default search action
Joachim Rosenthal
Person information
- affiliation: University of Zurich
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Zita Abreu, Julia Lieb, Raquel Pinto, Joachim Rosenthal:
Criteria for the construction of MDS convolutional codes with good column distances. Adv. Math. Commun. 18(2): 595-613 (2024) - [j46]Sebastian Heri, Julia Lieb, Joachim Rosenthal:
Self-Dual Convolutional Codes. IEEE Trans. Inf. Theory 70(2): 950-963 (2024) - [j45]Jessica Bariffi, Hannes Bartz, Gianluigi Liva, Joachim Rosenthal:
Error-Correction Performance of Regular Ring-Linear LDPC Codes Over Lee Channels. IEEE Trans. Inf. Theory 70(11): 7820-7839 (2024) - [c23]Zita Abreu, Joachim Rosenthal, Michael Schaller:
Algorithms for Computing the Free Distance of Convolutional Codes. ISIT 2024: 1764-1769 - [i62]Zita Abreu, Joachim Rosenthal, Michael Schaller:
Algorithms for Computing the Free Distance of Convolutional Codes. CoRR abs/2402.02982 (2024) - [i61]Gianira N. Alfarano, Joachim Rosenthal, Beatrice Toesca:
Schubert Subspace Codes. CoRR abs/2405.20047 (2024) - 2023
- [j44]Gianira N. Alfarano, Anina Gruica, Julia Lieb, Joachim Rosenthal:
Convolutional codes over finite chain rings, MDP codes and their characterization. Adv. Math. Commun. 17(1): 1-22 (2023) - [c22]Zita Abreu, Julia Lieb, Joachim Rosenthal:
Binary convolutional codes with optimal column distances. ISIT 2023: 1271-1276 - [i60]Zita Abreu, Julia Lieb, Raquel Pinto, Joachim Rosenthal:
Criteria for the construction of MDS convolutional codes with good column distances. CoRR abs/2305.04647 (2023) - [i59]Zita Abreu, Julia Lieb, Joachim Rosenthal:
Binary convolutional codes with optimal column distances. CoRR abs/2305.04693 (2023) - [i58]Jessica Bariffi, Hannes Bartz, Gianluigi Liva, Joachim Rosenthal:
Error-Correction Performance of Regular Ring-Linear LDPC Codes over Lee Channels. CoRR abs/2312.14674 (2023) - 2022
- [j43]Jessica Bariffi, Sam Mattheus, Alessandro Neri, Joachim Rosenthal:
Moderate-density parity-check codes from projective bundles. Des. Codes Cryptogr. 90(12): 2943-2966 (2022) - [j42]Niklas Gassner, Marcus Greferath, Joachim Rosenthal, Violetta Weger:
Bounds for Coding Theory over Rings. Entropy 24(10): 1473 (2022) - [j41]Simran Tinani, Joachim Rosenthal:
A deterministic algorithm for the discrete logarithm problem in a semigroup. J. Math. Cryptol. 16(1): 141-155 (2022) - [c21]Jessica Bariffi, Hannes Bartz, Gianluigi Liva, Joachim Rosenthal:
Analysis of Low-Density Parity-Check Codes over Finite Integer Rings for the Lee Channel. GLOBECOM 2022: 1-6 - [i57]Violetta Weger, Niklas Gassner, Joachim Rosenthal:
A Survey on Code-Based Cryptography. CoRR abs/2201.07119 (2022) - [i56]Simran Tinani, Carlo Matteotti, Joachim Rosenthal:
Complexity of Conjugacy Search in some Polycyclic and Matrix Groups. CoRR abs/2203.03525 (2022) - [i55]Henry Chimal-Dzul, Niklas Gassner, Joachim Rosenthal, Reto Schnyder:
Efficient Description of some Classes of Codes using Group Algebras. CoRR abs/2208.04061 (2022) - [i54]Sebastian Heri, Julia Lieb, Joachim Rosenthal:
