1. Thomas Beth, Christopher Charnes, Markus Grassl, Gernot Alber, Aldo Delgado, and Michael Mussinger, A new class of designs which protect against quantum jumps, Des. Codes Cryptogr. 29 (2003), no. 1-3, 51–70.[MR]
  2. Thomas Beth, Jörn Müller-Quade, and Rainer Steinwandt, Computing restrictions of ideals in finitely generated k-algebras by means of Buchberger's algorithm, J. Symbolic Comput. 41 (2006), no. 3-4, 372–380.[MR]
  3. Chris Charnes, Martin Rötteler, and Thomas Beth, On homogeneous bent functions, Applied Algebra, Algebraic Algorithms and Error-correcting Codes (Melbourne, 2001), Lecture Notes in Comput. Sci., vol. 2227, Springer, Berlin, 2001, pp. 249–259.[MR]
  4. Chris Charnes, Martin Rötteler, and Thomas Beth, Homogeneous bent functions, invariants, and designs, Des. Codes Cryptogr. 26 (2002), no. 1-3, 139–154.[MR]
  5. Willi Geiselmann, Rainer Steinwandt, and Thomas Beth, Attacking the affine parts of SFLASH, Cryptography and Coding, Lecture Notes in Comput. Sci., vol. 2260, Springer, Berlin, 2001, pp. 355–359.[MR]
  6. Willi Geiselmann, Rainer Steinwandt, and Thomas Beth, Revealing the affine parts of SFLASHv1, SFLASHv2, and FLASH, Actas de la VII Reunisn Espaqola de Criptologma y Seguridad de la Informacisn, vol. 7, 2002, pp. 305-314.
  7. M. Grassl, Thomas Beth, and T. Pellizzari, Codes for the quantum erasure channel, Phys. Rev. A (3) 56 (1997), no. 1, 33–38.[MR]
  8. M. Grassl, Thomas Beth, and M. Rötteler, Computing local invariants of quantum-bit systems, Phys. Rev. A. 58 (1998), no. 3, 833-1839.
  9. M. Grassl, Thomas Beth, and M. Rötteler, On optimal quantum codes, International Journal of Quantum Information 2 (2004), no. 1, 55-64.
  10. Markus Grassl and Thomas Beth, Quantum BCH codes, in Proceedings X Symposium on Theoretical Electrical Engineering. Magdeburg, Sept. 6–9, 1999, 1999, pp. 207-212.
  11. Markus Grassl, Martin Rötteler, and Thomas Beth, Computing local invariants of quantum-bit systems, Phys. Rev. A (3) 58 (1998), no. 3, 1833–1839.[MR]
  12. M. Rötteler, M. Grassl, and Thomas Beth, On quantum MDS codes, in IEEE International Symposium on Information Theory – Proceedings, 2004, pp. 355.
  13. Michael Schmid, Rainer Steinwandt, Jörn Müller-Quade, Martin Rötteler, and Thomas Beth, Decomposing a matrix into circulant and diagonal factors, Linear Algebra Appl. 306 (2000), no. 1-3, 131–143.[MR]
  14. Rainer Steinwandt, Markus Grassl, Willi Geiselmann, and Thomas Beth, Weakness in the SL2(F2n) hashing scheme, Advances in Cryptology—CRYPTO 2000 (Santa Barbara, CA), Lecture Notes in Comput. Sci., vol. 1880, Springer, Berlin, 2000, pp. 287–299.[MR]
  15. Pawel Wocjan, Martin Rötteler, Dominik Janzing, and Thomas Beth, Universal simulation of Hamiltonians using a finite set of control operations, Quantum Inf. Comput. 2 (2002), no. 2, 133–150.[MR]