publications

Detailed bibliographical information about my publications can be found on my google scholar and DBLP pages.

2021

  1. EUROCRYPT
    Compactness of Hashing Modes and Efficiency Beyond Merkle Tree
    Andreeva, Elena, Bhattacharyya, Rishiraj, and Roy, Arnab
    In EUROCRYPT 2021
  2. FSE
    1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
    Andreeva, Elena, Bhati, Amit Singh, Preneel, Bart, and Vizár, Damian
    IACR Trans. Symmetric Cryptol. 2021
  3. eprint
    RUP Security of the SAEF Authenticated Encryption mode
    Andreeva, Elena, Bhati, Amit Singh, and Vizár, Damian
    IACR Cryptol. ePrint Arch. 2021

2020

  1. SAC
    Interpolation Cryptanalysis of UFNs with Low Degree Round Functions
    Roy, Arnab, Andreeva, Elena, and Sauer, Ferdinand
    In Selected Areas in Cryptography - SAC 2020
  2. SAC
    Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
    Andreeva, Elena, Bhati, Amit Singh, and Vizár, Damian
    In Selected Areas in Cryptography - SAC 2020
  3. CARDIS
    Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE
    Deprez, Arne, Andreeva, Elena, Mera, Jose Maria Bermudo, Karmakar, Angshuman, and Purnal, Antoon
    In CARDIS 2020

2019

  1. ASIACRYPT
    Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages
    Andreeva, Elena, Lallemand, Virginie, Purnal, Antoon, Reyhanitabar, Reza, Roy, Arnab, and Vizár, Damian
    In Advances in Cryptology - ASIACRYPT 2019 Proceedings, Part II 2019
  2. NIST LWC
    ForkAE v.1.0
    Andreeva, Elena, Lallemand, Virginie, Purnal, Antoon, Reyhanitabar, Reza, Roy, Arnab, and Vizár, Damian
    In NIST LW Crypto Competition, Currently at Round 2, 2019

2018

  1. eprint
    Forking a Blockcipher for Authenticated Encryption of Very Short Messages
    Andreeva, Elena, Reyhanitabar, Reza, Varici, Kerem, and Vizár, Damian
    IACR Cryptol. ePrint Arch. 2018

2017

  1. FSE
    Turning Online Ciphers Off
    Andreeva, Elena, Barwell, Guy, Bhaumik, Ritam, Nandi, Mridul, Page, Dan, and Stam, Martijn
    IACR Trans. Symmetric Cryptol. 2017
  2. arxiv
    Multiparty Routing: Secure Routing for Mixnets
    Shirazi, Fatemeh, Andreeva, Elena, Kohlweiss, Markulf, and Dı́az, Claudia
    CoRR 2017

2016

  1. JoC
    New Second-Preimage Attacks on Hash Functions
    Andreeva, Elena, Bouillaguet, Charles, Dunkelman, Orr, Fouque, Pierre-Alain, Hoch, Jonathan J., Kelsey, John, Shamir, Adi, and Zimmer, Sébastien
    J. Cryptol. 2016

2015

  1. DCC
    Open problems in hash function security
    Andreeva, Elena, Mennink, Bart, and Preneel, Bart
    Des. Codes Cryptogr. 2015
  2. FSE
    Security of Keyed Sponge Constructions Using a Modular Proof Approach
    Andreeva, Elena, Daemen, Joan, Mennink, Bart, and Assche, Gilles Van
    In FSE 2015
  3. SAC
    Forgery and Subkey Recovery on CAESAR Candidate iFeed
    Schroé, Willem, Mennink, Bart, Andreeva, Elena, and Preneel, Bart
    In Selected Areas in Cryptography - SAC 2015

2014

  1. ASIACRYPT
    How to Securely Release Unverified Plaintext in Authenticated Encryption
    Andreeva, Elena, Bogdanov, Andrey, Luykx, Atul, Mennink, Bart, Mouha, Nicky, and Yasuda, Kan
    In ASIACRYPT 2014
  2. FSE
    APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
    Andreeva, Elena, Bilgin, Begül, Bogdanov, Andrey, Luykx, Atul, Mennink, Bart, Mouha, Nicky, and Yasuda, Kan
    In FSE 2014
  3. FSE
    COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
    Andreeva, Elena, Luykx, Atul, Mennink, Bart, and Yasuda, Kan
    In FSE 2014

2013

  1. ASIACRYPT
    Parallelizable and Authenticated Online Ciphers
    Andreeva, Elena, Bogdanov, Andrey, Luykx, Atul, Mennink, Bart, Tischhauser, Elmar, and Yasuda, Kan
    In ASIACRYPT 2013
  2. CRYPTO
    On the Indifferentiability of Key-Alternating Ciphers
    Andreeva, Elena, Bogdanov, Andrey, Dodis, Yevgeniy, Mennink, Bart, and Steinberger, John P.
    In CRYPTO 2013
  3. FSE
    Towards Understanding the Known-Key Security of Block Ciphers
    Andreeva, Elena, Bogdanov, Andrey, and Mennink, Bart
    In FSE 2013

2012

  1. IJIS
    On security arguments of the second round SHA-3 candidates
    Andreeva, Elena, Bogdanov, Andrey, Mennink, Bart, Preneel, Bart, and Rechberger, Christian
    Int. J. Inf. Sec. 2012
  2. IJIS
    The parazoa family: generalizing the sponge hash functions
    Andreeva, Elena, Mennink, Bart, and Preneel, Bart
    Int. J. Inf. Sec. 2012
  3. AFRICACRYPT
    Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein (best paper award)
    Andreeva, Elena, Mennink, Bart, Preneel, Bart, and Skrobot, Marjan
    In AFRICACRYPT 2012
  4. SAC
    Provable Security of BLAKE with Non-ideal Compression Function
    Andreeva, Elena, Luykx, Atul, and Mennink, Bart
    In Selected Areas in Cryptography SAC 2012
  5. eprint
    Impossibility Results for Indifferentiability with Resets
    Luykx, Atul, Andreeva, Elena, Mennink, Bart, and Preneel, Bart
    IACR Cryptol. ePrint Arch. 2012

2011

  1. IMACC
    The Symbiosis between Collision and Preimage Resistance
    Andreeva, Elena, and Stam, Martijn
    In Cryptography and Coding - International Conference, IMACC 2011
  2. SAC
    Provable Chosen-Target-Forced-Midfix Preimage Resistance
    Andreeva, Elena, and Mennink, Bart
    In Selected Areas in Cryptography SAC 2011

2010

  1. JIPS
    Security Properties of Domain Extenders for Cryptographic Hash Functions
    Andreeva, Elena, Mennink, Bart, and Preneel, Bart
    J. Inf. Process. Syst. 2010
  2. ISC
    Security Reductions of the Second Round SHA-3 Candidates
    Andreeva, Elena, Mennink, Bart, and Preneel, Bart
    In Information Security ISC 2010
  3. SCN
    On the Indifferentiability of the Grøstl Hash Function
    Andreeva, Elena, Mennink, Bart, and Preneel, Bart
    In Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings 2010

2009

  1. SAC
    Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
    Andreeva, Elena, Bouillaguet, Charles, Dunkelman, Orr, and Kelsey, John
    In Selected Areas in Cryptography SAC 2009
  2. NIST SHA3
    The Lane hash function
    Indesteege, Sebastiaan, Andreeva, Elena, Cannière, Christophe De, Dunkelman, Orr, Käsper, Emilia, Nikova, Svetla, Preneel, Bart, and Tischhauser, Elmar
    In Symmetric Cryptography Proceedings 2009

2008

  1. EUROCRYPT
    Second Preimage Attacks on Dithered Hash Functions
    Andreeva, Elena, Bouillaguet, Charles, Fouque, Pierre-Alain, Hoch, Jonathan J., Kelsey, John, Shamir, Adi, and Zimmer, Sébastien
    In EUROCRYPT 2008
  2. SAC
    A Three-Property-Secure Hash Function
    Andreeva, Elena, and Preneel, Bart
    In Selected Areas in Cryptography SAC 2008

2007

  1. ASIACRYPT
    Seven-Property-Preserving Iterated Hashing: ROX
    Andreeva, Elena, Neven, Gregory, Preneel, Bart, and Shrimpton, Thomas
    In ASIACRYPT 2007