publications

Detailed bibliographical information about my publications can be found on my google scholar and DBLP pages.

2024

  1. ACM ASIACCS
    Skye: A Fast KDF based on Expanding PRF and its Applications
    Amit Singh Bhati, Antonin Dufka, Elena Andreeva, and 2 more authors
    In ACM Asia Conference on Computer and Communications Security, 2024

2023

  1. ACM CCS
    Let’s Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation
    Amit Singh Bhati, Erik Pohle, Aysajan Abidin, and 2 more authors
    In ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, 2023
  2. ACNS
    A Forkcipher-Based Pseudo-Random Number Generator
    Elena Andreeva, and Andreas Weninger
    In Applied Cryptography and Network Security ACNS 2023, Proceedings, Part II, 2023
  3. DCC
    Quantum Cryptanalysis of Farfalle and (Generalised) Feistel Network
    Samir Hodzic, Arnab Roy, and Elena Andreeva
    Designs Codes and Cryptography, 2023

2022

  1. ePrint
    Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function
    Elena Andreeva, Benoit Cogliati, Virginie Lallemand, and 3 more authors
    IACR Cryptol. ePrint Arch., 2022

2021

  1. EUROCRYPT
    Compactness of Hashing Modes and Efficiency Beyond Merkle Tree
    Elena Andreeva, Rishiraj Bhattacharyya, and Arnab Roy
    In EUROCRYPT, 2021
  2. FSE
    1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
    Elena Andreeva, Amit Singh Bhati, Bart Preneel, and 1 more author
    IACR Trans. Symmetric Cryptol., 2021
  3. eprint
    RUP Security of the SAEF Authenticated Encryption mode
    Elena Andreeva, Amit Singh Bhati, and Damian Vizár
    IACR Cryptol. ePrint Arch., 2021

2020

  1. SAC
    Interpolation Cryptanalysis of UFNs with Low Degree Round Functions
    Arnab Roy, Elena Andreeva, and Ferdinand Sauer
    In Selected Areas in Cryptography - SAC, 2020
  2. SAC
    Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
    Elena Andreeva, Amit Singh Bhati, and Damian Vizár
    In Selected Areas in Cryptography - SAC, 2020
  3. CARDIS
    Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE
    Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, and 2 more authors
    In CARDIS , 2020

2019

  1. ASIACRYPT
    Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages
    Elena Andreeva, Virginie Lallemand, Antoon Purnal, and 3 more authors
    In Advances in Cryptology - ASIACRYPT 2019 Proceedings, Part II, 2019
  2. NIST LWC
    ForkAE v.1.0
    Elena Andreeva, Virginie Lallemand, Antoon Purnal, and 3 more authors
    In NIST LW Crypto Competition, Currently at Round 2,, 2019

2018

  1. eprint
    Forking a Blockcipher for Authenticated Encryption of Very Short Messages
    Elena Andreeva, Reza Reyhanitabar, Kerem Varici, and 1 more author
    IACR Cryptol. ePrint Arch., 2018

2017

  1. FSE
    Turning Online Ciphers Off
    Elena Andreeva, Guy Barwell, Ritam Bhaumik, and 3 more authors
    IACR Trans. Symmetric Cryptol., 2017
  2. arxiv
    Multiparty Routing: Secure Routing for Mixnets
    Fatemeh Shirazi, Elena Andreeva, Markulf Kohlweiss, and 1 more author
    CoRR, 2017

2016

  1. JoC
    New Second-Preimage Attacks on Hash Functions
    Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, and 5 more authors
    J. Cryptol., 2016

2015

  1. DCC
    Open problems in hash function security
    Elena Andreeva, Bart Mennink, and Bart Preneel
    Des. Codes Cryptogr., 2015
  2. FSE
    Security of Keyed Sponge Constructions Using a Modular Proof Approach
    Elena Andreeva, Joan Daemen, Bart Mennink, and 1 more author
    In FSE, 2015
  3. SAC
    Forgery and Subkey Recovery on CAESAR Candidate iFeed
    Willem Schroé, Bart Mennink, Elena Andreeva, and 1 more author
    In Selected Areas in Cryptography - SAC, 2015

2014

  1. ASIACRYPT
    How to Securely Release Unverified Plaintext in Authenticated Encryption
    Elena Andreeva, Andrey Bogdanov, Atul Luykx, and 3 more authors
    In ASIACRYPT, 2014
  2. FSE
    APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
    Elena Andreeva, Begül Bilgin, Andrey Bogdanov, and 4 more authors
    In FSE , 2014
  3. FSE
    COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
    Elena Andreeva, Atul Luykx, Bart Mennink, and 1 more author
    In FSE , 2014

2013

  1. ASIACRYPT
    Parallelizable and Authenticated Online Ciphers
    Elena Andreeva, Andrey Bogdanov, Atul Luykx, and 3 more authors
    In ASIACRYPT , 2013
  2. CRYPTO
    On the Indifferentiability of Key-Alternating Ciphers
    Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, and 2 more authors
    In CRYPTO , 2013
  3. FSE
    Towards Understanding the Known-Key Security of Block Ciphers
    Elena Andreeva, Andrey Bogdanov, and Bart Mennink
    In FSE, 2013

2012

  1. IJIS
    On security arguments of the second round SHA-3 candidates
    Elena Andreeva, Andrey Bogdanov, Bart Mennink, and 2 more authors
    Int. J. Inf. Sec., 2012
  2. IJIS
    The parazoa family: generalizing the sponge hash functions
    Elena Andreeva, Bart Mennink, and Bart Preneel
    Int. J. Inf. Sec., 2012
  3. AFRICACRYPT
    Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein (best paper award)
    Elena Andreeva, Bart Mennink, Bart Preneel, and 1 more author
    In AFRICACRYPT, 2012
  4. SAC
    Provable Security of BLAKE with Non-ideal Compression Function
    Elena Andreeva, Atul Luykx, and Bart Mennink
    In Selected Areas in Cryptography SAC, 2012
  5. eprint
    Impossibility Results for Indifferentiability with Resets
    Atul Luykx, Elena Andreeva, Bart Mennink, and 1 more author
    IACR Cryptol. ePrint Arch., 2012

2011

  1. IMACC
    The Symbiosis between Collision and Preimage Resistance
    Elena Andreeva, and Martijn Stam
    In Cryptography and Coding - International Conference, IMACC, 2011
  2. SAC
    Provable Chosen-Target-Forced-Midfix Preimage Resistance
    Elena Andreeva, and Bart Mennink
    In Selected Areas in Cryptography SAC, 2011

2010

  1. JIPS
    Security Properties of Domain Extenders for Cryptographic Hash Functions
    Elena Andreeva, Bart Mennink, and Bart Preneel
    J. Inf. Process. Syst., 2010
  2. ISC
    Security Reductions of the Second Round SHA-3 Candidates
    Elena Andreeva, Bart Mennink, and Bart Preneel
    In Information Security ISC , 2010
  3. SCN
    On the Indifferentiability of the Grøstl Hash Function
    Elena Andreeva, Bart Mennink, and Bart Preneel
    In Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings, 2010

2009

  1. SAC
    Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
    Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, and 1 more author
    In Selected Areas in Cryptography SAC, 2009
  2. NIST SHA3
    The Lane hash function
    Sebastiaan Indesteege, Elena Andreeva, Christophe De Cannière, and 5 more authors
    In Symmetric Cryptography Proceedings, 2009

2008

  1. EUROCRYPT
    Second Preimage Attacks on Dithered Hash Functions
    Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, and 4 more authors
    In EUROCRYPT , 2008
  2. SAC
    A Three-Property-Secure Hash Function
    Elena Andreeva, and Bart Preneel
    In Selected Areas in Cryptography SAC, 2008

2007

  1. ASIACRYPT
    Seven-Property-Preserving Iterated Hashing: ROX
    Elena Andreeva, Gregory Neven, Bart Preneel, and 1 more author
    In ASIACRYPT , 2007