Self-Dual Convolutional Codes. CoRR abs/2208.04087 (2022) - 2021
- [j40]Karan Khathuria, Joachim Rosenthal, Violetta Weger:
Encryption scheme based on expanded Reed-Solomon codes. Adv. Math. Commun. 15(2): 207-218 (2021) - [j39]Gianira N. Alfarano, Julia Lieb, Joachim Rosenthal:
Construction of LDPC convolutional codes via difference triangle sets. Des. Codes Cryptogr. 89(10): 2235-2254 (2021) - [j38]Julia Lieb, Joachim Rosenthal:
Erasure decoding of convolutional codes using first-order representations. Math. Control. Signals Syst. 33(3): 499-513 (2021) - [i53]Simran Tinani, Joachim Rosenthal:
A Deterministic Algorithm for the Discrete Logarithm Problem in a Semigroup. CoRR abs/2101.11500 (2021) - [i52]Niklas Gassner, Marcus Greferath, Joachim Rosenthal, Violetta Weger:
On Bounds for Ring-Based Coding Theory. CoRR abs/2103.07749 (2021) - [i51]Jessica Bariffi, Sam Mattheus, Alessandro Neri, Joachim Rosenthal:
Moderate Density Parity-Check Codes from Projective Bundles. CoRR abs/2103.09722 (2021) - [i50]Gianira N. Alfarano, Anina Gruica, Julia Lieb, Joachim Rosenthal:
Convolutional codes over finite chain rings, MDP codes and their characterization. CoRR abs/2104.09486 (2021) - [i49]Jessica Bariffi, Hannes Bartz, Gianluigi Liva, Joachim Rosenthal:
Analysis of Low-Density Parity-Check Codes over Finite Integer Rings for the Lee Channel. CoRR abs/2105.08372 (2021) - [i48]Jessica Bariffi, Hannes Bartz, Gianluigi Liva, Joachim Rosenthal:
On the Properties of Error Patterns in the Constant Lee Weight Channel. CoRR abs/2110.01878 (2021) - 2020
- [c20]Gianira Nicoletta Alfarano, Julia Lieb, Joachim Rosenthal:
Construction of Rate (n - 1 )/n Non-Binary LDPC Convolutional Codes via Difference Triangle Sets. ISIT 2020: 138-143 - [c19]Simran Tinani, Joachim Rosenthal:
Existence and Cardinality of k-Normal Elements in Finite Fields. WAIFI 2020: 255-271 - [i47]Gianira N. Alfarano, Julia Lieb, Joachim Rosenthal:
Construction of Rate (n-1)/n Non-Binary LDPC Convolutional Codes via Difference Triangle Sets. CoRR abs/2001.07969 (2020) - [i46]Julia Lieb, Raquel Pinto, Joachim Rosenthal:
Convolutional Codes. CoRR abs/2001.08281 (2020) - [i45]Julia Lieb, Joachim Rosenthal:
Erasure decoding of convolutional codes using first order representations. CoRR abs/2008.09013 (2020) - [i44]Gianira N. Alfarano, Julia Lieb, Joachim Rosenthal:
Construction of LDPC convolutional codes via difference triangle sets. CoRR abs/2008.13470 (2020)
2010 – 2019
- 2019
- [j37]Marco Baldi, Franco Chiaraluce, Joachim Rosenthal, Paolo Santini, Davide Schipani:
Security of generalised Reed-Solomon code-based cryptosystems. IET Inf. Secur. 13(4): 404-410 (2019) - [i43]Karan Khathuria, Joachim Rosenthal, Violetta Weger:
Encryption Scheme Based on Expanded Reed-Solomon Codes. CoRR abs/1906.00745 (2019) - 2018
- [j36]Simon R. Blackburn, Marcus Greferath, Camilla Hollanti, Mario-Osvin Pavcevic, Joachim Rosenthal, Leo Storme, Ángeles Vázquez-Castro, Alfred Wassermann:
