Elena Andreeva
Elena Andreeva
Bestätigte E-Mail-Adresse bei dtu.dk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2013
1262013
How to securely release unverified plaintext in authenticated encryption
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2014
1002014
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2007
992007
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
862008
Security of keyed sponge constructions using a modular proof approach
E Andreeva, J Daemen, B Mennink, G Van Assche
International Workshop on Fast Software Encryption, 364-384, 2015
732015
PRIMATEs v1. 02 submission to the CAESAR competition
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Sep, 2014
67*2014
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Annual Cryptology Conference, 531-550, 2013
662013
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
Fast Software Encryption 2014, 2013
662013
COLM CAESAR Finalist
KY Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink ...
Submission and Finalist in the CAESAR Competition (category: defense in depth), 2018
57*2018
Security reductions of the second round SHA-3 candidates
E Andreeva, B Mennink, B Preneel
Information Security, 39-53, 2011
472011
The LANE hash function
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
Dagstuhl Seminar Proceedings, 2009
47*2009
On the indifferentiability of the Grøstl hash function
E Andreeva, B Mennink, B Preneel
International Conference on Security and Cryptography for Networks, 88-105, 2010
392010
The parazoa family: generalizing the sponge hash functions
E Andreeva, B Mennink, B Preneel
International Journal of Information Security 11 (3), 149-165, 2012
372012
Herding, second preimage and trojan message attacks beyond Merkle-Damgård
E Andreeva, C Bouillaguet, O Dunkelman, J Kelsey
International Workshop on Selected Areas in Cryptography, 393-414, 2009
36*2009
Towards understanding the known-key security of block ciphers
E Andreeva, A Bogdanov, B Mennink
International Workshop on Fast Software Encryption, 348-366, 2013
342013
AES-COPA
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda, ...
33*2014
A three-property-secure hash function
E Andreeva, B Preneel
International Workshop on Selected Areas in Cryptography, 228-244, 2008
262008
Security analysis and comparison of the SHA-3 finalists BLAKE, Grøstl, JH, Keccak, and Skein
E Andreeva, B Mennink, B Preneel, M Škrobot
International Conference on Cryptology in Africa, 287-305, 2012
252012
Open problems in hash function security
E Andreeva, B Mennink, B Preneel
Designs, Codes and Cryptography 77 (2-3), 611-631, 2015
232015
New second-preimage attacks on hash functions
E Andreeva, C Bouillaguet, O Dunkelman, PA Fouque, J Hoch, J Kelsey, ...
Journal of Cryptology 29 (4), 657-696, 2016
222016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20