Volgen
Elena Andreeva
Elena Andreeva
TU Wien (Technische Universität Wien)
Geverifieerd e-mailadres voor tuwien.ac.at - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1402013
How to securely release unverified plaintext in authenticated encryption
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
1332014
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
1032007
COLM CAESAR Finalist
KY Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink ...
Submission and Finalist in the CAESAR Competition (category: defense in depth), 2018
101*2018
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
962008
Security of keyed sponge constructions using a modular proof approach
E Andreeva, J Daemen, B Mennink, G Van Assche
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
912015
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
Fast Software Encryption 2014, 2013
822013
PRIMATEs v1
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Submission to the CAESAR Competition, 2014
80*2014
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
792013
The LANE hash function
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
Dagstuhl Seminar Proceedings, 2009
52*2009
Security reductions of the second round SHA-3 candidates
E Andreeva, B Mennink, B Preneel
Information Security, 39-53, 2011
492011
AES-COPA
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda, ...
48*2014
On the indifferentiability of the Grøstl hash function
E Andreeva, B Mennink, B Preneel
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
422010
The parazoa family: generalizing the sponge hash functions
E Andreeva, B Mennink, B Preneel
Cryptology ePrint Archive, 2011
412011
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.
E Andreeva, C Bouillaguet, O Dunkelman, J Kelsey
Selected Areas in Cryptography 5867, 393-414, 2009
402009
Towards understanding the known-key security of block ciphers
E Andreeva, A Bogdanov, B Mennink
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
382014
Forkcipher: a new primitive for authenticated encryption of very short messages
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
International Conference on the Theory and Application of Cryptology and …, 2019
372019
Open problems in hash function security
E Andreeva, B Mennink, B Preneel
Designs, Codes and Cryptography 77, 611-631, 2015
342015
New second-preimage attacks on hash functions
E Andreeva, C Bouillaguet, O Dunkelman, PA Fouque, J Hoch, J Kelsey, ...
Journal of Cryptology 29, 657-696, 2016
302016
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
E Andreeva, B Mennink, B Preneel, M Škrobot
Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012
292012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20