What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Elena Andreeva
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
Breaking the IEEE Encryption Standard XCB-AES in Two Queries.
Amit Singh Bhati
Elena Andreeva
2024
journals/joc
The COLM Authenticated Encryption Scheme.
Elena Andreeva
Andrey Bogdanov
Nilanjan Datta
Atul Luykx
Bart Mennink
Mridul Nandi
Elmar Tischhauser
Kan Yasuda
2024
conf/acns
Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function.
Elena Andreeva
Benoît Cogliati
Virginie Lallemand
Marine Minier
Antoon Purnal
Arnab Roy
2024
conf/asiaccs
Skye: An Expanding PRF based Fast KDF and its Applications.
Amit Singh Bhati
Antonin Dufka
Elena Andreeva
Arnab Roy
Bart Preneel
2023
conf/ccs
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation.
Amit Singh Bhati
Erik Pohle
Aysajan Abidin
Elena Andreeva
Bart Preneel
2023
conf/acns
A Forkcipher-Based Pseudo-Random Number Generator.
Elena Andreeva
Andreas Weninger
2021
journals/tosc
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher.
Elena Andreeva
Amit Singh Bhati
Bart Preneel
Damian Vizár
2021
conf/eurocrypt
Compactness of Hashing Modes and Efficiency Beyond Merkle Tree.
Elena Andreeva
Rishiraj Bhattacharyya
Arnab Roy
2020
conf/sacrypt
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions.
Arnab Roy
Elena Andreeva
Jan Ferdinand Sauer
2020
conf/sacrypt
Nonce-Misuse Security of the SAEF Authenticated Encryption Mode.
Elena Andreeva
Amit Singh Bhati
Damian Vizár
2019
conf/asiacrypt
Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages.
Elena Andreeva
Virginie Lallemand
Antoon Purnal
Reza Reyhanitabar
Arnab Roy
Damian Vizár
2017
journals/tosc
Turning Online Ciphers Off.
Elena Andreeva
Guy Barwell
Ritam Bhaumik
Mridul Nandi
Dan Page
Martijn Stam
2016
journals/joc
New Second-Preimage Attacks on Hash Functions.
Elena Andreeva
Charles Bouillaguet
Orr Dunkelman
Pierre-Alain Fouque
Jonathan J. Hoch
John Kelsey
Adi Shamir
Sébastien Zimmer
2015
conf/fse
Security of Keyed Sponge Constructions Using a Modular Proof Approach.
Elena Andreeva
Joan Daemen
Bart Mennink
Gilles Van Assche
2015
conf/sacrypt
Forgery and Subkey Recovery on CAESAR Candidate iFeed.
Willem Schroé
Bart Mennink
Elena Andreeva
Bart Preneel
2014
conf/fse
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse.
Elena Andreeva
Atul Luykx
Bart Mennink
Kan Yasuda
2014
conf/fse
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
Elena Andreeva
Begül Bilgin
Andrey Bogdanov
Atul Luykx
Bart Mennink
Nicky Mouha
Kan Yasuda
2014
conf/asiacrypt
How to Securely Release Unverified Plaintext in Authenticated Encryption.
Elena Andreeva
Andrey Bogdanov
Atul Luykx
Bart Mennink
Nicky Mouha
Kan Yasuda
2013
conf/fse
Towards Understanding the Known-Key Security of Block Ciphers.
Elena Andreeva
Andrey Bogdanov
Bart Mennink
2013
conf/crypto
On the Indifferentiability of Key-Alternating Ciphers.
Elena Andreeva
Andrey Bogdanov
Yevgeniy Dodis
Bart Mennink
John P. Steinberger
2013
conf/asiacrypt
Parallelizable and Authenticated Online Ciphers.
Elena Andreeva
Andrey Bogdanov
Atul Luykx
Bart Mennink
Elmar Tischhauser
Kan Yasuda
2012
conf/africacrypt
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein.
Elena Andreeva
Bart Mennink
Bart Preneel
Marjan Skrobot
2012
conf/sacrypt
Provable Security of BLAKE with Non-ideal Compression Function.
Elena Andreeva
Atul Luykx
Bart Mennink
2011
conf/sacrypt
Provable Chosen-Target-Forced-Midfix Preimage Resistance.
Elena Andreeva
Bart Mennink
2009
conf/sacrypt
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.
Elena Andreeva
Charles Bouillaguet
Orr Dunkelman
John Kelsey
2008
conf/eurocrypt
Second Preimage Attacks on Dithered Hash Functions.
Elena Andreeva
Charles Bouillaguet
Pierre-Alain Fouque
Jonathan J. Hoch
John Kelsey
Adi Shamir
Sébastien Zimmer
2008
conf/sacrypt
A Three-Property-Secure Hash Function.
Elena Andreeva
Bart Preneel
2007
conf/asiacrypt
Seven-Property-Preserving Iterated Hashing: ROX.
Elena Andreeva
Gregory Neven
Bart Preneel
Thomas Shrimpton
Coauthors
Adi Shamir
(2)
Amit Singh Bhati
(5)
Andreas Weninger
(1)
Andrey Bogdanov
(6)
Antonín Dufka
(1)
Antoon Purnal
(2)
Arnab Roy
(5)
Atul Luykx
(6)
Aysajan Abidin
(1)
Bart Mennink
(12)
Bart Preneel
(7)
Begül Bilgin
(1)
Benoît Cogliati
(1)
Charles Bouillaguet
(3)
Damian Vizár
(3)
Dan Page
(1)
Elena Andreeva
(28)
Elmar Tischhauser
(2)
Erik Pohle
(1)
Gilles Van Assche
(1)
Gregory Neven
(1)
Guy Barwell
(1)
Jan Ferdinand Sauer
(1)
Joan Daemen
(1)
John Kelsey
(3)
John P. Steinberger
(1)
Jonathan J. Hoch
(2)
Kan Yasuda
(5)
Marine Minier
(1)
Marjan Skrobot
(1)
Martijn Stam
(1)
Mridul Nandi
(2)
Nicky Mouha
(2)
Nilanjan Datta
(1)
Orr Dunkelman
(2)
Pierre-Alain Fouque
(2)
Reza Reyhanitabar
(1)
Rishiraj Bhattacharyya
(1)
Ritam Bhaumik
(1)
Sébastien Zimmer
(2)
Thomas Shrimpton
(1)
Virginie Lallemand
(2)
Willem Schroé
(1)
Yevgeniy Dodis
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to