Stefan Kölbl

Orcid: 0000-0002-4281-6935

According to our database1, Stefan Kölbl authored at least 26 papers between 1987 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Design and Development of a Knee Rehabilitation Exoskeleton with Four-Bar Linkage Actuation.
Proceedings of the 9th International Conference on Control, 2023

Hybrid Post-quantum Signatures in Hardware Security Keys.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
A note on SPHINCS+ parameter sets.
IACR Cryptol. ePrint Arch., 2022

How to Abuse and Fix Authenticated Encryption Without Key Commitment.
Proceedings of the 31st USENIX Security Symposium, 2022

2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

SKINNY-AEAD and SKINNY-Hash.
IACR Trans. Symmetric Cryptol., 2020

Troika: a ternary cryptographic hash function.
Des. Codes Cryptogr., 2020

2019
The SPHINCS+ Signature Framework.
IACR Cryptol. ePrint Arch., 2019

The SPHINCS<sup>+</sup> Signature Framework.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.
IACR Trans. Symmetric Cryptol., 2018

Finding Integral Distinguishers with Ease.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Putting Wings on SPHINCS.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2017
Design and analysis of cryptographic algorithms.
PhD thesis, 2017

Gimli : A Cross-Platform Permutation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications.
IACR Trans. Symmetric Cryptol., 2016

Haraka - Efficient Short-Input Hashing for Post-Quantum Applications.
IACR Cryptol. ePrint Arch., 2016

A Brief Comparison of Simon and Simeck.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
State-Recovery Analysis of Spritz.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

Security of the AES with a Secret S-Box.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Observations on the SIMON Block Cipher Family.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Practical Attacks on AES-like Cryptographic Hash Functions.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

2013
Differential Cryptanalysis of Keccak Variants.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

2011
Practical Attacks on the Maelstrom-0 Compression Function.
Proceedings of the Applied Cryptography and Network Security, 2011

1987
Linear Future Semantics and Its Implementation.
Sci. Comput. Program., 1987


  Loading...