Preface to the special issue on network coding and designs. Des. Codes Cryptogr. 86(2): 237-238 (2018) - [j35]Anna-Lena Horlemann-Trautmann, Kyle Marshall, Joachim Rosenthal:
Extension of Overbeck's attack for Gabidulin-based cryptosystems. Des. Codes Cryptogr. 86(2): 319-340 (2018) - [j34]Alessandro Neri, Anna-Lena Horlemann-Trautmann, Tovohery Randrianarisoa, Joachim Rosenthal:
On the genericity of maximum rank distance and Gabidulin codes. Des. Codes Cryptogr. 86(2): 341-363 (2018) - [j33]Francisco Arias, Javier de la Cruz, Joachim Rosenthal, Wolfgang Willems:
On q-Steiner systems from rank metric codes. Discret. Math. 341(10): 2729-2734 (2018) - [i42]Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Joachim Rosenthal, Paolo Santini, Davide Schipani:
Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes. CoRR abs/1807.06127 (2018) - [i41]Carmelo Interlando, Karan Khathuria, Nicole Rohrer, Joachim Rosenthal, Violetta Weger:
Generalization of the Ball-Collision Algorithm. CoRR abs/1812.10955 (2018) - 2017
- [j32]Anna-Lena Horlemann-Trautmann, Felice Manganiello, Michael Braun, Joachim Rosenthal:
Correction to "Cyclic Orbit Codes". IEEE Trans. Inf. Theory 63(11): 7616 (2017) - [c18]Diego Napp, Raquel Pinto, Joachim Rosenthal, Filipa Santana:
Column Rank Distances of Rank Metric Convolutional Codes. ICMCTA 2017: 248-256 - [c17]Diego Napp, Raquel Pinto, Joachim Rosenthal, Paolo Vettori:
MRD rank metric convolutional codes. ISIT 2017: 2766-2770 - [c16]Joachim Rosenthal, Tovohery Randrianarisoa:
A decoding algorithm for twisted Gabidulin codes. ISIT 2017: 2771-2774 - [i40]Alessandro Neri, Joachim Rosenthal, Davide Schipani:
Fuzzy Authentication using Rank Distance. CoRR abs/1703.03235 (2017) - [i39]Tovohery Randrianarisoa, Joachim Rosenthal:
A decoding algorithm for Twisted Gabidulin codes. CoRR abs/1705.07668 (2017) - 2016
- [j31]Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani:
Enhanced Public Key Security for the McEliece Cryptosystem. J. Cryptol. 29(1): 1-27 (2016) - [c15]Anna-Lena Horlemann-Trautmann, Kyle Marshall, Joachim Rosenthal:
Considerations for rank-based cryptosystems. ISIT 2016: 2544-2548 - [i38]Alessandro Neri, Anna-Lena Horlemann-Trautmann, Tovohery Randrianarisoa, Joachim Rosenthal:
On the Genericity of Maximum Rank Distance and Gabidulin Codes. CoRR abs/1605.05972 (2016) - [i37]Juan Antonio López-Ramos, Joachim Rosenthal, Davide Schipani, Reto Schnyder:
An Application of Group Theory in Confidential Network Communications. CoRR abs/1610.09244 (2016) - [i36]Jessalyn Bolkema, Heide Gluesing-Luerssen, Christine A. Kelley, Kristin E. Lauter, Beth Malmskog, Joachim Rosenthal:
Variations of the McEliece Cryptosystem. CoRR abs/1612.05085 (2016) - 2015
- [i35]Juan Antonio López Ramos, Joachim Rosenthal, Davide Schipani, Reto Schnyder:
Group key management based on semigroup actions. CoRR abs/1509.01075 (2015) - [i34]Reto Schnyder, Juan Antonio López Ramos, Joachim Rosenthal, Davide Schipani:
An Active Attack on a Multiparty Key Exchange Protocol. CoRR abs/1509.01081 (2015) - [i33]Anna-Lena Horlemann-Trautmann, Kyle Marshall, Joachim Rosenthal:
