

Stefan Kölbl
Information Security Engineer
Security engineer with extensive background in cryptography.
Related
- Differential Cryptanalysis of Keccak Variants
- Practical attacks on AES-like Cryptographic Hash Functions
- A Brief Comparison of Simon and Simeck
- Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
- ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny