Bicliques for preimages: attacks on Skein-512 and the SHA-2 family D Khovratovich, C Rechberger, A Savelieva International Workshop on Fast Software Encryption, 244-263, 2012 | 209 | 2012 |
Security context management in multi-tenant environments A Savelieva, M Usman, D Eshner, N Ginige US Patent 9,967,319, 2018 | 34 | 2018 |
Abstractive Summarization of Spoken and Written Instructions with BERT A Savelieva, B Au-Yeung, V Ramani KDD 2020 Workshop on Conversational Systems Towards Mainstream Adoption co …, 2020 | 27 | 2020 |
Криптоанализ: современное состояние и перспективы развития СМ Авдошин, АА Савельева Новые технологии, 2007 | 27 | 2007 |
Алгоритм решения систем линейных уравнений в кольцах вычетов СМ Авдошин, АА Савельева Информационные технологии, 50-54, 2006 | 12 | 2006 |
Криптографические методы защиты информационных систем СМ Авдошин, АА Савельева Известия АИН им. АМ Прохорова. Бизнес-информатика 17 (2-С), 91-99, 2006 | 11 | 2006 |
Криптоанализ: вчера, сегодня, завтра С Авдошин, А Савельева Открытые системы. СУБД, 22-25, 2009 | 8 | 2009 |
Cryptanalysis: current state and future trends SM Avdoshin, AA Savelieva Information technologies. Moscow,‘Novye technologii’, in Appendix to, 35, 2007 | 8 | 2007 |
Национальный исследовательский университет «Высшая школа экономики», Москва, Россия. АВ Шариков ББК 60.56 С69, 45, 2023 | 6* | 2023 |
Formal methods and tools for evaluating cryptographic systems security A Savelieva St. Petersburg, ISP RAS, In Proceedings of the Second Spring Young …, 2008 | 4 | 2008 |
Integrating case studies into information security education A Savelieva, S Avdoshin Emerging Trends in Information Systems: Recent Innovations, Results and …, 2016 | 1 | 2016 |
Modeling security threats to cryptographically protected data AA Savelieva Proceedings of the Spring/Summer Young Researchers’ Colloquium on Software …, 2009 | 1 | 2009 |
Using machine-learning methods to facilitate experimental evaluation of modifications to a computational environment within a distributed system A Savelieva, SR Choudam, IR Hegouaburu US Patent 11,669,374, 2023 | | 2023 |
Using machine-learning methods to facilitate experimental evaluation of modifications to a computational environment within a distributed system A Savelieva, SR Choudam, IR Hegouaburu US Patent 11,423,326, 2022 | | 2022 |
Abstractive Summarization of Spoken andWritten Instructions with BERT A Savelieva, B Au-Yeung, V Ramani arXiv preprint arXiv:2008.09676, 2020 | | 2020 |
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family DKC Rechberger, A Savelieva | | 2012 |
Case Studies in Teaching Information Security: Bridging the Gap between Theory and Practice A Savelieva, SM Avdoshin BIR, Satellite Workshops & Doctoral Consortium, 157-168, 2012 | | 2012 |
Formal methods and tools for evaluating cryptographic systems security (Scientific Advisor: Prof. Sergey M. Avdoshin) AA Savelieva Proceedings of the Spring/Summer Young Researchers’ Colloquium on Software …, 2008 | | 2008 |