Follow
Stefan Kölbl
Stefan Kölbl
Google
Verified email at mailbox.org - Homepage
Title
Cited by
Cited by
Year
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Annual International Cryptology Conference, 123-153, 2016
5582016
Observations on the SIMON block cipher family
S Kölbl, G Leander, T Tiessen
Annual Cryptology Conference, 161-185, 2015
1672015
The SPHINCS+ Signature Framework
DJ Bernstein, A Hülsing, S Kölbl, R Niederhagen, J Rijneveld, P Schwabe
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1162019
Gimli: a cross-platform permutation
DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ...
International Conference on Cryptographic Hardware and Embedded Systems, 299-320, 2017
1082017
SPHINCS
DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, SL Gazdag, ...
65*2017
Haraka v2–efficient short-input hashing for post-quantum applications
S Kölbl, MM Lauridsen, F Mendel, C Rechberger
IACR Transactions on Symmetric Cryptology, 1-29, 2016
622016
Mind the gap-A closer look at the security of block ciphers against differential cryptanalysis
R Ankele, S Kölbl
International Conference on Selected Areas in Cryptography, 163-190, 2018
602018
Security of the AES with a Secret S-Box
T Tiessen, LR Knudsen, S Kölbl, MM Lauridsen
International Workshop on Fast Software Encryption, 175-189, 2015
562015
Finding integral distinguishers with ease
Z Eskandari, AB Kidmose, S Kölbl, T Tiessen
International Conference on Selected Areas in Cryptography, 115-138, 2018
492018
A Brief Comparison of Simon and Simeck
S Kölbl, A Roy
International Workshop on Lightweight Cryptography for Security and Privacy …, 2016
492016
Skinny-aead and skinny-hash
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
IACR Transactions on Symmetric Cryptology, 88-131, 2020
332020
CryptoSMT: An easy to use tool for cryptanalysis of symmetric primitives
S Kölbl
27
Pyjamask: Block cipher and authenticated encryption with highly efficient masked implementation
D Goudarzi, J Jean, S Kölbl, T Peyrin, M Rivain, Y Sasaki, SM Sim
IACR Transactions on Symmetric Cryptology, 31-59, 2020
182020
Skinny-aead and skinny-hash v1. 1
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Submission to Round 1, 2019
172019
Gimli
DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ...
Submission to the NIST Lightweight Cryptography project. Available online …, 2019
162019
Differential cryptanalysis of Keccak variants
S Kölbl, F Mendel, T Nad, M Schläffer
IMA International Conference on Cryptography and Coding, 141-157, 2013
142013
ShiftRows alternatives for AES-like ciphers and optimal cell permutations for Midori and Skinny
GN Alfarano, C Beierle, T Isobe, S Kölbl, G Leander
IACR Transactions on Symmetric Cryptology, 20-47, 2018
122018
Putting wings on SPHINCS
S Kölbl
International Conference on Post-Quantum Cryptography, 205-226, 2018
122018
How to abuse and fix authenticated encryption without key commitment
A Albertini, T Duong, S Gueron, S Kölbl, A Luykx, S Schmieg
31st USENIX Security Symposium (USENIX Security 22), 3291-3308, 2022
82022
Troika: a ternary cryptographic hash function
S Kölbl, E Tischhauser, P Derbez, A Bogdanov
Designs, Codes and Cryptography 88 (1), 91-117, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20