Elena Andreeva

Orcid: 0000-0003-0964-8711

Affiliations:
  • Technical University of Vienna, Austria
  • Alpen-Adria University, Klagenfurt, Austria (former)
  • Technical University of Denmark, DTU Compute, Kongens Lyngby, Denmark (former)
  • Katholieke Universiteit Leuven, Department of Electrical Engineering, Belgium (former, PhD 2010)


According to our database1, Elena Andreeva authored at least 46 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The COLM Authenticated Encryption Scheme.
J. Cryptol., June, 2024

Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks.
Des. Codes Cryptogr., February, 2024

On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing.
IACR Cryptol. ePrint Arch., 2024

2023
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation.
IACR Cryptol. ePrint Arch., 2023

Skye: A Fast KDF based on Expanding PRF and its Application to Signal.
IACR Cryptol. ePrint Arch., 2023

A Forkcipher-Based Pseudo-Random Number Generator.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function.
IACR Cryptol. ePrint Arch., 2022

Quantum Cryptanalysis of Farfalle and (Generalised) Feistel Network.
CoRR, 2022

2021
RUP Security of the SAEF Authenticated Encryption mode.
IACR Cryptol. ePrint Arch., 2021

Compactness of Hashing Modes and Efficiency beyond Merkle Tree.
IACR Cryptol. ePrint Arch., 2021

1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher.
IACR Cryptol. ePrint Arch., 2021

Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions.
IACR Cryptol. ePrint Arch., 2021

2020
Optimized Software Implementations for theLightweight Encryption Scheme ForkAE.
IACR Cryptol. ePrint Arch., 2020

Nonce-Misuse Security of the SAEF Authenticated Encryption mode.
IACR Cryptol. ePrint Arch., 2020

Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE.
Proceedings of the Smart Card Research and Advanced Applications, 2020

2019
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages.
IACR Cryptol. ePrint Arch., 2019

2018
Forking a Blockcipher for Authenticated Encryption of Very Short Messages.
IACR Cryptol. ePrint Arch., 2018

2017
Turning Online Ciphers Off.
IACR Trans. Symmetric Cryptol., 2017

Multiparty Routing: Secure Routing for Mixnets.
CoRR, 2017

2016
New Second-Preimage Attacks on Hash Functions.
J. Cryptol., 2016

2015
Turning Online Ciphers Off.
IACR Cryptol. ePrint Arch., 2015

Towards Understanding the Known-Key Security of Block Ciphers.
IACR Cryptol. ePrint Arch., 2015

Open problems in hash function security.
Des. Codes Cryptogr., 2015

Forgery and Subkey Recovery on CAESAR Candidate iFeed.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Security of Keyed Sponge Constructions Using a Modular Proof Approach.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

2014
How to Securely Release Unverified Plaintext in Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2014

COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
Parallelizable and Authenticated Online Ciphers.
IACR Cryptol. ePrint Arch., 2013

On the Indifferentiability of Key-Alternating Ciphers.
IACR Cryptol. ePrint Arch., 2013

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
IACR Cryptol. ePrint Arch., 2013

2012
The parazoa family: generalizing the sponge hash functions.
Int. J. Inf. Sec., 2012

On security arguments of the second round SHA-3 candidates.
Int. J. Inf. Sec., 2012

Impossibility Results for Indifferentiability with Resets.
IACR Cryptol. ePrint Arch., 2012

Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Provable Security of BLAKE with Non-Ideal Compression Function.
IACR Cryptol. ePrint Arch., 2011

Provable Chosen-Target-Forced-Midfix Preimage Resistance.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

The Symbiosis between Collision and Preimage Resistance.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

2010
Security Properties of Domain Extenders for Cryptographic Hash Functions.
J. Inf. Process. Syst., 2010

Security Reductions of the Second Round SHA-3 Candidates.
IACR Cryptol. ePrint Arch., 2010

On the Indifferentiability of the Gröstl Hash Function.
IACR Cryptol. ePrint Arch., 2010

2009
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

The Lane hash function.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
A Three-Property-Secure Hash Function.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Second Preimage Attacks on Dithered Hash Functions.
Proceedings of the Advances in Cryptology, 2008

2007
Seven-Property-Preserving Iterated Hashing: ROX.
IACR Cryptol. ePrint Arch., 2007

2006
SLC: Efficient Authenticated Encryption for Short Packages.
Proceedings of the Sicherheit 2006: Sicherheit, 2006


  Loading...