default search action
Alla Levina
Person information
- affiliation: Saint Petersburg National Research University of Information Technologies, Mechanics and Optics, Russia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Alla Levina, Andrei Semenov:
Jump-Based Backup: An Efficient Data Backup. MECO 2024: 1-4 - [c23]Nawras H. Sabbry, Alla Levina:
Elliptic Curve Cryptography on Constrained Devices: A Comparative Study of Point Multiplication Methods. MECO 2024: 1-5 - [c22]Eugene Snopok, Alla Levina, Nicolas Sklavos:
On the Efficiency of Adding Redundancy in Disk Arrays, using Nonlinear Codes. MOCAST 2024: 1-4 - 2023
- [j5]Alla Levina, Victor Kadykov, Maheswara Rao Valluri:
Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes. IEEE Access 11: 109939-109952 (2023) - [c21]Andrey Plotnikov, Alla Levina:
Algorithm for simplifying the SHA-256 operations tree. CSR 2023: 592-597 - [c20]Alla Levina, Andrew Plotnikov, Efim Ashmarov:
New Method of Hash Functions Analysis. MECO 2023: 1-5 - 2022
- [j4]Alla Levina, Daniyar Mukhamedjanov, Danil Bogaevskiy, Pavel Alekseevich Lyakhov, Maria V. Valueva, Dmitrii I. Kaplun:
High Performance Parallel Pseudorandom Number Generator on Cellular Automata. Symmetry 14(9): 1869 (2022) - [c19]Alla Levina, Ivan Kamnev:
Protection Metric Model of White-Box Algorithms. MECO 2022: 1-3 - [c18]Vladmir Varuikhin, Alla Levina:
Steganographic Information Hiding Method Based on Double Wavelet Transform. MECO 2022: 1-5 - 2021
- [c17]Victor Kadykov, Alla Levina:
Homomorphic Properties Within Lattice-Based Encryption Systems. MECO 2021: 1-4 - [c16]Alla Levina, Ivan Kamnev, Igor A. Zikratov:
Implementation White-Box Cryptography for Elliptic Curve Cryptography. MECO 2021: 1-4 - [c15]Vladimir Gustov, Alla Levina:
Electromagnetic Fields as a Sign of Side-Channel Attacks in GSM Module. NTMS 2021: 1-5 - 2020
- [c14]Alla Levina, Ivan Kamnev, Igor A. Zikratov:
Implementation White Box Cryptography in Substitution-Permutation network. MECO 2020: 1-3 - [c13]Alla Levina, Nikolay A. Moldovyan, Gleb Ryaskin, Igor A. Zikratov:
Switchable Controlled Operations with Bent Functions. MECO 2020: 1-5 - [c12]Vladmir Varuikhin, Alla Levina:
Steganographic Information Hiding Method based on Continuous Wavelet Transform. MECO 2020: 1-4
2010 – 2019
- 2019
- [j3]Alla Levina, Roman Mostovoi, Daria Sleptsova, Lavrentii Tcvetkov:
Physical model of sensitive data leakage from PC-based cryptographic systems. J. Cryptogr. Eng. 9(4): 393-400 (2019) - [c11]Alla Levina, Gleb Ryaskin, Igor A. Zikratov:
Spline-Wavelet Bent Robust Codes. FedCSIS 2019: 227-230 - 2018
- [c10]Alla Levina, Daniyar Mukhamedjanov, Gleb Ryaskin, Dmitrij Kaplun:
Improving pseudorandom generator on cellular automata with bent functions. FedCSIS 2018: 381-385 - 2017
- [j2]Aleksandr Ometov, Alla Levina, Pavel Borisenko, Roman Mostovoy, Antonino Orsino, Sergey Andreev:
Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges. IEEE Access 5: 2591-2601 (2017) - [j1]Alla Levina, Sergey V. Taranov:
Creation of codes based on wavelet transformation and its application in ADV612 chips. Int. J. Wavelets Multiresolution Inf. Process. 15(2): 1750014:1-1750014:16 (2017) - [c9]Vladislav Grozin, Alla Levina:
Similar Product Clustering for Long-Tail Cross-Sell Recommendations. AIST (Supplement) 2017: 273-280 - [c8]Alla Levina, Pavel Borisenko, Roman Mostovoy:
SCA as mobile security threat. FRUCT 2017: 236-241 - [c7]Nikolai A. Moldovyan, Alla Levina, Sergey V. Taranov:
Symmetric encryption for error correction. FRUCT 2017: 290-295 - 2016
- [c6]Alla Levina, Daria Sleptsova, Oleg Zaitsev:
Side-channel attacks and machine learning approach. FRUCT 2016: 181-186 - [c5]Alla Levina, Sergey V. Taranov:
New construction of algebraic manipulation detection codes based on wavelet transform. FRUCT 2016: 187-192 - [c4]Aleksandr Ometov, Sergey Andreev, Alla Levina, Sergey Bezzateev:
Optimizing Network-Assisted WLAN Systems with Aggressive Channel Utilization. NEW2AN 2016: 217-229 - 2015
- [c3]Alla Levina, Sergey V. Taranov:
Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and its Application. C2SI 2015: 247-258 - [c2]Alla Levina, Sergey V. Taranov:
Second-Order Spline-Wavelet Robust Code under Non-Uniform Codeword Distribution. SCSE 2015: 297-302 - 2014
- [c1]Alla Levina, Ilya Kuzmin, Sergey V. Taranov:
Reed solomon codes and its application for cloud storage system. FGCT 2014: 46-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint