Willi Geiselmann

719 total citations
19 papers, 208 citations indexed

About

Willi Geiselmann is a scholar working on Artificial Intelligence, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Willi Geiselmann has authored 19 papers receiving a total of 208 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Artificial Intelligence, 6 papers in Information Systems and 4 papers in Computer Vision and Pattern Recognition. Recurrent topics in Willi Geiselmann's work include Coding theory and cryptography (11 papers), Cryptography and Residue Arithmetic (6 papers) and Cryptographic Implementations and Security (5 papers). Willi Geiselmann is often cited by papers focused on Coding theory and cryptography (11 papers), Cryptography and Residue Arithmetic (6 papers) and Cryptographic Implementations and Security (5 papers). Willi Geiselmann collaborates with scholars based in Germany, Switzerland and Israel. Willi Geiselmann's co-authors include Félix Ulmer, Delphine Boucher, Rainer Steinwandt, Georg Bretthauer, Jörn Müller‐Quade, Daniel Masny, Christoph Beck, Dieter Gollmann, T. Beth and Jacques Calmet and has published in prestigious journals such as IEEE Transactions on Information Theory, IEEE Transactions on Computers and Information Processing Letters.

In The Last Decade

Willi Geiselmann

19 papers receiving 192 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Willi Geiselmann Germany 7 186 91 60 56 38 19 208
G.H. Norton United Kingdom 8 156 0.8× 164 1.8× 47 0.8× 65 1.2× 8 0.2× 28 249
Heeralal Janwa Puerto Rico 9 141 0.8× 92 1.0× 40 0.7× 39 0.7× 10 0.3× 23 186
V.M. Sidelnikov Russia 7 185 1.0× 101 1.1× 21 0.3× 28 0.5× 18 0.5× 15 221
Kwankyu Lee South Korea 9 182 1.0× 125 1.4× 26 0.4× 64 1.1× 20 0.5× 20 211
D. Jungnickel Germany 3 193 1.0× 207 2.3× 120 2.0× 44 0.8× 4 0.1× 4 259
Haode Yan China 12 342 1.8× 201 2.2× 62 1.0× 76 1.4× 26 0.7× 29 346
Jiaojiao Wu China 10 46 0.2× 47 0.5× 67 1.1× 193 3.4× 49 1.3× 27 288
Daniel Augot France 11 225 1.2× 134 1.5× 22 0.4× 77 1.4× 18 0.5× 25 267
Carlos Munuera Spain 10 225 1.2× 108 1.2× 69 1.1× 65 1.2× 17 0.4× 27 278
Hongwei Liu China 9 252 1.4× 117 1.3× 56 0.9× 83 1.5× 10 0.3× 30 269

Countries citing papers authored by Willi Geiselmann

Since Specialization
Citations

This map shows the geographic impact of Willi Geiselmann's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Willi Geiselmann with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Willi Geiselmann more than expected).

Fields of papers citing papers by Willi Geiselmann

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Willi Geiselmann. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Willi Geiselmann. The network helps show where Willi Geiselmann may publish in the future.

Co-authorship network of co-authors of Willi Geiselmann

This figure shows the co-authorship network connecting the top 25 collaborators of Willi Geiselmann. A scholar is included among the top collaborators of Willi Geiselmann based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Willi Geiselmann. Willi Geiselmann is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

19 of 19 papers shown
1.
Beck, Christoph, Daniel Masny, Willi Geiselmann, & Georg Bretthauer. (2011). Block cipher based security for severely resource-constrained implantable medical devices. 1–5. 14 indexed citations
2.
Calmet, Jacques, Willi Geiselmann, & Jörn Müller‐Quade. (2008). Complexity of comparing monomials and two improvements of the Buchberger-Möller algorithm. arXiv (Cornell University). 5393. 105–125. 1 indexed citations
3.
Calmet, Jacques, Willi Geiselmann, & Jörn Müller‐Quade. (2008). Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth. 191–191. 6 indexed citations
4.
Boucher, Delphine, Willi Geiselmann, & Félix Ulmer. (2007). Skew-cyclic codes. Applicable Algebra in Engineering Communication and Computing. 18(4). 379–389. 126 indexed citations
5.
Geiselmann, Willi, et al.. (2005). Improved routing-based linear algebra for the number field sieve. 636–641 Vol. 1. 2 indexed citations
6.
Geiselmann, Willi & Rainer Steinwandt. (2005). A key substitution attack on SFLASHv3. Journal of Discrete Mathematical Sciences and Cryptography. 8(2). 137–141. 1 indexed citations
7.
Geiselmann, Willi & Rainer Steinwandt. (2004). Attacks on a secure group communication scheme with hierarchical access control. 15–15. 2 indexed citations
8.
Geiselmann, Willi & Rainer Steinwandt. (2004). Power attacks on a side-channel resistant elliptic curve implementation. Information Processing Letters. 91(1). 29–32. 2 indexed citations
9.
Geiselmann, Willi & Rainer Steinwandt. (2003). A redundant representation of GF(q<sup>n</sup>) for designing arithmetic circuits. IEEE Transactions on Computers. 52(7). 848–853. 7 indexed citations
10.
Geiselmann, Willi, Willi Meier, & Rainer Steinwandt. (2003). An attack on the isomorphisms of polynomials problem with one secret. International Journal of Information Security. 2(1). 59–64. 6 indexed citations
11.
Steinwandt, Rainer, et al.. (2002). . International Journal of Information Security. 1(3). 143–148. 8 indexed citations
12.
Geiselmann, Willi, Jörn Müller‐Quade, & Rainer Steinwandt. (2002). On "A new representation of elements of finite fields GF(2/sup m/) yielding small complexity arithmetic circuits". IEEE Transactions on Computers. 51(12). 1460–1461. 4 indexed citations
13.
Steinwandt, Rainer & Willi Geiselmann. (2002). Cryptanalysis of Polly Cracker. IEEE Transactions on Information Theory. 48(11). 2990–2991. 9 indexed citations
14.
Steinwandt, Rainer, Markus Grassl, Willi Geiselmann, & Thomas Beth. (2000). Weaknesses in the SL2(IFs2) Hashing Scheme. 287–299. 1 indexed citations
15.
Geiselmann, Willi. (1996). Weakly self-dual normal bases in finite fields. Oxford University Press eBooks. 67–74. 2 indexed citations
16.
Jungnickel, Dieter, Thomas Beth, & Willi Geiselmann. (1994). A note on orthogonal circulant matrices over finite fields. Archiv der Mathematik. 62(2). 126–133. 4 indexed citations
17.
Geiselmann, Willi & Dieter Gollmann. (1993). Self-dual bases in $$\mathbb{F}_{q^n } $$. Designs Codes and Cryptography. 3(4). 333–345. 6 indexed citations
18.
Beth, T., et al.. (1991). Finding (good) normal bases in finite fields. 173–178. 2 indexed citations
19.
Beth, T. & Willi Geiselmann. (1990). Selbstduale Normalbasen �berGF(q). Archiv der Mathematik. 55(1). 44–48. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026