default search action
Viktor Yakovlev
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Valery I. Korzhik, Viktor Yakovlev, Vladimir Starostin, Alexey Lapshin, Aleksey Zhuvikin:
Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Channels with Feedback. FRUCT 2024: 374-379 - 2022
- [c15]Viktor Yakovlev, Valery I. Korzhik, Milena Akhmetshina, Aleksey Zhuvikin:
Key Sharing Protocol Using Exchange by Integers over Public Noiseless Channels Between Users that Provides Security without Cryptographic Assumptions. FRUCT 2022: 1-8 - [c14]Viktor Yakovlev, Valery I. Korzhik, Vladimir Starostin, Alexey Lapshin, Aleksey Zhuvikin:
Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions. FRUCT 2022: 300-307 - 2021
- [c13]Valery I. Korzhik, Vladimir Starostin, Victor Yakovlev, Dmitri Flaksman, Ivan Bukshin, Boris V. Izotov:
Digital Watermarking System for Hard Cover Objects Against Cloning Attacks. FRUCT 2021: 79-85 - [c12]Viktor Yakovlev, Valery I. