Volgen
Stefan Kölbl
Stefan Kölbl
Google
Geverifieerd e-mailadres voor mailbox.org - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
8502016
The SPHINCS+ Signature Framework
DJ Bernstein, A Hülsing, S Kölbl, R Niederhagen, J Rijneveld, P Schwabe
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
3572019
Observations on the SIMON block cipher family
S Kölbl, G Leander, T Tiessen
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
2272015
Gimli : A Cross-Platform Permutation
DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ...
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
1522017
Sphincs
DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, SL Gazdag, ...
Dec, 2017
111*2017
Mind the gap-A closer look at the security of block ciphers against differential cryptanalysis
R Ankele, S Kölbl
International Conference on Selected Areas in Cryptography, 163-190, 2018
962018
Haraka v2–efficient short-input hashing for post-quantum applications
S Kölbl, MM Lauridsen, F Mendel, C Rechberger
IACR Transactions on Symmetric Cryptology, 1-29, 2016
932016
Security of the AES with a secret S-box
T Tiessen, LR Knudsen, S Kölbl, MM Lauridsen
International Workshop on Fast Software Encryption, 175-189, 2015
672015
A Brief Comparison of Simon and Simeck
S Kölbl, A Roy
Lightweight Cryptography for Security and Privacy: 5th International …, 2017
612017
Finding integral distinguishers with ease
Z Eskandari, AB Kidmose, S Kölbl, T Tiessen
Selected Areas in Cryptography–SAC 2018: 25th International Conference …, 2019
592019
How to abuse and fix authenticated encryption without key commitment
A Albertini, T Duong, S Gueron, S Kölbl, A Luykx, S Schmieg
31st USENIX Security Symposium (USENIX Security 22), 3291-3308, 2022
582022
Skinny-aead and skinny-hash
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
IACR Transactions on Symmetric Cryptology, 88-131, 2020
492020
CryptoSMT: An easy to use tool for cryptanalysis of symmetric primitives
S Kölbl
40
Pyjamask: Block cipher and authenticated encryption with highly efficient masked implementation
D Goudarzi, J Jean, S Kölbl, T Peyrin, M Rivain, Y Sasaki, SM Sim
IACR Transactions on Symmetric Cryptology, 31-59, 2020
342020
Gimli
DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ...
Submission to the NIST Lightweight Cryptography project. Available online …, 2019
292019
Putting wings on SPHINCS
S Kölbl
Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort …, 2018
212018
Skinny-aead and skinny-hash v1. 1
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Submission to Round 1, 2019
192019
ShiftRows alternatives for AES-like ciphers and optimal cell permutations for Midori and Skinny
GN Alfarano, C Beierle, T Isobe, S Kölbl, G Leander
IACR Transactions on Symmetric Cryptology, 20-47, 2018
182018
Differential cryptanalysis of Keccak variants
S Kölbl, F Mendel, T Nad, M Schläffer
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
172013
Hybrid post-quantum signatures in hardware security keys
D Ghinea, F Kaczmarczyck, J Pullman, J Cretin, S Kölbl, R Misoczki, ...
International Conference on Applied Cryptography and Network Security, 480-499, 2023
122023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20