Detailed bibliographical information about my publications can be found on my google scholar and DBLP pages.
PUE Schemes: Efficient Updatable Encryption with Robust Security From Symmetric Primitives
Andreas Weninger and Elena Andreeva
AsiaCCS, 2026
Breaking the IEEE Encryption Stdanrd XCB-AES in Two Queries
Amit Singh Bhati and Elena Andreeva
CRYPTO, 2025
Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs
Amit Singh Bhati, Elena Andreeva, Simon Müller, Damian Vizár
CANS, 2025 (also peer-reviewed and presented without proceedings at ArcticCrypt, 2025)
Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs
Elena Andreeva, Amit Singh Bhati, Andreas Weninger
SAC, 2025
On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing
Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, Stefano Trevisani
IEEE CSF (IEEE Computer Security Foundations Symposium), 2024
Skye: An Expanding PRF based Fast KDF and its Applications
Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, Bart Preneel
ACM ASIACCS (ACM ASIA Conference on Computer and Communications Security), 2024
Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function
Elena Andreeva, Benoît Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy
ACNS (International Conference on Applied Cryptography and Network Security), 2024
OAE-RUP: A Strong Online AEAD Security Notion and Its Application to SAEF
Amit Singh Bhati, Elena Andreeva, Damian Vizár
SCN (International Conference on Security and Cryptography for Networks), 2024
A TPRF Pseudo-Random Number Generator
Elena Andreeva and Andreas Weninger
JSSS (Journal of Surveillance, Security and Safety), 2024
The COLM Authenticated Encryption Scheme
Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda
JoC, (Journal of Cryptology), 2024
Let’s Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation
Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, and Bart Preneel
ACM CCS (ACM SIGSAC Conference on Computer and Communications Security), 2023
A Forkcipher-Based Pseudo-Random Number Generator
Elena Andreeva and Andreas Weninger
ACNS (International Conference on Applied Cryptography and Network Security), 2023
Quantum Cryptanalysis of Farfalle and (Generalised) Feistel Network
Samir Hodzic, Arnab Roy, and Elena Andreeva
DCC (Designs, Codes and Cryptography Journal), 2023
Compactness of Hashing Modes and Efficiency Beyond Merkle Tree
Elena Andreeva, Rishiraj Bhattacharyya, and Arnab Roy
EUROCRYPT (International Conference on the Theory and Applications of Cryptographic Techniques), 2021
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
Elena Andreeva, Amit Singh Bhati, Bart Preneel, and Damian Vizár
ToSC, (IACR Transactions in Symmetric Cryptology, former FSE), 2021
Interpolation Cryptanalysis of UFNs with Low Degree Round Functions
Arnab Roy, Elena Andreeva, and Ferdinand Sauer
SAC (International Conference on Selected Areas in Cryptography), 2020
Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
Elena Andreeva, Amit Singh Bhati, and Damian Vizár
SAC (International Conference on Selected Areas in Cryptography), 2020
Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE
Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, Angshuman Karmakar, and Antoon Purnal
CARDIS, (Smart Card Research and Advanced Application Conference) 2020
Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages
Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, and Damian Vizár
ASIACRYPT (International Conference on the Theory and Application of Cryptology and Information Security), 2019
ForkAE v.1.0
Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, and Damian Vizár
NIST LW AEAD Competition, Round 2, 2019
Forking a Blockcipher for Authenticated Encryption of Very Short Messages
Elena Andreeva, Reza Reyhanitabar, Kerem Varici, and Damian Vizár
IACR Cryptol. ePrint Arch., 2018
Turning Online Ciphers Off
Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, DanPage, and Martijn Stam
ToSC, (IACR Transactions in Symmetric Cryptology, former FSE), 2017
Multiparty Routing: Secure Routing for Mixnets
Fatemeh Shirazi, Elena Andreeva, Markulf Kohlweiss, and Claudia Diaz
CoRR, 2017
New Second-Preimage Attacks on Hash Functions
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan Hoch, John Kelsey, Adi Shamir, and Sébastien Zimmer
JoC (Journal of Cryptology), 2016
