Reports and Publications

 
T. Schütze.
Quadratmittelapproximation durch B-Splines mit freien Knoten.
Diplomarbeit, Martin-Luther-Universität Halle/Wittenberg, Fachbereich Mathematik und Informatik, 1993.
Diplom [ps-file, 872 kbyte], Abstrakt [ps-file, 16 kbyte]
 
H. Schwetlick and T. Schütze.
Least squares approximation by splines with free knots.
BIT, 35(3):361-384, 1995.
see H. Schwetlick and T. Schütze. Least squares approximation by splines with free knots. Preprint TU Dresden, MATH-NM-06-1994, March 1994.
[ps-file, 298 kbyte]
 
T. Schütze.
Quadratmittelapproximation durch B-Splines mit freien Knoten und Ungleichheitsnebenbedingungen an Ableitungen.
Forschungsbericht im Rahmen des DFG-Projektes Schm 968/2-1, 1995.
[ps-file, 823 kbyte]
 
T. Schütze.
FREE - A program for constrained approximation by splines with free knots.
Preprint MATH-NM-04-1996, Technical University of Dresden, 1996.
[ps-file, 679 kbyte]
Source code of program with executable, (184 kbyte)
Patched binaries to avoid Run Time Error 200 on fast PCs [zip-file, 78 kbyte], readme-patched-binaries.txt
 
T. Schütze and H. Schwetlick.
Constrained approximation by splines with free knots.
Z. Angew. Math. Mech., 77 Suppl. 2:S669-S670, 1997.
 
T. Schütze and H. Schwetlick.
Constrained approximation by splines with free knots.
BIT, 37(1):105-137, 1997.
see T. Schütze and H. Schwetlick. Constrained Approximation by Splines with Free Knots. Preprint TU Dresden, MATH-NM-18-1995, November 1995.
[ps-file, 376 kbyte]
 
T. Schütze.
Diskrete Quadratmittelapproximation durch Splines mit freien Knoten.
Dissertation, Technische Universität Dresden, 1997.
[ps.gz-file, 901 kbyte], [pdf-file, 2.03 Mbyte]
 
E. Hess, N. Janssen, B. Meyer, and T. Schütze (Siemens AG, Corporate Technology, Security Technologies and Infineon Technologies).
Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures-A Survey.
Proceedings of EUROSMART Security Conference, June 2000, 13-15, Marseille, 10 pages, 2000.
[pdf-file, 182 kbyte]
 
T. Schütze and H. Schwetlick.
Bivariate free knot splines.
BIT. Numerical Mathematics, 43(1):153-178, 2003.
[pdf-file, 1494 kbyte]
see T. Schütze and H. Schwetlick. Bivariate free knot splines. Preprint TU Dresden, MATH-NM-13-01, August 2001.
[pdf-file, 1214 kbyte]
 
T. Schütze.
Matlab programs for the computation of univariate and bivariate splines with free knots.
Due to several requests I decided to put my Matlab programs used in some of the papers above on the WWW. They come with little documentation and with no support. Use them as they are!
I would be pleased if you would inform me when you are using these programs in some applications.
Spline programs, readme.txt
Regularization toolbox 3.0 by P.C.Hansen
 
C. Ruland, L. Lo Iacono, T. Schütze, and M. Kahmann.
SELMA AP 1.5-Sicherheitskonzept, Version 4.2.3.
In N. Zisky, editor, Das SELMA-Projekt. Konzepte, Modelle, Verfahren, volume PTB-IT-12, pages 165-246. Physikalisch-Technische Bundesanstalt, March 2005.
 
M. Angele, C. Ruland, and T. Schütze.
SELMA AP 1.4-Sicherheitsanalyse.
In N. Zisky, editor, Das SELMA-Projekt. Konzepte, Modelle, Verfahren, volume PTB-IT-12, pages 117-164. Physikalisch-Technische Bundesanstalt, March 2005.
 
T. Schütze.
Automotive Security: Cryptography for Car2X Communication, 16 pages
In Embedded World Conference 2011, Nürnberg, Germany, March 1-3, 2011,
Workshop on Cryptography and Embedded Security, March 1, 2011
Paper [pdf-file, 615 kbyte], Talk [pdf-file, 351 kbyte]
 
Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, and Torsten Schütze.
Requirements for standard elliptic curves,
Cryptology ePrint Archive, Report 2014/832, 2014.
[pdf-file, 105 kbyte]
 
Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, and Torsten Schütze.
Requirements for Elliptic Curves for High-Assurance Applications
Talk [pdf-file, 428 kbyte] and Paper [pdf-file, 516 kbyte] at NIST Workshop on Elliptic Curve Cryptography Standards, June 11/12, 2015 in Gaithersburg
 
Torsten Schütze.
Experiences with the evaluation of PTRNGs
Workshop on QRNGs I, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, 2018-12-11/12
 
Torsten Schütze.
Some thoughts about post-processing in TRNGs
Workshop on QRNGs II, Fraunhofer IOF, Jena, 2020-01-23/24
 
Torsten Schütze.
Binning, Generalized von Neumann and XOR, von Neumann Procedure - Digitization and mathematical post-processing in (Q)RNGs
806. WE-Heraeus-Seminar on Physics and Security - from Random Numbers to Secure Communication, Bad Honnef, 2024-03-05/-08

If you should be interested in any of these papers please mail to torsten.schuetze@gmx.net
This page is under development and is subject to change.
T. Schütze <webmaster@torsten-schuetze.de>
Last modified: Wed Mar 13 17:45:16 W. Europe Standard Time 2024