Elena Andreeva
Elena Andreeva
Bestätigte E-Mail-Adresse bei dtu.dk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2013
1232013
How to securely release unverified plaintext in authenticated encryption
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2014
992014
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2007
962007
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
842008
Security of keyed sponge constructions using a modular proof approach
E Andreeva, J Daemen, B Mennink, G Van Assche
International Workshop on Fast Software Encryption, 364-384, 2015
692015
PRIMATEs v1. 02 submission to the CAESAR competition
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Sep, 2014
67*2014
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
Fast Software Encryption 2014, 2013
642013
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Annual Cryptology Conference, 531-550, 2013
622013
COLM CAESAR Finalist
KY Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink ...
Submission and Finalist in the CAESAR Competition (category: defense in depth), 2018
52*2018
The LANE hash function
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
Dagstuhl Seminar Proceedings, 2009
47*2009
Security reductions of the second round SHA-3 candidates
E Andreeva, B Mennink, B Preneel
Information Security, 39-53, 2011
452011
The parazoa family: generalizing the sponge hash functions
E Andreeva, B Mennink, B Preneel
International Journal of Information Security 11 (3), 149-165, 2012
372012
On the indifferentiability of the Grøstl hash function
E Andreeva, B Mennink, B Preneel
International Conference on Security and Cryptography for Networks, 88-105, 2010
372010
Herding, second preimage and trojan message attacks beyond Merkle-Damgård
E Andreeva, C Bouillaguet, O Dunkelman, J Kelsey
International Workshop on Selected Areas in Cryptography, 393-414, 2009
35*2009
Towards understanding the known-key security of block ciphers
E Andreeva, A Bogdanov, B Mennink
International Workshop on Fast Software Encryption, 348-366, 2013
302013
AES-COPA
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda, ...
29*2014
Security analysis and comparison of the SHA-3 finalists BLAKE, Grøstl, JH, Keccak, and Skein
E Andreeva, B Mennink, B Preneel, M Škrobot
International Conference on Cryptology in Africa, 287-305, 2012
242012
A three-property-secure hash function
E Andreeva, B Preneel
International Workshop on Selected Areas in Cryptography, 228-244, 2008
242008
Open problems in hash function security
E Andreeva, B Mennink, B Preneel
Designs, Codes and Cryptography 77 (2-3), 611-631, 2015
232015
New second-preimage attacks on hash functions
E Andreeva, C Bouillaguet, O Dunkelman, PA Fouque, J Hoch, J Kelsey, ...
Journal of Cryptology 29 (4), 657-696, 2016
222016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20