-764 [Journal]
  51. Pawel Wocjan, Dominik Janzing, Thomas Beth
    Lower Bound on the Chromatic Number by Spectra of Weighted Adjacency Matrices [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  52. Pawel Wocjan, Dominik Janzing, Thomas Beth
    Required sample size for learning sparse Bayesian networks with many variables [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  53. Raphael Yahalom, Birgit Klein, Thomas Beth
    Trust-Based Navigation in Distribution Systems. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1994, v:7, n:1, pp:45-73 [Journal]
  54. Thomas Beth, Whitfield Diffie
    Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:7-9 [Journal]
  55. Thomas Beth, Volker Hatz
    Design Machines: Algebraically Well Described Interconnection Networks. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1992, v:2, n:3, pp:287-298 [Journal]
  56. Thomas Beth
    Designs, Codes and Crypts - A Puzzle Altogether. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:8, n:1-2, pp:91-101 [Journal]
  57. Thomas Beth, Chris Charnes, Markus Grassl, Gernot Alber, Aldo Delgado, Michael Mussinger
    A New Class of Designs Which Protect against Quantum Jumps. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:29, n:1-3, pp:51-70 [Journal]
  58. Thomas Beth
    The GF(p)-Dimension of the Codes Generated by the Classical Point-Line Geometries over GP(p). [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1993, v:3, n:3, pp:199-207 [Journal]
  59. Thomas Beth
    Watching the Bhang Meter and Flying through Dirt. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:17-25 [Journal]
  60. Chris Charnes, Martin Rötteler, Thomas Beth
    Homogeneous Bent Functions, Invariants, and Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2002, v:26, n:1-3, pp:139-154 [Journal]
  61. Sebastian Egner, Thomas Beth
    How to Play M13? [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1999, v:16, n:3, pp:243-247 [Journal]
  62. Chris Charnes, Thomas Beth
    Combinatorial aspects of jump codes. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2005, v:294, n:1-2, pp:43-51 [Journal]
  63. Willi Geiselmann, Jörn Müller-Quade, Rainer Steinwandt, Thomas Beth
    Über Quantencomputer und Quantenkryptographie. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2002, v:26, n:8, pp:- [Journal]
  64. Thomas Beth, Norbert Schäfer
    ALGEBRA - An Interactive System for Finite Field Arithmetic. [Citation Graph (0, 0)][DBLP]
    Elektronische Informationsverarbeitung und Kybernetik, 1981, v:17, n:2/3, pp:141-143 [Journal]
  65. Thomas Beth, Gerhard Sagerer
    CODEC - A Program System for the Interactive Development of Error-correcting Coders/Decoders. [Citation Graph (0, 0)][DBLP]
    Elektronische Informationsverarbeitung und Kybernetik, 1981, v:17, n:2/3, pp:145-147 [Journal]
  66. Markus Grassl, Martin Rötteler, Thomas Beth
    Efficient Quantum Circuits For Non-Qubit Quantum Error-Correcting Codes. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2003, v:14, n:5, pp:757-776 [Journal]
  67. Dominik Janzing, Pawel Wocjan, Thomas Beth
    On The Computational Power Of Physical Interactions: Bounds On The Number Of Time Steps For Simulating Arbitrary Interaction Graphs. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2003, v:14, n:5, pp:889-0 [Journal]
  68. Thomas Beth
    Gottfried Wolf 23.8.1940 bis 9.1.2003. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 2003, v:26, n:2, pp:103-104 [Journal]
  69. Thomas Beth
    CRC-Codes - Das aktuelle Schlagwort. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1981, v:4, n:1, pp:49-50 [Journal]
  70. Thomas Beth
    Kryptologie als Instrument des Datenschutzes. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1982, v:5, n:2, pp:82-96 [Journal]
  71. Thomas Beth
    Zur Sicherheit der Informationstechnik - Zur Diskussion gestellt. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1990, v:13, n:4, pp:204-215 [Journal]
  72. Thomas Beth
    Obituary: Fighting for Computer Security - Chris Jahl - in Memoriam. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:, pp:3-4 [Journal]
  73. Gordon B. Agnew, Thomas Beth, Ronald C. Mullin, Scott A. Vanstone
    Arithmetic Operations in GF(2m). [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1993, v:6, n:1, pp:3-13 [Journal]
  74. Thomas Beth, Jörn Müller-Quade, Rainer Steinwandt
    Computing restrictions of ideals in finitely generated k-algebras by means of Buchberger's algorithm. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 2006, v:41, n:3-4, pp:372-380 [Journal]
  75. Thomas Beth
    On the Computational Complexity of the General Discrete Fourier Transform. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1987, v:51, n:, pp:331-339 [Journal]
  76. Dominik Janzing, Thomas Beth
    Quasi-order of clocks and their synchronism and quantum bounds for copying timing information. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:1, pp:230-240 [Journal]
  77. Dejan E. Lazic, Hakam Kalouti, Thomas Beth
    Spectra of Long Primitive Binary BCH Codes Cannot Approach the Binomial Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:1, pp:294-295 [Journal]
  78. Jörg Moldenhauer, Ingo Boesnach, Thomas Beth, Veit Wank, Klaus Bös
    Analysis of Human Motion for Humanoid Robots. [Citation Graph (0, 0)][DBLP]
    ICRA, 2005, pp:311-316 [Conf]
  79. Thomas Beth
    Generalizing the discrete fourier transform. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1985, v:56, n:2-3, pp:95-100 [Journal]

  80. Representation-theoretical properties of the approximate quantum Fourier transform. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002