Folgen
Elena Andreeva
Elena Andreeva
TU Wien (Technische Universität Wien)
Bestätigte E-Mail-Adresse bei tuwien.ac.at - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1402013
How to securely release unverified plaintext in authenticated encryption
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
1382014
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
1032007
COLM CAESAR Finalist
KY Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink ...
Submission and Finalist in the CAESAR Competition (category: defense in depth), 2018
102*2018
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
962008
Security of keyed sponge constructions using a modular proof approach
E Andreeva, J Daemen, B Mennink, G Van Assche
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
932015
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
Fast Software Encryption 2014, 2013
842013
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
832013
PRIMATEs v1
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Submission to the CAESAR Competition, 2014
82*2014
The LANE hash function
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
Dagstuhl Seminar Proceedings, 2009
52*2009
Security reductions of the second round SHA-3 candidates
E Andreeva, B Mennink, B Preneel
Information Security, 39-53, 2011
502011
AES-COPA
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda, ...
48*2014
On the indifferentiability of the Grøstl hash function
E Andreeva, B Mennink, B Preneel
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
432010
Forkcipher: a new primitive for authenticated encryption of very short messages
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
International Conference on the Theory and Application of Cryptology and …, 2019
412019
The parazoa family: generalizing the sponge hash functions
E Andreeva, B Mennink, B Preneel
International Journal of Information Security 11, 149-165, 2012
412012
Towards understanding the known-key security of block ciphers
E Andreeva, A Bogdanov, B Mennink
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
402014
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.
E Andreeva, C Bouillaguet, O Dunkelman, J Kelsey
Selected Areas in Cryptography 5867, 393-414, 2009
402009
Open problems in hash function security
E Andreeva, B Mennink, B Preneel
Designs, Codes and Cryptography 77, 611-631, 2015
342015
New second-preimage attacks on hash functions
E Andreeva, C Bouillaguet, O Dunkelman, PA Fouque, J Hoch, J Kelsey, ...
Journal of Cryptology 29, 657-696, 2016
302016
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
E Andreeva, B Mennink, B Preneel, M Škrobot
Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012
292012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20