Stefan Kölbl

Orcid: 0000-0002-4281-6935

According to our database1, Stefan Kölbl authored at least 26 papers between 1987 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Design and Development of a Knee Rehabilitation Exoskeleton with Four-Bar Linkage Actuation.
Proceedings of the 9th International Conference on Control, 2023

2022
A note on SPHINCS+ parameter sets.
IACR Cryptol. ePrint Arch., 2022

Hybrid Post-Quantum Signatures in Hardware Security Keys.
IACR Cryptol. ePrint Arch., 2022

2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

SKINNY-AEAD and SKINNY-Hash.
IACR Trans. Symmetric Cryptol., 2020

How to Abuse and Fix Authenticated Encryption Without Key Commitment.
IACR Cryptol. ePrint Arch., 2020

Troika: a ternary cryptographic hash function.
Des. Codes Cryptogr., 2020

2019
The SPHINCS+ Signature Framework.
IACR Cryptol. ePrint Arch., 2019

The SPHINCS<sup>+</sup> Signature Framework.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.
IACR Trans. Symmetric Cryptol., 2018

Finding Integral Distinguishers with Ease.
IACR Cryptol. ePrint Arch., 2018

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2018

2017
Design and analysis of cryptographic algorithms.
PhD thesis, 2017

Putting Wings on SPHINCS.
IACR Cryptol. ePrint Arch., 2017

Gimli: a cross-platform permutation.
IACR Cryptol. ePrint Arch., 2017

2016
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications.
IACR Trans. Symmetric Cryptol., 2016

Haraka - Efficient Short-Input Hashing for Post-Quantum Applications.
IACR Cryptol. ePrint Arch., 2016

The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS.
IACR Cryptol. ePrint Arch., 2016

2015
Security of the AES with a Secret S-box.
IACR Cryptol. ePrint Arch., 2015

A Brief Comparison of Simon and Simeck.
IACR Cryptol. ePrint Arch., 2015

Observations on the SIMON block cipher family.
IACR Cryptol. ePrint Arch., 2015

State-recovery analysis of Spritz.
IACR Cryptol. ePrint Arch., 2015

2014
Practical Attacks on AES-like Cryptographic Hash Functions.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

2013
Differential Cryptanalysis of Keccak Variants.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

2011
Practical Attacks on the Maelstrom-0 Compression Function.
Proceedings of the Applied Cryptography and Network Security, 2011

1987
Linear Future Semantics and Its Implementation.
Sci. Comput. Program., 1987


  Loading...