The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Willi Geiselmann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Willi Geiselmann, Dieter Gollmann
    Symmetry and Duality in Normal Basis Multiplication. [Citation Graph (0, 0)][DBLP]
    AAECC, 1988, pp:230-238 [Conf]
  2. Markus Grassl, Willi Geiselmann, Thomas Beth
    Quantum Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:231-244 [Conf]
  3. Willi Geiselmann, Dieter Gollmann
    VLSI Design for Exponentiation in GF (2n). [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:398-405 [Conf]
  4. Willi Geiselmann, Dieter Gollmann
    Correlation Attacks on Cascades of Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:346-359 [Conf]
  5. Willi Geiselmann, Rainer Steinwandt
    Hardware to Solve Sparse Systems of Linear Equations over GF(2). [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:51-61 [Conf]
  6. Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer
    Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:131-146 [Conf]
  7. Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth
    Weaknesses in the SL2(IFs2) Hashing Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:287-299 [Conf]
  8. Willi Geiselmann, Rainer Steinwandt
    Yet Another Sieving Device. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:278-291 [Conf]
  9. Willi Geiselmann
    A Note on the Hash Function of Tillich and Zémor. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:51-52 [Conf]
  10. Willi Geiselmann, Rainer Steinwandt
    On the security of cryptographic primitives regarding technological innovations. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2003, pp:99-102 [Conf]
  11. Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt
    A Simpler Sieving Device: Combining ECM and TWIRL. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:118-135 [Conf]
  12. Willi Geiselmann
    A Note on the Hash Function of Tillich and Zémor. [Citation Graph (0, 0)][DBLP]
    IMA Conf., 1995, pp:257-263 [Conf]
  13. Willi Geiselmann, Rainer Steinwandt, Thomas Beth
    Attacking the Affine Parts of SFLASH. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:355-359 [Conf]
  14. Thomas Beth, Willi Geiselmann, F. Meyer
    Finding (good) Normal Bases in Finite Fields. [Citation Graph (0, 0)][DBLP]
    ISSAC, 1991, pp:173-178 [Conf]
  15. Rainer Steinwandt, Willi Geiselmann, Thomas Beth
    A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:280-293 [Conf]
  16. Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer
    Improved Routing-Based Linear Algebra for the Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:636-641 [Conf]
  17. Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu
    Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:153-164 [Conf]
  18. Willi Geiselmann, Harald Lukhaub
    Redundant Representation of Finite Fields. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:339-352 [Conf]
  19. Willi Geiselmann, Rainer Steinwandt
    A Dedicated Sieving Hardware. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:254-266 [Conf]
  20. Thomas Beth, Willi Geiselmann, Rainer Steinwandt
    Mathematical Techniques in Cryptology-Editorial. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:377-378 [Journal]
  21. Willi Geiselmann, Dieter Gollmann
    Self-Dual Bases in Fqn. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1993, v:3, n:4, pp:333-345 [Journal]
  22. Willi Geiselmann, Rainer Steinwandt
    Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2001, v:25, n:10, pp:- [Journal]
  23. Willi Geiselmann, Jörn Müller-Quade, Rainer Steinwandt, Thomas Beth
    Über Quantencomputer und Quantenkryptographie. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2002, v:26, n:8, pp:- [Journal]
  24. Willi Geiselmann, Willi Meier, Rainer Steinwandt
    An attack on the isomorphisms of polynomials problem with one secret. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:2, n:1, pp:59-64 [Journal]
  25. Rainer Steinwandt, Willi Geiselmann, Regine Endsuleit
    Attacking a polynomial-based cryptosystem: Polly Cracker. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:143-148 [Journal]
  26. Willi Geiselmann, Rainer Steinwandt
    Power attacks on a side-channel resistant elliptic curve implementation. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2004, v:91, n:1, pp:29-32 [Journal]
  27. Willi Geiselmann, Jörn Müller-Quade, Rainer Steinwandt
    On "A New Representation of Elements of Finite Fields GF (2m) Yielding Small Complexity Arithmetic Circuits". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:12, pp:1460-1461 [Journal]
  28. Willi Geiselmann, Rainer Steinwandt
    A Redundant Representation of GF(q^n) for Designing Arithmetic Circuits. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:7, pp:848-853 [Journal]
  29. Rainer Steinwandt, Willi Geiselmann
    Cryptanalysis of Polly Cracker. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2990-2991 [Journal]
  30. Willi Geiselmann, Rainer Steinwandt
    Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:466-481 [Conf]
  31. Willi Geiselmann, Rainer Steinwandt
    Cryptanalysis of a Hash Function Proposed at ICISC 2006. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:1-10 [Conf]
  32. Willi Geiselmann, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    Entwurf asymmetrischer kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen (Design of Asymmetric Cryptographic Schemes Taking Into Account Quantum Algorithms). [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2006, v:48, n:6, pp:327-0 [Journal]

  33. Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials. [Citation Graph (, )][DBLP]


  34. Skew-cyclic codes. [Citation Graph (, )][DBLP]


  35. In memoriam Thomas Beth. [Citation Graph (, )][DBLP]


Search in 0.051secs, Finished in 0.052secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002