Stefan Kölbl
  • Bio
  • Blog
  • Papers
  • Talks
  • Experience
  • Projects
  • Tools
ESC

Searching...

No results found

↑↓ Navigate ↵ Select
Powered by Hugo Blox
  • Tools
    • Grover Cost Calculator
    • S-box Analyzer
  • Blog
    • Google's commitment to a quantum-safe future: Why PQC is Google's path forward and not QKD
    • From Inventory to Agility: A CISO's Guide to Robust Key Management
    • Cryptographic Agility and Key Rotation
    • Why Hybrid Deployments Are Key to Secure PQC Migration
    • Google's Threat model for Post-Quantum Cryptography
    • Why Google now uses post-quantum cryptography for internal comms
  • Projects
    • SPHINCS+ / SLH-DSA
    • Skinny
    • CryptoSMT
    • Gimli
    • Haraka
    • Pyjamask
  • Experience
  • Publications
    • How to Abuse and Fix Authenticated Encryption Without Key Commitment
    • The SPHINCS+ Signature Framework
    • ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny
    • Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
    • Finding Integral Distinguishers with Ease
    • Putting Wings on SPHINCS
    • Gimli: a cross-platform permutation
    • Haraka - Efficient Short-Input Hashing for Post-Quantum Applications
    • The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
    • Troika: a ternary cryptographic hash function
    • A Brief Comparison of Simon and Simeck
    • State-recovery analysis of Spritz
    • Observations on the SIMON block cipher family
    • Security of AES with a Secret S-box
    • Practical Attacks on AES-like Cryptographic Hash Functions
    • Differential Cryptanalysis of Keccak Variants
    • Practical Attacks on the Maelstrom-0 Compression Function
  • Slides
    • Example Talk: Recent Work
  • Talks
    • A note on SPHINCS+ parameter sets
    • Post-quantum Cryptography at Google
    • Crypto Agility and Post-Quantum Cryptography @ Google
    • How to Abuse and Fix Authenticated Encryption Without Key Commitment
    • ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny
    • Post-quantum Cryptography
    • Update on the PQCrypto Project
    • Putting Wings on SPHINCS
    • How to instantiate Hash-based Signatures?
    • Tools for Cryptanalysis
    • Lightweight Cryptography for the Internet of Things
    • Haraka v2 - efficient short-input hashing for post-quantum applications
    • A brief comparison of SIMON and SIMECK,
    • PQHash - Short Input Hashing
    • State-recovery Analysis of Spritz
    • Observations on the SIMON block cipher family
    • Practical attacks on AES-like Cryptographic Hash Functions
    • Differential Cryptanalysis of Keccak Variants
    • Cryptanalysis of a SHA-3 Candidate
    • Practical attacks on the Maelstrom-0 compression function

Gimli

Oct 20, 2019
Site
projects

Gimli is a cryptographic permutation designed for high performance and security across a wide range of platforms. It is part of the NIST Lightweight Project and is integrated into LibHydrogen for efficient cryptographic operations.

Last updated on Oct 20, 2019
Lightweight

← CryptoSMT
Haraka →

© 2026 Stefan Kölbl. This work is licensed under CC BY NC ND 4.0

Made with Hugo Blox Kit. Build your site →