#### Filter Results:

- Full text PDF available (36)

#### Publication Year

1959

2017

- This year (6)
- Last 5 years (29)
- Last 10 years (42)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda
- ASIACRYPT
- 2013

Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which only depend on the preceding plaintext blocks. All online ciphers proposed so far are essentiallyâ€¦ (More)

- Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
- ASIACRYPT
- 2014

Scenarios in which authenticated encryption schemes output decrypted plaintext before successful verification raise many security issues. These situations are sometimes unavoidable in practice, suchâ€¦ (More)

- Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
- ASIACRYPT
- 2007

Nearly all modern hash functions are constructed by iterating a compression function. At FSEâ€™04, Rogaway and Shrimpton [RS04] formalized seven security notions for hash functions: collisionâ€¦ (More)

The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structure of AES can be viewed as a (10-round) key-alternating cipher, where a t-round key-alternatingâ€¦ (More)

- Elena Andreeva, Charles Bouillaguet, +4 authors SÃ©bastien Zimmer
- EUROCRYPT
- 2007

The goal of this paper is to analyze the security of dithered variants of the Merkle-DamgÃ¥rd mode of operation that use a third input to indicate the position of a block in the message to be hashed.â€¦ (More)

- Elena Andreeva, Bart Mennink, Bart Preneel, Marjan Skrobot
- AFRICACRYPT
- 2012

In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to the vulnerabilities identified in widely employedâ€¦ (More)

- Sebastiaan Indesteege, Elena Andreeva, +5 authors Elmar Tischhauser
- Symmetric Cryptography
- 2009

Tischhauser for many interesting discussions concerning the design of Lane and its predecessors, and for their continued effort on the cryptanalysis of both older and the final version of Lane. Theirâ€¦ (More)

- Elena Andreeva, BegÃ¼l Bilgin, +4 authors Kan Yasuda
- FSE
- 2013

The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained devices. It is very costly to avoid nonce reuse in such environments, because this requires eitherâ€¦ (More)

- Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, John Kelsey
- Selected Areas in Cryptography
- 2009

In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical MerkleÂ DamgÌŠard construction. We extend the herding attack toâ€¦ (More)

Sponge functions were originally proposed for hashing, but find increasingly more applications in keyed constructions, such as encryption and authentication. Depending on how the key is used we seeâ€¦ (More)