Extension of Overbeck's Attack for Gabidulin Based Cryptosystems. CoRR abs/1511.01549 (2015) - 2014
- [j30]Joachim Rosenthal, Natalia Silberstein, Anna-Lena Trautmann:
On the geometry of balls in the Grassmannian and list decoding of lifted Gabidulin codes. Des. Codes Cryptogr. 73(2): 393-416 (2014) - 2013
- [j29]Joachim Rosenthal, Anna-Lena Trautmann:
A complete characterization of irreducible cyclic orbit codes and their Plücker embedding. Des. Codes Cryptogr. 66(1-3): 275-289 (2013) - [j28]Anna-Lena Trautmann, Felice Manganiello, Michael Braun, Joachim Rosenthal:
Cyclic Orbit Codes. IEEE Trans. Inf. Theory 59(11): 7386-7404 (2013) - [c14]Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani:
Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures. PQCrypto 2013: 1-15 - [i32]Anna-Lena Trautmann, Natalia Silberstein, Joachim Rosenthal:
List Decoding of Lifted Gabidulin Codes via the Plücker Embedding. CoRR abs/1301.2165 (2013) - [i31]Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani:
Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures. CoRR abs/1305.5436 (2013) - [i30]Joachim Rosenthal, Natalia Silberstein, Anna-Lena Trautmann:
On the Geometry of Balls in the Grassmannian and List Decoding of Lifted Gabidulin Codes. CoRR abs/1309.0403 (2013) - 2012
- [j27]Michele Elia, Joachim Rosenthal, Davide Schipani:
Polynomial evaluation over finite fields: new algorithms and complexity bounds. Appl. Algebra Eng. Commun. Comput. 23(3-4): 129-141 (2012) - [j26]Elisa Gorla, Felice Manganiello, Joachim Rosenthal:
An algebraic approach for decoding spread codes. Adv. Math. Commun. 6(4): 443-466 (2012) - [j25]Virtudes Tomás, Joachim Rosenthal, Roxana Smarandache:
Decoding of Convolutional Codes Over the Erasure Channel. IEEE Trans. Inf. Theory 58(1): 90-108 (2012) - [i29]Joachim Rosenthal, Anna-Lena Trautmann:
A Complete Characterization of Irreducible Cyclic Orbit Codes and their Plücker Embedding. CoRR abs/1201.3825 (2012) - [i28]Felix Fontein, Kyle Marshall, Joachim Rosenthal, Davide Schipani, Anna-Lena Trautmann:
On Burst Error Correction and Storage Security of Noisy Data. CoRR abs/1205.5148 (2012) - [i27]Joachim Rosenthal, Anna-Lena Trautmann:
Decoding of Subspace Codes, a Problem of Schubert Calculus over Finite Fields. CoRR abs/1209.2887 (2012) - [i26]Kyle Marshall, Joachim Rosenthal, Davide Schipani, Anna-Lena Trautmann:
Subspace Fuzzy Vault. CoRR abs/1210.7190 (2012) - 2011
- [c13]Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani:
On fuzzy syndrome hashing with LDPC coding. ISABEL 2011: 24:1-24:5 - [c12]Davide Schipani, Michele Elia, Joachim Rosenthal:
On the decoding complexity of cyclic codes up to the BCH bound. ISIT 2011: 835-839 - [c11]Felice Manganiello, Anna-Lena Trautmann, Joachim Rosenthal:
On conjugacy classes of subgroups of the general linear group and cyclic orbit codes. ISIT 2011: 1916-1920 - [i25]Davide Schipani, Michele Elia, Joachim Rosenthal:
On the Decoding Complexity of Cyclic Codes Up to the BCH Bound. CoRR abs/1102.2939 (2011) - [i24]Anna-Lena Trautmann, Joachim Rosenthal:
A Complete Characterization of Irreducible Cyclic Orbit Codes. CoRR abs/1102.3167 (2011) - [i23]Felice Manganiello, Anna-Lena Trautmann, Joachim Rosenthal:
On conjugacy classes of subgroups of the general linear group and cyclic orbit codes. CoRR abs/1102.3350 (2011) - [i22]Davide Schipani, Michele Elia, Joachim Rosenthal:
Efficient evaluation of polynomials over finite fields. CoRR abs/1102.4771 (2011) - [i21]Michele Elia, Joachim Rosenthal, Davide Schipani:
Polynomial evaluation over finite fields: new algorithms and complexity bounds. CoRR abs/1102.4772 (2011) - [i20]José Antonio Álvarez-Bermejo, Juan Antonio López Ramos, Joachim Rosenthal, Davide Schipani:
Managing key multicasting through orthogonal systems. CoRR abs/1107.0586 (2011) - [i19]Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani:
On fuzzy syndrome hashing with LDPC coding. CoRR abs/1107.1600 (2011) - [i18]Elisa Gorla, Felice Manganiello, Joachim Rosenthal:
An Algebraic Approach for Decoding Spread Codes. CoRR abs/1107.5523 (2011) - [i17]Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani:
Enhanced public key security for the McEliece cryptosystem. CoRR abs/1108.2462 (2011) - [i16]Anna-Lena Trautmann, Joachim Rosenthal:
New Improvements on the Echelon-Ferrers Construction. CoRR abs/1110.2417 (2011) - [i15]Anna-Lena Trautmann, Felice Manganiello, Michael Braun, Joachim Rosenthal:
Cyclic Orbit Codes. CoRR abs/1112.1238 (2011) - [i14]Joachim Rosenthal, Mohammad Amin Shokrollahi, Judy L. Walker:
Coding Theory (Dagstuhl Seminar 11461). Dagstuhl Reports 1(11): 50-65 (2011) - 2010
- [c10]Davide Schipani, Joachim Rosenthal:
Coding solutions for the secure biometric storage problem. ITW 2010: 1-4 - [c9]Anna-Lena Trautmann, Felice Manganiello, Joachim Rosenthal:
Orbit codes - A new concept in the area of network coding. ITW 2010: 1-4 - [e2]Marcus Greferath, Joachim Rosenthal, Alexander Barg, Gilles Zémor:
2010 IEEE Information Theory Workshop, ITW 2010, Dublin, Ireland, August 30 - September 3, 2010. IEEE 2010, ISBN 978-1-4244-8264-1 [contents] - [i13]Virtudes Tomás, Joachim Rosenthal, Roxana Smarandache:
Decoding of Convolutional Codes over the Erasure Channel. CoRR abs/1006.3156 (2010)
2000 – 2009
- 2009
- [c8]Virtudes Tomás, Joachim Rosenthal, Roxana Smarandache:
Decoding of MDP convolutional codes over the erasure channel. ISIT 2009: 556-560 - [i12]Virtudes Tomás, Joachim Rosenthal, Roxana Smarandache:
Decoding of MDP Convolutional Codes over the Erasure Channel. CoRR abs/0903.3004 (2009) - 2008
- [j24]Christine A. Kelley, Deepak Sridhara, Joachim Rosenthal:
Zig-zag and replacement product graphs and LDPC codes. Adv. Math. Commun. 2(4): 347-372 (2008) - [c7]Jens Zumbrägel, Gérard Maze, Joachim Rosenthal:
Efficient recovering of operation tables of black box groups and rings. ISIT 2008: 639-643 - [c6]Felice Manganiello, Elisa Gorla, Joachim Rosenthal:
