Elena Andreeva


Ontology type: schema:Person     


Person Info

NAME

Elena

SURNAME

Andreeva

Publications in SciGraph latest 50 shown

  • 2021-07-21 Nonce-Misuse Security of the SAEF Authenticated Encryption Mode in SELECTED AREAS IN CRYPTOGRAPHY
  • 2021-06-16 Compactness of Hashing Modes and Efficiency Beyond Merkle Tree in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2021
  • 2021-01-29 Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE in SMART CARD RESEARCH AND ADVANCED APPLICATIONS
  • 2019-11-22 Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2019
  • 2016 Forgery and Subkey Recovery on CAESAR Candidate iFeed in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2015
  • 2015-08-12 Security of Keyed Sponge Constructions Using a Modular Proof Approach in FAST SOFTWARE ENCRYPTION
  • 2015-06-23 New Second-Preimage Attacks on Hash Functions in JOURNAL OF CRYPTOLOGY
  • 2015-05-28 Open problems in hash function security in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-04-19 COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse in FAST SOFTWARE ENCRYPTION
  • 2015-04-19 APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography in FAST SOFTWARE ENCRYPTION
  • 2014-07-08 Towards Understanding the Known-Key Security of Block Ciphers in FAST SOFTWARE ENCRYPTION
  • 2014 How to Securely Release Unverified Plaintext in Authenticated Encryption in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2013 Provable Security of BLAKE with Non-ideal Compression Function in SELECTED AREAS IN CRYPTOGRAPHY
  • 2013 On the Indifferentiability of Key-Alternating Ciphers in ADVANCES IN CRYPTOLOGY – CRYPTO 2013
  • 2013 Parallelizable and Authenticated Online Ciphers in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013
  • 2012-02-11 On security arguments of the second round SHA-3 candidates in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2012-02-05 The parazoa family: generalizing the sponge hash functions in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2012 Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein in PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2012
  • 2012 Provable Chosen-Target-Forced-Midfix Preimage Resistance in SELECTED AREAS IN CRYPTOGRAPHY
  • 2011 Security Reductions of the Second Round SHA-3 Candidates in INFORMATION SECURITY
  • 2011 The Symbiosis between Collision and Preimage Resistance in CRYPTOGRAPHY AND CODING
  • 2010 On the Indifferentiability of the Grøstl Hash Function in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2009 Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård in SELECTED AREAS IN CRYPTOGRAPHY
  • 2009 A Three-Property-Secure Hash Function in SELECTED AREAS IN CRYPTOGRAPHY
  • 2008-01-01 Second Preimage Attacks on Dithered Hash Functions in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2008
  • 2007-01-01 Seven-Property-Preserving Iterated Hashing: ROX in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2007
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.5329.d", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.5596.f", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.56912.39", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.7520.0", 
            "type": "Organization"
          }
        ], 
        "familyName": "Andreeva", 
        "givenName": "Elena", 
        "id": "sg:person.010624232445.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010624232445.91"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-12-01T07:11", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/person/person_3809.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.010624232445.91'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.010624232445.91'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.010624232445.91'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.010624232445.91'


     




    Preview window. Press ESC to close (or click here)


    ...