Open problems in hash function security
Elena Andreeva, Bart Mennink, and Bart Preneel
DCC (Designs, Codes and Cryptography Journal), 2015
Security of Keyed Sponge Constructions Using a Modular Proof Approach
Elena Andreeva, Joan Daemen, Bart Mennink, and Gilles Van Assche
FSE (Fast Software Encryption Conference), 2015
Forgery and Subkey Recovery on CAESAR Candidate iFeed
Willem Schroé, Bart Mennink, Elena Andreeva, and Bart Preneel
SAC (International Conference on Selected Areas in Cryptography), 2015
How to Securely Release Unverified Plaintext in Authenticated Encryption
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, and Kan Yasuda
ASIACRYPT (International Conference on the Theory and Application of Cryptology and Information Security), 2014
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, and Kan Yasuda
FSE (Fast Software Encryption Conference), 2014
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
Elena Andreeva, Atul Luykx, Bart Mennink, and Kan Yasuda
FSE (Fast Software Encryption Conference), 2014
Parallelizable and Authenticated Online Ciphers
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, and Kan Yasuda
ASIACRYPT, (International Conference on the Theory and Application of Cryptology and Information Security), 2013
On the Indifferentiability of Key-Alternating Ciphers
Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, and John P. Steinberger
CRYPTO (International Cryptology Conference) 2013
Towards Understanding the Known-Key Security of Block Ciphers
Elena Andreeva, Andrey Bogdanov, and Bart Mennink
FSE (Fast Software Encryption Conference), 2013
On security arguments of the second round SHA-3 candidates
Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, and Christian Rechberger
IJIS (International Journal of Information Security), 2012
The parazoa family: generalizing the sponge hash functions
Elena Andreeva, Bart Mennink, and Bart Preneel
IJIS (International Journal of Information Security), 2012
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein (best paper award)
Elena Andreeva, Bart Mennink, Bart Preneel, and Marjan Škrobot
AFRICACRYPT (International Conference on the Theory and Applications of Cryptology), 2012
Provable Security of BLAKE with Non-ideal Compression Function
Elena Andreeva, Atul Luykx, and Bart Mennink
SAC (International Conference on Selected Areas in Cryptography), 2012
Impossibility Results for Indifferentiability with Resets
Atul Luykx, Elena Andreeva, Bart Mennink, and Bart Preneel
IACR Cryptol. ePrint Arch., 2012
The Symbiosis between Collision and Preimage Resistance
Elena Andreeva, and Martijn Stam
IMACC (IMA International Conference on Cryptography and Coding), 2011
Provable Chosen-Target-Forced-Midfix Preimage Resistance
Elena Andreeva, and Bart Mennink
SAC (International Conference on Selected Areas in Cryptography), 2011
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva, Bart Mennink, and Bart Preneel
ISC (International Information Security Conference), 2011
Security Properties of Domain Extenders for Cryptographic Hash Functions
Elena Andreeva, Bart Mennink, and Bart Preneel
JIPS (Journal of Information Processing Systems 6), 2010
On the Indifferentiability of the Grøstl Hash Function
Elena Andreeva, Bart Mennink, and Bart Preneel
SCN (International Conference on Security and Cryptography for Networks), 2010
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, and John Kelsey
SAC (International Conference on Selected Areas in Cryptography), 2009
The Lane hash function
Sebastiaan Indesteege, Elena Andreeva, Christophe De Cannière, OrrDunkelman, Emilia Kasper, Svetla Nikova, Bart Preneel, and ElmarTischhauser
NIST Hash Function Competition, 2009
Second Preimage Attacks on Dithered Hash Functions
Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, and Sebastien Zimmer
EUROCRYPT (International Conference on the Theory and Applications of Cryptographic Techniques), 2008
A Three-Property-Secure Hash Function
Elena Andreeva, and Bart Preneel
SAC (International Conference on Selected Areas in Cryptography), 2008
Seven-Property-Preserving Iterated Hashing: ROX
Elena Andreeva, Gregory Neven, Bart Preneel, and Thomas Shrimpton
ASIACRYPT (International Conference on the Theory and Application of Cryptology and Information Security), 2007