Spread codes and spread decoding in network coding. ISIT 2008: 881-885 - [i11]Felice Manganiello, Elisa Gorla, Joachim Rosenthal:
Spread Codes and Spread Decoding in Network Coding. CoRR abs/0805.0507 (2008) - [i10]Jens Zumbrägel, Gérard Maze, Joachim Rosenthal:
Efficient recovering of operation tables of black box groups and rings. CoRR abs/0805.0514 (2008) - 2007
- [j23]Joan-Josep Climent, Elisa Gorla, Joachim Rosenthal:
Cryptanalysis of the CFVZ cryptosystem. Adv. Math. Commun. 1(1): 1-11 (2007) - [j22]Gérard Maze, Chris Monico, Joachim Rosenthal:
Public key cryptography based on semigroup actions. Adv. Math. Commun. 1(4): 489-507 (2007) - [j21]Christine A. Kelley, Deepak Sridhara, Joachim Rosenthal:
Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights. IEEE Trans. Inf. Theory 53(4): 1460-1478 (2007) - [c5]Uwe Helmke, Joachim Rosenthal, Xiaochang A. Wang:
Pole placement results for complex symmetric and Hamiltonian transfer functions. CDC 2007: 3450-3453 - [i9]Davide Schipani, Joachim Rosenthal:
Coding Solutions for the Secure Biometric Storage Problem. CoRR abs/cs/0701102 (2007) - 2006
- [j20]Uwe Helmke, Joachim Rosenthal, Xiaochang Alex Wang:
Output Feedback Pole Assignment for Transfer Functions with Symmetries. SIAM J. Control. Optim. 45(5): 1898-1914 (2006) - [j19]Heide Gluesing-Luerssen, Joachim Rosenthal, Roxana Smarandache:
Strongly-MDS convolutional codes. IEEE Trans. Inf. Theory 52(2): 584-598 (2006) - [j18]Guangyue Han, Joachim Rosenthal:
Geometrical and Numerical Design of Structured Unitary Space-Time Constellations. IEEE Trans. Inf. Theory 52(8): 3722-3735 (2006) - [j17]Guangyue Han, Joachim Rosenthal:
Unitary Space-Time Constellation Analysis: An Upper Bound for the Diversity. IEEE Trans. Inf. Theory 52(10): 4713-4721 (2006) - [c4]Christine A. Kelley, Deepak Sridhara, Joachim Rosenthal:
Pseudocodeword weights for non-binary LDPC codes. ISIT 2006: 1379-1383 - [i8]Joan-Josep Climent, Elisa Gorla, Joachim Rosenthal:
Cryptanalysis of the CFVZ cryptosystem. CoRR abs/cs/0602037 (2006) - [i7]Christine A. Kelley, Deepak Sridhara, Joachim Rosenthal:
Pseudocodeword weights for non-binary LDPC codes. CoRR abs/cs/0605118 (2006) - [i6]Christine A. Kelley, Deepak Sridhara, Joachim Rosenthal:
Zig-zag and Replacement Product Graphs and LDPC Codes. CoRR abs/cs/0611155 (2006) - [i5]Joan-Josep Climent, Elisa Gorla, Joachim Rosenthal:
Cryptanalysis of the CFVZ cryptosystem. IACR Cryptol. ePrint Arch. 2006: 53 (2006) - 2005
- [j16]Ryan Hutchinson, Joachim Rosenthal, Roxana Smarandache:
Convolutional codes with maximum distance profile. Syst. Control. Lett. 54(1): 53-63 (2005) - [c3]Deepak Sridhara, Christine A. Kelley, Joachim Rosenthal:
Tree-based construction of LDPC codes. ISIT 2005: 845-849 - [i4]Gérard Maze, Chris Monico, Joachim Rosenthal:
Public Key Cryptography based on Semigroup Actions. CoRR abs/cs/0501017 (2005) - [i3]Deepak Sridhara, Christine A. Kelley, Joachim Rosenthal:
Tree-Based Construction of LDPC Codes. CoRR abs/cs/0506042 (2005) - [i2]Christine A. Kelley, Deepak Sridhara, Joachim Rosenthal:
Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights. CoRR abs/cs/0510009 (2005) - 2004
- [j15]David N. Hoover, Roland Longchamp, Joachim Rosenthal:
Two-degree-of-freedom l2-optimal tracking with preview. Autom. 40(1): 155-162 (2004) - [j14]Meeyoung Kim, Joachim Rosenthal, Xiaochang Alex Wang:
Pole Placement and Matrix Extension Problems: A Common Point of View. SIAM J. Control. Optim. 42(6): 2078-2093 (2004) - [c2]Christine A. Kelley, Deepak Sridhara, Jun Xu, Joachim Rosenthal:
Pseudocodeword weights and stopping sets. ISIT 2004: 67 - [c1]Guangyue Han, Joachim Rosenthal:
Upper bound analysis of diversity for unitary space time constellations. ISIT 2004: 157 - 2003
- [e1]Joachim Rosenthal, David S. Gilliam:
Mathematical Systems Theory in Biology, Communications, Computation, and Finance. Springer 2003, ISBN 978-1-4419-2326-4 [contents] - 2002
- [i1]Joachim Rosenthal:
A Polynomial Description of the Rijndael Advanced Encryption Standard. CoRR cs.CR/0205002 (2002) - 2001
- [j13]Joachim Rosenthal, Xiaochang A. Wang:
The Multiplicative Inverse Eigenvalue Problem over an Algebraically Closed Field. SIAM J. Matrix Anal. Appl. 23(2): 517-523 (2001) - [j12]Roxana Smarandache, Heide Gluesing-Luerssen, Joachim Rosenthal:
Constructions of MDS-convolutional codes. IEEE Trans. Inf. Theory 47(5): 2045-2049 (2001)
1990 – 1999
- 1999
- [j11]Joachim Rosenthal, Roxana Smarandache:
Maximum Distance Separable Convolutional Codes. Appl. Algebra Eng. Commun. Comput. 10(1): 15-32 (1999) - [j10]Joachim Rosenthal, Eric V. York:
BCH convolutional codes. IEEE Trans. Inf. Theory 45(6): 1833-1844 (1999) - 1997
- [j9]Uwe Helmke, Joachim Rosenthal, Johannes M. Schumacher:
A controllability test for general first-order representations. Autom. 33(2): 193-201 (1997) - [j8]M. S. Ravi, Joachim Rosenthal, Johannes M. Schumacher:
Homogeneous behaviors. Math. Control. Signals Syst. 10(1): 61-75 (1997) - [j7]Joachim Rosenthal, Johannes M. Schumacher:
Realization by inspection. IEEE Trans. Autom. Control. 42(9): 1257-1263 (1997) - [j6]Joachim Rosenthal, Eric V. York:
On the generalized Hamming weights of convolutional codes. IEEE Trans. Inf. Theory 43(1): 330-334 (1997) - 1996
- [j5]Joachim Rosenthal:
An observability criterion for dynamic systems governed by Riccati differential equations. IEEE Trans. Autom. Control. 41(3): 434-436 (1996) - [j4]Joachim Rosenthal, Xiaochang A. Wang:
Output feedback pole placement with dynamic compensators. IEEE Trans. Autom. Control. 41(6): 830-843 (1996) - [j3]Joachim Rosenthal, Johannes M. Schumacher, Eric V. York:
On behaviors and convolutional codes. IEEE Trans. Inf. Theory 42(6): 1881-1891 (1996) - 1995
- [j2]Bijoy Kumar Ghosh, Joachim Rosenthal:
A generalized Popov-Belevitch-Hautus test of observability. IEEE Trans. Autom. Control. 40(1): 176-180 (1995) - [j1]M. S. Ravi, Joachim Rosenthal, Xiaochang A. Wang:
On decentralized dynamic pole placement and feedback stabilization. IEEE Trans. Autom. Control. 40(9): 1603-1614 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint