Detailed bibliographical information about my publications can be found on my google scholar and DBLP pages. 

PUE Schemes: Efficient Updatable Encryption with Robust Security From Symmetric Primitives

Andreas Weninger and Elena Andreeva
AsiaCCS, 2026


Breaking the IEEE Encryption Stdanrd XCB-AES in Two Queries

Amit Singh Bhati and Elena Andreeva
CRYPTO, 2025


Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs             

Amit Singh Bhati, Elena Andreeva, Simon Müller, Damian Vizár                      

CANS, 2025 (also peer-reviewed and presented without proceedings at ArcticCrypt, 2025)


Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs

Elena Andreeva, Amit Singh Bhati, Andreas Weninger

SAC, 2025


On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing

Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, Stefano Trevisani
IEEE CSF (IEEE Computer Security Foundations Symposium), 2024


Skye: An Expanding PRF based Fast KDF and its Applications

Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, Bart Preneel
ACM ASIACCS (ACM ASIA Conference on Computer and Communications Security), 2024


Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function

Elena Andreeva, Benoît Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy
ACNS (International Conference on Applied Cryptography and Network Security), 2024


OAE-RUP: A Strong Online AEAD Security Notion and Its Application to SAEF

Amit Singh Bhati, Elena Andreeva, Damian Vizár

SCN (International Conference on Security and Cryptography for Networks), 2024

A TPRF Pseudo-Random Number Generator
Elena Andreeva and Andreas Weninger
JSSS (Journal of Surveillance, Security and Safety), 2024

The COLM Authenticated Encryption Scheme

Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda
JoC, (Journal of Cryptology), 2024

Let’s Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation
Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, and Bart Preneel
ACM CCS (ACM SIGSAC Conference on Computer and Communications Security), 2023

A Forkcipher-Based Pseudo-Random Number Generator
Elena Andreeva and Andreas Weninger
ACNS (International Conference on Applied Cryptography and Network Security), 2023

Quantum Cryptanalysis of Farfalle and (Generalised) Feistel Network
Samir Hodzic, Arnab Roy, and Elena Andreeva
DCC (Designs, Codes and Cryptography Journal), 2023

Compactness of Hashing Modes and Efficiency Beyond Merkle Tree
Elena Andreeva, Rishiraj Bhattacharyya, and Arnab Roy
EUROCRYPT (International Conference on the Theory and Applications of Cryptographic Techniques), 2021

1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
Elena Andreeva, Amit Singh Bhati, Bart Preneel, and Damian Vizár
ToSC, (IACR Transactions in Symmetric Cryptology, former FSE), 2021

Interpolation Cryptanalysis of UFNs with Low Degree Round Functions
Arnab Roy, Elena Andreeva, and Ferdinand Sauer
SAC (International Conference on Selected Areas in Cryptography), 2020

Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
Elena Andreeva, Amit Singh Bhati, and Damian Vizár
SAC (International Conference on Selected Areas in Cryptography), 2020

Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE
Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, Angshuman Karmakar, and Antoon Purnal
CARDIS, (Smart Card Research and Advanced Application Conference) 2020

Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages
Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, and Damian Vizár
ASIACRYPT (International Conference on the Theory and Application of Cryptology and Information Security), 2019

ForkAE v.1.0
Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, and Damian Vizár
NIST LW AEAD Competition, Round 2, 2019

Forking a Blockcipher for Authenticated Encryption of Very Short Messages
Elena Andreeva, Reza Reyhanitabar, Kerem Varici, and Damian Vizár
IACR Cryptol. ePrint Arch., 2018

Turning Online Ciphers Off
Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, DanPage, and Martijn Stam
ToSC, (IACR Transactions in Symmetric Cryptology, former FSE), 2017

Multiparty Routing: Secure Routing for Mixnets
Fatemeh Shirazi, Elena Andreeva, Markulf Kohlweiss, and Claudia Diaz
CoRR, 2017

New Second-Preimage Attacks on Hash Functions
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan Hoch, John Kelsey, Adi Shamir, and Sébastien Zimmer
JoC (Journal of Cryptology), 2016

Open problems in hash function security
Elena Andreeva, Bart Mennink, and Bart Preneel
DCC (Designs, Codes and Cryptography Journal), 2015

Security of Keyed Sponge Constructions Using a Modular Proof Approach
Elena Andreeva, Joan Daemen, Bart Mennink, and Gilles Van Assche
FSE (Fast Software Encryption Conference), 2015

Forgery and Subkey Recovery on CAESAR Candidate iFeed
Willem Schroé, Bart Mennink, Elena Andreeva, and Bart Preneel
SAC (International Conference on Selected Areas in Cryptography), 2015

How to Securely Release Unverified Plaintext in Authenticated Encryption
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, and Kan Yasuda
ASIACRYPT (International Conference on the Theory and Application of Cryptology and Information Security), 2014

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, and Kan Yasuda
FSE (Fast Software Encryption Conference), 2014

COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
Elena Andreeva, Atul Luykx, Bart Mennink, and Kan Yasuda
FSE (Fast Software Encryption Conference), 2014

Parallelizable and Authenticated Online Ciphers
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, and Kan Yasuda
ASIACRYPT, (International Conference on the Theory and Application of Cryptology and Information Security), 2013

On the Indifferentiability of Key-Alternating Ciphers
Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, and John P. Steinberger
CRYPTO (International Cryptology Conference) 2013

Towards Understanding the Known-Key Security of Block Ciphers
Elena Andreeva, Andrey Bogdanov, and Bart Mennink
FSE (Fast Software Encryption Conference), 2013

On security arguments of the second round SHA-3 candidates
Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, and Christian Rechberger
IJIS (International Journal of Information Security), 2012

The parazoa family: generalizing the sponge hash functions
Elena Andreeva, Bart Mennink, and Bart Preneel
IJIS (International Journal of Information Security), 2012

Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein (best paper award)
Elena Andreeva, Bart Mennink, Bart Preneel, and Marjan Škrobot 
AFRICACRYPT (International Conference on the Theory and Applications of Cryptology), 2012

Provable Security of BLAKE with Non-ideal Compression Function
Elena Andreeva, Atul Luykx, and Bart Mennink
SAC (International Conference on Selected Areas in Cryptography), 2012

Impossibility Results for Indifferentiability with Resets
Atul Luykx, Elena Andreeva, Bart Mennink, and Bart Preneel
IACR Cryptol. ePrint Arch., 2012

The Symbiosis between Collision and Preimage Resistance
Elena Andreeva, and Martijn Stam
IMACC (IMA International Conference on Cryptography and Coding), 2011

Provable Chosen-Target-Forced-Midfix Preimage Resistance
Elena Andreeva, and Bart Mennink
SAC (International Conference on Selected Areas in Cryptography), 2011

Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva, Bart Mennink, and Bart Preneel
ISC (International Information Security Conference), 2011

Security Properties of Domain Extenders for Cryptographic Hash Functions
Elena Andreeva, Bart Mennink, and Bart Preneel
JIPS (Journal of Information Processing Systems 6), 2010

On the Indifferentiability of the Grøstl Hash Function
Elena Andreeva, Bart Mennink, and Bart Preneel
SCN (International Conference on Security and Cryptography for Networks), 2010

Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, and John Kelsey
SAC (International Conference on Selected Areas in Cryptography), 2009

The Lane hash function
Sebastiaan Indesteege, Elena Andreeva, Christophe De Cannière, OrrDunkelman, Emilia Kasper, Svetla Nikova, Bart Preneel, and ElmarTischhauser
NIST Hash Function Competition, 2009

Second Preimage Attacks on Dithered Hash Functions
Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, and Sebastien Zimmer
EUROCRYPT (International Conference on the Theory and Applications of Cryptographic Techniques), 2008

A Three-Property-Secure Hash Function
Elena Andreeva, and Bart Preneel
SAC (International Conference on Selected Areas in Cryptography), 2008

Seven-Property-Preserving Iterated Hashing: ROX
Elena Andreeva, Gregory Neven, Bart Preneel, and Thomas Shrimpton
ASIACRYPT (International Conference on the Theory and Application of Cryptology and Information Security), 2007