Alla Levina

Orcid: 0000-0003-4421-2411

Affiliations:
  • Saint Petersburg National Research University of Information Technologies, Mechanics and Optics, Russia


According to our database1, Alla Levina authored at least 26 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes.
IEEE Access, 2023

New Method of Hash Functions Analysis.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

Algorithm for simplifying the SHA-256 operations tree.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
High Performance Parallel Pseudorandom Number Generator on Cellular Automata.
Symmetry, 2022

Steganographic Information Hiding Method Based on Double Wavelet Transform.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

Protection Metric Model of White-Box Algorithms.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

2021
Electromagnetic Fields as a Sign of Side-Channel Attacks in GSM Module.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

Implementation White-Box Cryptography for Elliptic Curve Cryptography.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

Homomorphic Properties Within Lattice-Based Encryption Systems.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

2020
Steganographic Information Hiding Method based on Continuous Wavelet Transform.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

Switchable Controlled Operations with Bent Functions.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

Implementation White Box Cryptography in Substitution-Permutation network.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

2019
Physical model of sensitive data leakage from PC-based cryptographic systems.
J. Cryptogr. Eng., 2019

Spline-Wavelet Bent Robust Codes.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019

2018
Improving pseudorandom generator on cellular automata with bent functions.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

2017
Creation of codes based on wavelet transformation and its application in ADV612 chips.
Int. J. Wavelets Multiresolution Inf. Process., 2017

Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges.
IEEE Access, 2017

Symmetric encryption for error correction.
Proceedings of the 20th Conference of Open Innovations Association, 2017

SCA as mobile security threat.
Proceedings of the 20th Conference of Open Innovations Association, 2017

Similar Product Clustering for Long-Tail Cross-Sell Recommendations.
Proceedings of the Supplementary Proceedings of the Sixth International Conference on Analysis of Images, Social Networks and Texts (AIST 2017), Moscow, Russia, July 27, 2017

2016
Optimizing Network-Assisted WLAN Systems with Aggressive Channel Utilization.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

New construction of algebraic manipulation detection codes based on wavelet transform.
Proceedings of the 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology, 2016

Side-channel attacks and machine learning approach.
Proceedings of the 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology, 2016

2015
Second-Order Spline-Wavelet Robust Code under Non-Uniform Codeword Distribution.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and its Application.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Reed solomon codes and its application for cloud storage system.
Proceedings of the Third International Conference on Future Generation Communication Technologies (FGCT 2014), 2014


  Loading...