PERSONAL INFORMATION

National Technical University “Kharkiv Polytechnic Institute”, Associate Professor of the Department of Cybersecurity, Educational and Scientific Institute of Computer Science and Information Technology
Kyrpychova str. 2, Kharkiv, 61002, Ukraine
+ 380 66 370 5511 +380 96 738 8780
Alla.Havrylova@khpi.edu.ua
Sex Female | Date of birth 24/09/1972
WORK EXPERIENCE
| National Technical University “Kharkiv Polytechnic Institute”, Associate Professor of the Department of Cybersecurity, Educational and Scientific Institute of Computer Science and Information Technology |
| since 2025 |
| Responsible executor in the initiative research work on the topic: “Models and methods of integrity and authenticity control based on the UMAC cascade algorithm” (state registration number 87-2023/09.01.08 dated 01.05.2023) (National Aviation University, Kyiv); Responsible executor in the initiative research work on the topic: “Modeling of socio-cyberphysical systems” (National Technical University “Kharkiv Polytechnic Institute”, Kharkiv) (state registration number 0123U101018 dated 12.02.23); Сonducting training sessions in the academic disciplines of the department; Scientific Secretary of the Specialized Doctoral Council D 64.050.21 in the specialty 05.13.21 – Information Protection Systems. |
| National Technical University “Kharkiv Polytechnic Institute”, Associate Professor of the Department of Cybersecurity, Educational and Scientific Institute of Computer Science and Information Technology |
| 2023 |
| Preparation and defense of a dissertation research for the degree of Doctor of Philosophy in specialty 125 “Cyber security and information protection” – National Aviation University, Ministry of Education and Science of Ukraine, Kyiv, Responsible executor in the initiative research work on the topic: “Models and methods of integrity and authenticity control based on the UMAC cascade algorithm” (state registration number 87-2023/09.01.08 dated 01.05.2023) (National Aviation University, Kyiv); Responsible executor in the initiative research work on the topic: “Modeling of socio-cyberphysical systems” (National Technical University “Kharkiv Polytechnic Institute”, Kharkiv) (state registration number 0123U101018 dated 12.02.23); Сonducting training sessions in the academic disciplines of the department; Сonducting training sessions in the academic disciplines of the department. |
| S. Kuznets Kharkiv National University of Economics, Senior Lecturer of the Department of Cybersecurity and Information Technologies |
| 2019-2021 |
| Conducting a study of the collision properties of generated data integrity and authenticity codes using the UMAC algorithm on McEliece crypto-code constructions with modified elliptical and lossy codes. Development of new and improvement of existing models and methods for ensuring the integrity and authenticity of information circulating in cyberspace in the post-quantum era; received a master’s degree in specialty 125 “Cybersecurity”, program “Administrative Management in the Field of Information Protection”, field of knowledge “Information Technologies” at the Kharkiv National University of Radio Electronics. |
| S. Kuznets Kharkiv National University of Economics, Deputy Dean of the Faculty of Economic Informatics |
| 2017-2018 |
| Senior lecturer at the Department of Information Systems, conducting training classes in the disciplines of the department. |
| S. Kuznets Kharkiv National University of Economics, Associate Professor of the Department of Information Systems |
| 2014-2016 |
| Сonducting training sessions in the academic disciplines of the department. |
| Kharkiv State University of Economics, Associate Professor of the Department of Information Systems |
| 2009-2013 |
| Сonducting training sessions in the academic disciplines of the department. |
| Kharkiv State University of Economics, Lecturer at the Department of Information Systems |
| 2004-2008 |
| Сonducting training sessions in the academic disciplines of the department |
EDUCATION AND TRAINING
| Doctor of Philosophy in specialty 125 – Cyber security and information protection on the topic “Models and methods of integrity and authenticity control based on the UMAC cascade algorithm” |
| – a model for forming a pseudo-random substrate for the UMAC cascade algorithm based on McEliece crypto-code constructions on elliptic codes has been developed, which allows ensuring a level of security (safe time – TB> 200 years, resistance to cryptanalysis RK <1025 group operations), as well as increasing the level of security of security services in the post-quantum cryptoperiod under cyberattack conditions. – a model for forming a pseudo-random substrate for the UMAC cascade algorithm based on McEliece crypto-code constructions on lossy codes has been developed, which allows for practical use in smart technologies with limited computing resources. – a method for ensuring authenticity and integrity based on the cascade UMAC algorithm on McEliece crypto-code constructions with elliptical codes has been proposed, which allows its use in the post-quantum crypto-period – a method for ensuring authenticity and integrity based on the cascade UMAC algorithm on McEliece crypto-code constructions with modified (shortened and/or extended) elliptic codes has been proposed, which allows for a reduction in computational capacity and preservation of resistance to cracking – a method for ensuring authenticity and integrity based on the cascade UMAC algorithm on hybrid McEliece crypto-code constructions on lossy codes has been proposed, which allows for practical use in smart technologies with limited computing resources – the SSL/TLS protocol has been improved based on complex algorithms – McEliece crypto-code constructions on modified (lossy) codes with an improved UMAC cascade algorithm, which provides the necessary level of security in the post-quantum cryptoperiod, computational and energy-intensive requirements for use in cyber-physical systems based on smart technologies. (National Aviation University) |
| Master’s degree in specialty 125 “Cybersecurity”, program “Administrative Management in the Field of Information Protection”, field of knowledge “Information Technologies” |
| – Analysis and research of existing mechanisms for ensuring integrity and authenticity in telecommunication systems – Analysis of methods for data authenticity and integrity based on message authentication codes. – Research on cascade key hashing for generating UMAC message authentication codes – Research on collision properties of the modified UMAC algorithm (Kharkiv National University of Radio Electronics) |
| “Economic Informatics and Automated Control Systems, engineer-economist,” Specialist diploma |
| – Development of a task statement for forming a portfolio of orders for a manufacturing enterprise – Software implementation of order portfolio formation for a manufacturing enterprise (Kharkiv State University of Economics) |
| Certifications CISCO: |
| CCNA R&S: Introduction to Networks, CCNA R&S: Cybersecurity Essentials CCNA R&S: Routing and Switching Essentials, CCNA R&S: Scaling Networks, CCNA R&S: Connecting Networks Network Security Cisco Packet Tracer |
PERSONAL SKILLS
| Mother tongue(s) | Russian | ||||
| Other language(s) | UNDERSTANDING | SPEAKING | WRITING | ||
| Listening | Reading | Spoken interaction | Spoken production | ||
| English | English B2 | English B2 | English B2 | English B2 | English B2 |
| Certificate of English language proficiency (level B226933, issued on 12/12/2023 by the municipal extracurricular educational institution “First Kyiv State Courses of Foreign Languages” | |||||
| Levels: A1/2: Basic user – B1/2: Independent user – C1/2 Proficient user Common European Framework of Reference for Languages | |||||
| Job-related skills | International internship within the framework of the 8th International Symposium on Multidisciplinary Studies and Innovative Technologies on the topics “Cybersecurity of SMART Technologies Using Deep Learning Methods” and “Analysis of the software security protection” (No. IEEE-3-97/131 dated 09.11.2024). Turkish Section Institute of Electrical and Electronics Engineers, Turkey Section (Ankara, Turkey). Preparation of applicants who took prize places at the 5th International Scientific and Practical Conference “Problems and Ways to Protect Informational, Psychological and Spiritual Security of the Individual, Society, and State”, which was held at the Faculty of Computer Science and Technology of the National Aviation University. | ||||
ADDITIONAL INFORMATION
| Publications ORCID: https://orcid.org/0000-0002-2015-8927 1. Havrylova A.A., Korol O.H., Chetinkaya K. Construction of crypto-code structures for use in post-quantum cryptography. Information security and information technologies: monograph. LLC “DISA PLUS”, 2019. P.15-30. 2. Yevseiev Serhii, Havrylova Alla. Improved UMAC algorithm with crypto-code McEliece’s scheme. Modern Problems Of Computer Science And IT-Education: collective monograph. Premier Publishing s.r.o. 2020. P. 79-92. 3. Yevseiev S., Ponomarenko V., Laptiev O., Milov O. and others. Methodological aspects of postquantum asymmetric McElice and Niederreiter systems on algebra-geometric codes design. Synergy of building cybersecurity systems: monograph. 2021. P. 102-147 (індексується базою Scopus). 4. Yevseiev Serhii, Gavrilova Alla, Tomashevsky Bogdan, Samadov Firuz. Research of crypto-code designs construction for using in post quantum cryptography. Development Management, 2018, № 16 (4). P. 26-39. 5. Гаврилова А.A. Застосування алгоритму UMAC на крипто-кодових конструкціях у блокчейн-технологіях. Науковий журнал “ScienceRise”, 2019 №12 (65). С. 20-23. 6. Havrylova Alla A., Korol Olha H., Milevskyi Stanyslav V., Bakirova Lala R. Mathematical model of authentication of a transmitted message based on a McEliece scheme on shorted and extended modified elliptic codes using UMAC modified algorithm. Кібербезпека: освіта, наука, техніка, 2019, № 1(5). P. 40-51. 7. Havrilova Alla, Khokhlacheva Yulia, Pogorelov Volodymyr. Analysis of the use of hybrid crypto-code structures to increase the level of resistance of hash codes to hacking. Information Security, 2022, Volume 28, No. 2. P. 87-101. 8. Yevseiev Serhii, Havrylova Alla, Korol Olha, Dmitriiev Oleh and others. Research of collision properties of the modified UMAC algorithm on crypto-code constructions. EUREKA: Physics and Engineering, 2022, № 1 (38)/ P. 34–43. 9. Havrylova A., Khokhlachova Y., Tkachov A., Voropay N., Khvostenko V. Justification of directions for improving authentication protocols in information and communication systems. Ukrainian Information Security Research Journa. 2023, Vol. 25, №. 1. Р. 6-19. 10. Havrylova Alla, Yevseiev Serhii, Korol Olha. Development of authentication codes of messages on the basis of UMAC with crypto-code McEliece’s scheme on elliptical codes. 4th International Congress on 3D Printing (Additive Manufacturing) Technologies and Digital Industry. 2019, № 3(2). P. 153-170. 11. Korol Olha, Havrylova Alla, Yevseiev Serhii. Practical UMAC algorithms based on crypto code designs. Przetwarzanie, transmisja I bezpieczenstwo informacji. Wydawnictwo naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej. 2019, Tom 2. S. 221-232. 12. Korol Olha, Havrylova Alla. Mathematical models of hybrid crypto-code constructions in the UMAC algorithm. Przetwarzanie, transmisja i bezpieczenstwo informacji. 2020, Vol. 12. S. 125-134Development of a scenario modeling of conflicts tools in a security system based on formal grammars / Eastern European journal of advanced technologies. – Kharkiv. – 2019. 6/9(102). P. 22–39. 13. Yevseiev S., Tsyhaneko O., Gavrilova A. and others. Development of Niederreiter hybrid crypto-code structure on flawed codes. Eastern-European Journal of Enterprise Technologies. 2019, № 1/9 (97). Р. 27-38 (індексується базою Scopus). 14. Gavrilova A., Volkov I., Kozhedub Yu. Development of a modified UMAC algorithm based on crypto-code constructions Eastern-European Journal of Enterprise Technologies. 2020, № 4/9 (106). P. 45-63. (індексується базою Scopus). 15. Yevseiev S., Havrylova A., Milevskyi S., Sinitsyn I. and others. Development of an improved SSL/TLS protocol using post-quantum algorithms. Eastern-European Journal of Enterprise Technologies. 2023, № 3/9 (123). Р. 33-48. (індексується базою Scopus). 16. Shmatko O., Yevseiev S., Dudykevych V., Milevskyi S., Solnyshkova S., Havrylova A., Shestak Ya., Oriekhov S., Korsunov S., & Kravchenko S. Development of a method for synthesizing an information-analytical system for assessing the level of information transmission channels protection / O. Shmatko [et al.] // Eastern-European Journal of Enterprise Technologies, 2024, 2/9 (128). pp. 36–43. ISSN (print) 1729-3774, ISSN (on-line) 1729-406 https://doi.org/10.15587/1729-4061.2024.302495. 17. Havrylova, A., Khvostenko, V., Milevskyi, S. (2025). Development of an Advanced SSL/TLS Protocol for Transferring Requests to a 3D-Printer. In: Durakbasa, N.M., Cetinkaya, K., Demircioglu, P., Bogrekci, I. (eds) Digitalization in Additive Manufacturing. ICPTDI 2024. Springer Tracts in Additive Manufacturing. Springer, Cham. Part F641, P. 489–503. DOI: 10.1007/978-3-031-84873-5_38 Springer Tracts in Additive Manufacturing. 18. Milevskyi S., Voropay N., Havrylova A., Korol O., Aksonova I., Khvostenko V. Message transmission control models for special purpose communication networks. Security Territory 2025. Vol. 1, No. 2. Pp. 57 – 64. Presentations Conferences Seminars 1. Havrylova Alla, Yevseiev Serhii. Analysis of the security status of blockchain projects in the Ukrainian services market. Proceedings of the international scientific and practical conference “Intelligent systems and information technologies”, Odesa, 2019. pp. 62-64. 2. Havrylova A.A., Korolev R.V. Analysis of vulnerabilities of blockchain technology when working with cryptocurrencies. Proceedings of the II International Scientific and Practical Conference “Information Security and Information Technologies”, Kropyvnytskyi, 2020. P. 4. 3. Pogashiy S.S., Havrylova A.A. The use of hash codes created using the UMAC algorithm on crypto-code structures to ensure the required level of resistance to hacking. Materials of the regional round table “Current issues of ensuring the service and combat activities of the security and defense sector forces”, Kharkiv, 2020. P. 290-294. 4. Olga Korol, Alla Havrylova. Implementation of the UMAC algorithm on crypto-code constructions. Proceedings of the international scientific and technical conference “ITSec: Information Technology Security”, Kyiv, 2020. pp. 12- 13. 5. Havrylova A.A. Analysis of cryptographic algorithms submitted to the third round of the NIST competition. Materials of the All-Ukrainian Round Table “Current Issues of Ensuring the Service and Combat Activities of the Security and Defense Sector Forces”, Kharkiv, 2021. P. 361-365. 6. Kulya Yu.E., Havrylova A.A. Analysis of ciphers in wireless networks. Proceedings of the XXI All-Ukrainian Scientific and Technical Conference of Young Scientists, Postgraduates and Students “State, Achievements and Prospects of Information Systems and Technologies”, Odesa, 2021. P. 40-41. 7. Havrylova A.A. Determining the state of cyberspace security. Proceedings of the International Scientific and Practical Conference “Information Technologies and Computer Modeling”, Ivano-Frankivsk, 2021. P. 11-12. 8. Havrylova Alla, Tkachov Andrii, Shmatko Alexander. Development of a pseudo-random substrate for the UMAC algorithm on crypto-code constructions. Proceedings of the VIII International Scientific and Technical Conference “Information protection and information systems security 2021”, Lviv, 2021. P. 49-50. 