Reports and Publications
-
- T. Schütze.
Quadratmittelapproximation durch B-Splines mit freien Knoten.
Diplomarbeit, Martin-Luther-Universität Halle/Wittenberg,
Fachbereich Mathematik und Informatik, 1993.
Diplom [ps-file, 872 kbyte],
Abstrakt [ps-file, 16 kbyte]
-
- H. Schwetlick and T. Schütze.
Least squares approximation by splines with free knots.
BIT, 35(3):361-384, 1995.
see H. Schwetlick and T. Schütze. Least squares
approximation by splines with free knots. Preprint TU Dresden,
MATH-NM-06-1994, March 1994.
[ps-file, 298 kbyte]
-
- T. Schütze.
Quadratmittelapproximation durch B-Splines mit freien Knoten
und Ungleichheitsnebenbedingungen an Ableitungen.
Forschungsbericht im Rahmen des DFG-Projektes Schm 968/2-1, 1995.
[ps-file, 823 kbyte]
-
- T. Schütze.
FREE - A program for constrained approximation by splines with
free knots.
Preprint MATH-NM-04-1996, Technical University of Dresden, 1996.
[ps-file, 679 kbyte]
Source code of program with executable, (184 kbyte)
Patched binaries to avoid Run Time Error 200 on fast PCs
[zip-file, 78 kbyte],
readme-patched-binaries.txt
-
-
T. Schütze and H. Schwetlick.
Constrained approximation by splines with free knots.
Z. Angew. Math. Mech., 77 Suppl. 2:S669-S670, 1997.
-
-
T. Schütze and H. Schwetlick.
Constrained approximation by splines with free knots.
BIT, 37(1):105-137, 1997.
see T. Schütze and H. Schwetlick. Constrained
Approximation by Splines with Free Knots. Preprint TU Dresden,
MATH-NM-18-1995, November 1995.
[ps-file, 376 kbyte]
-
-
T. Schütze.
Diskrete Quadratmittelapproximation durch Splines mit
freien Knoten.
Dissertation, Technische Universität Dresden, 1997.
[ps.gz-file, 901 kbyte],
[pdf-file, 2.03 Mbyte]
-
-
E. Hess, N. Janssen, B. Meyer, and T. Schütze (Siemens AG, Corporate
Technology, Security Technologies and Infineon Technologies).
Information Leakage Attacks Against Smart Card
Implementations of Cryptographic Algorithms and
Countermeasures-A Survey.
Proceedings of EUROSMART Security Conference, June
2000, 13-15, Marseille, 10 pages, 2000.
[pdf-file, 182 kbyte]
-
-
T. Schütze and H. Schwetlick.
Bivariate free knot splines.
BIT. Numerical Mathematics, 43(1):153-178, 2003.
[pdf-file, 1494 kbyte]
see T. Schütze and H. Schwetlick. Bivariate
free knot splines. Preprint TU Dresden, MATH-NM-13-01, August
2001.
[pdf-file, 1214 kbyte]
-
- T. Schütze.
Matlab programs for the computation of univariate and
bivariate splines with free knots.
Due to several requests I decided to put my Matlab programs
used in some of the papers above on the WWW. They come
with little documentation and with no support. Use them as they
are!
I would be pleased if you would inform me when you are using
these programs in some applications.
Spline programs,
readme.txt
Regularization toolbox 3.0 by P.C.Hansen
-
- C. Ruland, L. Lo Iacono, T. Schütze, and M. Kahmann.
SELMA AP 1.5-Sicherheitskonzept, Version 4.2.3.
In N. Zisky, editor, Das SELMA-Projekt. Konzepte, Modelle,
Verfahren, volume PTB-IT-12,
pages 165-246. Physikalisch-Technische Bundesanstalt, March 2005.
-
- M. Angele, C. Ruland, and T. Schütze.
SELMA AP 1.4-Sicherheitsanalyse.
In N. Zisky, editor, Das SELMA-Projekt. Konzepte, Modelle,
Verfahren, volume PTB-IT-12,
pages 117-164. Physikalisch-Technische Bundesanstalt, March 2005.
-
- T. Schütze.
Automotive Security: Cryptography for Car2X Communication, 16 pages
In Embedded World Conference 2011,
Nürnberg, Germany, March 1-3, 2011,
Workshop on Cryptography and Embedded Security, March 1, 2011
Paper [pdf-file, 615 kbyte],
Talk [pdf-file, 351 kbyte]
-
- Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, and
Torsten Schütze.
Requirements for standard elliptic curves,
Cryptology ePrint Archive, Report 2014/832, 2014.
[pdf-file, 105 kbyte]
-
- Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, and
Torsten Schütze.
Requirements for Elliptic Curves for High-Assurance Applications
Talk [pdf-file, 428 kbyte]
and
Paper [pdf-file, 516 kbyte]
at NIST Workshop on Elliptic Curve Cryptography Standards, June 11/12, 2015
in Gaithersburg
-
- Torsten Schütze.
Experiences with the evaluation of PTRNGs
Workshop on QRNGs I, Bundesamt für Sicherheit in der
Informationstechnik (BSI), Bonn, 2018-12-11/12
-
- Torsten Schütze.
Some thoughts about post-processing in TRNGs
Workshop on QRNGs II, Fraunhofer IOF, Jena, 2020-01-23/24
-
- Torsten Schütze.
Binning, Generalized von Neumann and XOR, von Neumann
Procedure - Digitization and mathematical post-processing in
(Q)RNGs
806. WE-Heraeus-Seminar on Physics and Security - from
Random Numbers to Secure Communication, Bad Honnef, 2024-03-05/-08
If you should be interested in any of these papers please mail to
torsten.schuetze@gmx.net
This page is under development and is subject to change.
T. Schütze <webmaster@torsten-schuetze.de>
Last modified: Wed Mar 13 17:45:16 W. Europe Standard Time 2024