Suivre
Elena Andreeva
Elena Andreeva
TU Wien (Technische Universität Wien)
Adresse e-mail validée de tuwien.ac.at - Page d'accueil
Titre
Citée par
Citée par
Année
How to securely release unverified plaintext in authenticated encryption
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2014
1492014
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1432013
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
1042007
COLM CAESAR Finalist
KY Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink ...
Submission and Finalist in the CAESAR Competition (category: defense in depth), 2018
103*2018
Security of keyed sponge constructions using a modular proof approach
E Andreeva, J Daemen, B Mennink, G Van Assche
International Workshop on Fast Software Encryption, 364-384, 2015
1012015
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
982008
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
902013
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
Fast Software Encryption 2014, 2013
892013
PRIMATEs v1
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Submission to the CAESAR Competition, 2014
85*2014
Forkcipher: a new primitive for authenticated encryption of very short messages
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
International Conference on the Theory and Application of Cryptology and …, 2019
552019
The LANE hash function
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
Dagstuhl Seminar Proceedings, 2009
52*2009
Security reductions of the second round SHA-3 candidates
E Andreeva, B Mennink, B Preneel
Information Security, 39-53, 2011
512011
AES-COPA
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda, ...
50*2014
Towards understanding the known-key security of block ciphers
E Andreeva, A Bogdanov, B Mennink
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
462014
Herding, second preimage and trojan message attacks beyond Merkle-Damgård
E Andreeva, C Bouillaguet, O Dunkelman, J Kelsey
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
452009
On the indifferentiability of the Grøstl hash function
E Andreeva, B Mennink, B Preneel
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
442010
The parazoa family: generalizing the sponge hash functions
E Andreeva, B Mennink, B Preneel
International Journal of Information Security 11, 149-165, 2012
422012
New second-preimage attacks on hash functions
E Andreeva, C Bouillaguet, O Dunkelman, PA Fouque, J Hoch, J Kelsey, ...
Journal of Cryptology 29, 657-696, 2016
342016
Open problems in hash function security
E Andreeva, B Mennink, B Preneel
Designs, Codes and Cryptography 77, 611-631, 2015
342015
ForkAE v.
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
Submission to NIST Lightweight Cryptography Project, 2019
322019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20