Follow
Elena Andreeva
Elena Andreeva
TU Wien (Technische Universität Wien)
Verified email at tuwien.ac.at - Homepage
Title
Cited by
Cited by
Year
How to securely release unverified plaintext in authenticated encryption
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2014
1672014
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1472013
Security of keyed sponge constructions using a modular proof approach
E Andreeva, J Daemen, B Mennink, G Van Assche
International Workshop on Fast Software Encryption, 364-384, 2015
1052015
The COLM Authenticated Encryption Scheme
E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ...
Journal of Cryptology 37 (2), 15, 2024
104*2024
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
1042007
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
1012008
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
942013
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
Fast Software Encryption 2014, 2013
932013
PRIMATEs v1
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Submission to the CAESAR Competition, 2014
88*2014
Forkcipher: a new primitive for authenticated encryption of very short messages
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
International Conference on the Theory and Application of Cryptology and …, 2019
642019
AES-COPA
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda, ...
53*2014
The LANE hash function
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
Dagstuhl Seminar Proceedings, 2009
53*2009
Security reductions of the second round SHA-3 candidates
E Andreeva, B Mennink, B Preneel
Information Security, 39-53, 2011
522011
Towards understanding the known-key security of block ciphers
E Andreeva, A Bogdanov, B Mennink
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
492014
Herding, second preimage and trojan message attacks beyond Merkle-Damgård
E Andreeva, C Bouillaguet, O Dunkelman, J Kelsey
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
472009
The parazoa family: generalizing the sponge hash functions
E Andreeva, B Mennink, B Preneel
International Journal of Information Security 11, 149-165, 2012
452012
On the indifferentiability of the Grøstl hash function
E Andreeva, B Mennink, B Preneel
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
432010
New second-preimage attacks on hash functions
E Andreeva, C Bouillaguet, O Dunkelman, PA Fouque, J Hoch, J Kelsey, ...
Journal of Cryptology 29, 657-696, 2016
372016
Open problems in hash function security
E Andreeva, B Mennink, B Preneel
Designs, Codes and Cryptography 77, 611-631, 2015
352015
ForkAE v.
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
Submission to NIST Lightweight Cryptography Project, 2019
342019
The system can't perform the operation now. Try again later.
Articles 1–20