9. Havrylova A.A., Korol O.G., Yevseiev S.P. Research on the collision properties of the modified UMAC algorithm on crypto-code constructions. Abstracts of the report of the ninth international scientific and technical conference “Informatics, control and artificial intelligence”, Kharkiv–Kramatorsk, 2022. P. 17. 10. Khokhlacheva Yu.E., Havrylova A.A. Justification of the choice of crypto algorithm for forming a pseudo-random substrate in crypto-code constructions. Materials of the XI scientific conference “Scientific results of 2022”. Collection of scientific papers, Kharkiv, 2022. P. 17. 11. Havrylova A.A., Yevseiev S.P. Checking for collision of hash codes generated using the UMAC algorithm on crypto-code constructions. Abstracts of the report at the IX International Scientific and Practical Conference “Mathematics. Information Technologies. Education”, Lutsk, 2022. P. 66-68. 12. Havrylova Alla, Tkachov Andrii, Rahimova Irada Rahim Qizi. Estimating the Efficiency of Using the Modified UMAC Algorithm. 2022 IEEE 3rd KhPI Week on Advanced Technology (KhPIWeek), Kharkiv, 2022. URL: https://ieeexplore.ieee.org/document/9916425/metrics#metrics. 13. Alla Havrylova, Vladyslav Murzhak. Using the discrete cosine transform method to ensure the confidentiality and authenticity of audio data. SMICS: Security of modern information and communication systems: materials of the International Scientific and Technical Conference, Lviv, October 16-18, 2025: I. Franko Lviv National University, 2025. pp. 219 – 221. https://smics.lnu.edu.ua/uk/zbirnyk/. 14. Alla Havrylova, Oleh Azarov. Process decomposition in cloud computing security techniques. SMICS: Безпека сучасних інформаційно-комунікаційних систем: матеріали Міжнар. наук.-техн. конф., м. Львів, 16-18 жовтня 2025 р.: ЛНУ ім. І. Франка, 2025. С. 222 – 223. https://smics.lnu.edu.ua/uk/zbirnyk. 15. Aksyonova I. V., Havrylova A. A. Framework for analyzing cyber threats as a tool for managing corporate security. Current issues of ensuring cybersecurity and information protection: materials of the XI International Scientific and Practical Conference, April 24, 2025, Kyiv / editors: O. I. Tymoshenko [and others]. – Kyiv: Publishing House of the European University, 2025. – P. 10 – 12. 16. Alla Havrylova, Andrii Tkachov, Yevhen Melenti, Vladyslav Sokol, Sergii Dunaiev. Ensuring Authenticity and Integrity Messages on Basis Complex Modified Algorithm UMAC on Crypto-Code Constructions using Rao-Nama Symmetrical Cryptosystems // 2025 IEEE 6th KhPI Week on Advanced Technology (KhPIWeek), 2025. P. 482 -487 ISSN: 3064-9560. 17. Havrylova A.A., Tkachov A.M., Hapon A.O. Approaches to detecting vulnerabilities in software to ensure code protection. Materials of the V International Scientific and Practical Conference “Information Security and Information Technologies”, Kharkiv, Odesa, Lutsk, June 9–11, 2025. P. 59 – 60 URL: https://scholar.google.com/citations?view_op=view_citation&hl=ru&user=Vj8UnS4AAAAJ&sortby=pubdate&citation_for_view=Vj8UnS4AAAAJ:ZHo1McVdvXMC. 18. Liudmyla Gryzun, Alla Havrylova, Andrii Tkachov, Andrii Hapon, and Natalia Brynza. Analysis of software vulnerability detection methods // Proceedings of the Workshop on Scientific and Practical Issues of Cybersecurity and Information Technology at the V international scientific and practical conference Information security and information technology (ISecIT 2025), June 09–11, 2025, Lutsk, Ukraine. 2025. Р. 60-71/ URL: https://ceur-ws.org/Vol-4150/paper5.pdf. 19. Tolkachov M., Dzheniuk N., Havrylova A., Chechui O., Hapon A., Tiutiunyk V. Cognitive Approach to Cybersecurity: Causality Analysis and Situational Learning. 2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA), May 23-24, 2025 Ankara-Türkiye (Hybrid), 2025. – 16 p. DOI: 10.1109/ICHORA65333.2025.11017107. Memberships Member of the public organization “Eastern European Scientific Society”, certificate ES No. 053 |