Follow
Elena Andreeva
Elena Andreeva
TU Wien (Technische Universität Wien)
Verified email at tuwien.ac.at - Homepage
Title
Cited by
Cited by
Year
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2013
1372013
How to securely release unverified plaintext in authenticated encryption
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2014
1272014
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2007
1032007
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
972008
Security of keyed sponge constructions using a modular proof approach
E Andreeva, J Daemen, B Mennink, G Van Assche
International Workshop on Fast Software Encryption, 364-384, 2015
842015
COLM CAESAR Finalist
KY Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink ...
Submission and Finalist in the CAESAR Competition (category: defense in depth), 2018
83*2018
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
Fast Software Encryption 2014, 2013
792013
PRIMATEs v1
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Submission to CAESAR, 2014
77*2014
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Annual Cryptology Conference, 531-550, 2013
762013
Security reductions of the second round SHA-3 candidates
E Andreeva, B Mennink, B Preneel
Information Security, 39-53, 2011
502011
The LANE hash function
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
Dagstuhl Seminar Proceedings, 2009
50*2009
AES-COPA
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda, ...
45*2014
On the indifferentiability of the Grøstl hash function
E Andreeva, B Mennink, B Preneel
International Conference on Security and Cryptography for Networks, 88-105, 2010
442010
The parazoa family: generalizing the sponge hash functions
E Andreeva, B Mennink, B Preneel
International Journal of Information Security 11 (3), 149-165, 2012
412012
Herding, second preimage and trojan message attacks beyond Merkle-Damgård
E Andreeva, C Bouillaguet, O Dunkelman, J Kelsey
International Workshop on Selected Areas in Cryptography, 393-414, 2009
412009
Towards understanding the known-key security of block ciphers
E Andreeva, A Bogdanov, B Mennink
International Workshop on Fast Software Encryption, 348-366, 2013
352013
Forkcipher: a new primitive for authenticated encryption of very short messages
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
International Conference on the Theory and Application of Cryptology and …, 2019
292019
Open problems in hash function security
E Andreeva, B Mennink, B Preneel
Designs, Codes and Cryptography 77 (2), 611-631, 2015
292015
Security analysis and comparison of the SHA-3 finalists BLAKE, Grøstl, JH, Keccak, and Skein
E Andreeva, B Mennink, B Preneel, M Škrobot
International Conference on Cryptology in Africa, 287-305, 2012
282012
A three-property-secure hash function
E Andreeva, B Preneel
International Workshop on Selected Areas in Cryptography, 228-244, 2008
282008
The system can't perform the operation now. Try again later.
Articles 1–20