|
Search the dblp DataBase
Willi Geiselmann:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Willi Geiselmann, Dieter Gollmann
Symmetry and Duality in Normal Basis Multiplication. [Citation Graph (0, 0)][DBLP] AAECC, 1988, pp:230-238 [Conf]
- Markus Grassl, Willi Geiselmann, Thomas Beth
Quantum Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP] AAECC, 1999, pp:231-244 [Conf]
- Willi Geiselmann, Dieter Gollmann
VLSI Design for Exponentiation in GF (2n). [Citation Graph (0, 0)][DBLP] AUSCRYPT, 1990, pp:398-405 [Conf]
- Willi Geiselmann, Dieter Gollmann
Correlation Attacks on Cascades of Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1996, pp:346-359 [Conf]
- Willi Geiselmann, Rainer Steinwandt
Hardware to Solve Sparse Systems of Linear Equations over GF(2). [Citation Graph (0, 0)][DBLP] CHES, 2003, pp:51-61 [Conf]
- Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. [Citation Graph (0, 0)][DBLP] CHES, 2005, pp:131-146 [Conf]
- Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth
Weaknesses in the SL2(IFs2) Hashing Scheme. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:287-299 [Conf]
- Willi Geiselmann, Rainer Steinwandt
Yet Another Sieving Device. [Citation Graph (0, 0)][DBLP] CT-RSA, 2004, pp:278-291 [Conf]
- Willi Geiselmann
A Note on the Hash Function of Tillich and Zémor. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1996, pp:51-52 [Conf]
- Willi Geiselmann, Rainer Steinwandt
On the security of cryptographic primitives regarding technological innovations. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (1), 2003, pp:99-102 [Conf]
- Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt
A Simpler Sieving Device: Combining ECM and TWIRL. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:118-135 [Conf]
- Willi Geiselmann
A Note on the Hash Function of Tillich and Zémor. [Citation Graph (0, 0)][DBLP] IMA Conf., 1995, pp:257-263 [Conf]
- Willi Geiselmann, Rainer Steinwandt, Thomas Beth
Attacking the Affine Parts of SFLASH. [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2001, pp:355-359 [Conf]
- Thomas Beth, Willi Geiselmann, F. Meyer
Finding (good) Normal Bases in Finite Fields. [Citation Graph (0, 0)][DBLP] ISSAC, 1991, pp:173-178 [Conf]
- Rainer Steinwandt, Willi Geiselmann, Thomas Beth
A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:280-293 [Conf]
- Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer
Improved Routing-Based Linear Algebra for the Number Field Sieve. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:636-641 [Conf]
- Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu
Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2001, pp:153-164 [Conf]
- Willi Geiselmann, Harald Lukhaub
Redundant Representation of Finite Fields. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2001, pp:339-352 [Conf]
- Willi Geiselmann, Rainer Steinwandt
A Dedicated Sieving Hardware. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2003, pp:254-266 [Conf]
- Thomas Beth, Willi Geiselmann, Rainer Steinwandt
Mathematical Techniques in Cryptology-Editorial. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:377-378 [Journal]
- Willi Geiselmann, Dieter Gollmann
Self-Dual Bases in Fqn. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1993, v:3, n:4, pp:333-345 [Journal]
- Willi Geiselmann, Rainer Steinwandt
Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen. [Citation Graph (0, 0)][DBLP] Datenschutz und Datensicherheit, 2001, v:25, n:10, pp:- [Journal]
- Willi Geiselmann, Jörn Müller-Quade, Rainer Steinwandt, Thomas Beth
Über Quantencomputer und Quantenkryptographie. [Citation Graph (0, 0)][DBLP] Datenschutz und Datensicherheit, 2002, v:26, n:8, pp:- [Journal]
- Willi Geiselmann, Willi Meier, Rainer Steinwandt
An attack on the isomorphisms of polynomials problem with one secret. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2003, v:2, n:1, pp:59-64 [Journal]
- Rainer Steinwandt, Willi Geiselmann, Regine Endsuleit
Attacking a polynomial-based cryptosystem: Polly Cracker. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:3, pp:143-148 [Journal]
- Willi Geiselmann, Rainer Steinwandt
Power attacks on a side-channel resistant elliptic curve implementation. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2004, v:91, n:1, pp:29-32 [Journal]
- Willi Geiselmann, Jörn Müller-Quade, Rainer Steinwandt
On "A New Representation of Elements of Finite Fields GF (2m) Yielding Small Complexity Arithmetic Circuits". [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2002, v:51, n:12, pp:1460-1461 [Journal]
- Willi Geiselmann, Rainer Steinwandt
A Redundant Representation of GF(q^n) for Designing Arithmetic Circuits. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2003, v:52, n:7, pp:848-853 [Journal]
- Rainer Steinwandt, Willi Geiselmann
Cryptanalysis of Polly Cracker. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2990-2991 [Journal]
- Willi Geiselmann, Rainer Steinwandt
Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2007, pp:466-481 [Conf]
- Willi Geiselmann, Rainer Steinwandt
Cryptanalysis of a Hash Function Proposed at ICISC 2006. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:1-10 [Conf]
- Willi Geiselmann, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
Entwurf asymmetrischer kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen (Design of Asymmetric Cryptographic Schemes Taking Into Account Quantum Algorithms). [Citation Graph (0, 0)][DBLP] it - Information Technology, 2006, v:48, n:6, pp:327-0 [Journal]
Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials. [Citation Graph (, )][DBLP]
Skew-cyclic codes. [Citation Graph (, )][DBLP]
In memoriam Thomas Beth. [Citation Graph (, )][DBLP]
Search in 0.191secs, Finished in 0.193secs
|