Elena Andreeva

From MaRDI portal
Revision as of 01:36, 11 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Elena Andreeva to Elena Andreeva: Duplicate)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:321296

Available identifiers

zbMath Open andreeva.elena-anatolevnaMaRDI QIDQ321296

List of research outcomes

PublicationDate of PublicationType
The COLM Authenticated Encryption Scheme2024-04-21Paper
Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions2022-03-25Paper
Nonce-misuse security of the SAEF authenticated encryption mode2022-03-25Paper
Compactness of hashing modes and efficiency beyond Merkle tree2021-12-08Paper
Forkcipher: a new primitive for authenticated encryption of very short messages2020-05-05Paper
О дрейфе и эффекте памяти нелинейно-упругой деформации вследствие ползучести для микронеоднородных материалов в условиях одноосного напряженного состояния2020-04-03Paper
Структурная модель ползучести нелинейно-упругого микронеоднородного материала в условиях сложного напряженного состояния2020-04-03Paper
Решение одномерных задач пластичности для разупрочняющегося материала2020-03-28Paper
New second-preimage attacks on hash functions2016-10-13Paper
Forgery and Subkey Recovery on CAESAR Candidate iFeed2016-05-19Paper
Provable Security of BLAKE with Non-ideal Compression Function2015-12-04Paper
Open problems in hash function security2015-10-26Paper
Towards Understanding the Known-Key Security of Block Ciphers2015-09-18Paper
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography2015-09-18Paper
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse2015-09-18Paper
Security of Keyed Sponge Constructions Using a Modular Proof Approach2015-09-18Paper
How to Securely Release Unverified Plaintext in Authenticated Encryption2015-01-16Paper
Parallelizable and Authenticated Online Ciphers2013-12-10Paper
On the Indifferentiability of Key-Alternating Ciphers2013-09-02Paper
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein2012-07-23Paper
Provable Chosen-Target-Forced-Midfix Preimage Resistance2012-06-08Paper
Temperature dependence of the spin susceptibility of layered cuprates in the pseudogap phase: comparison with the Knight shift data for the \(\text{Cu}(2)\) site in \(\text{YBa}_{2}\text{Cu}_{4}\text{O}_{8}\) and \(\text{Bi}_{2}\text{Sr}_{2}\text{CaCu}_{2}\text{O}_{8 + x}\)2012-02-28Paper
The Symbiosis between Collision and Preimage Resistance2011-12-16Paper
Security Reductions of the Second Round SHA-3 Candidates2011-02-11Paper
On the Indifferentiability of the Grøstl Hash Function2010-09-10Paper
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård2009-12-09Paper
A Three-Property-Secure Hash Function2009-11-03Paper
Seven-Property-Preserving Iterated Hashing: ROX2008-05-15Paper
Second Preimage Attacks on Dithered Hash Functions2008-04-15Paper
https://portal.mardi4nfdi.de/entity/Q56956812005-10-13Paper
https://portal.mardi4nfdi.de/entity/Q53170122005-09-15Paper
https://portal.mardi4nfdi.de/entity/Q27344622001-08-14Paper
https://portal.mardi4nfdi.de/entity/Q42498202001-03-01Paper
https://portal.mardi4nfdi.de/entity/Q40026001993-01-23Paper
https://portal.mardi4nfdi.de/entity/Q39759101992-06-26Paper
Sufficient optimality conditions for a discontinuous optimal control problem with delay1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33592861989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q34968261989-01-01Paper
Optimal control of systems with delayed argument1987-01-01Paper
Spectral methods of analyzing electromyograms in diagnosing motor disorders1983-01-01Paper
Calculation of static characteristics of nozzle-baffle elements1961-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Elena Andreeva