Ludmila K. Babenko

Orcid: 0000-0003-2353-7911

According to our database1, Ludmila K. Babenko authored at least 32 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Homomorphic operations on integers via operations on bits.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

2021
Development of the algorithm to ensure the protection of confidential data in cloud medical information system.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

2020
Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

2019
Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediaries.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Investigation of the different implementations for the new cipher Qamal.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

E-Voting System Based on Multiple Ballot Casting.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Automated Verification of Cryptographic Protocol Implementations.
Proceedings of the 12th International Conference on Developments in eSystems Engineering, 2019

2018
Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic Encryption.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Development of method for malware classification based on statistical methods and an extended set of system calls data.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
Differential ananlysis of 3 round Kuznyechik.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Two simplified versions of Kuznyechik cipher (GOST R 34.12-2015).
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Malware detection by meta-information of used system functions.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2016
Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block Ciphers.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Modeling of Algebraic Analysis of GOST+ Cipher in SageMath.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

2015
Cryptanalysis of factoring-based fully homomorphic encryption.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

The general model of secure computation system.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2014
Known Plaintexts Attack on Polynomial based Homomorphic Encryption.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Instrumental System for Analysis of Information Systems Using Smart Cards Protection.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
Development the method of detection the malicious pages interconnection in the internet.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Performance analysis of the developed mandatory access control system in the DBMS.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysis.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Analysis of GOST 28147-89 security: methods and algorithms.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2012
Classification of polymorphic and metamorphic malware samples based on their behavior.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Research about strength of GOST 28147-89 encryption algorithm.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

2011
Algebraic analysis of GOST encryption algorithm.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

2010
Differential analysis of GOST encryption algorithm.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

2009
Research and Education Activities of the Department of Security of Information Technologies of Taganrog Institute of Technology of the Southern Federal University in the Field of Information Security.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

A model of mandatory access for current database management systems.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

2001
Parallel SPMD-Tasks Graph Description Language for Network Clusters.
Proceedings of the Parallel Computing Technologies, 2001

Mechanisms of Parallel Computing Organization for NeuroCluster.
Proceedings of the Parallel Computing Technologies, 2001


  Loading...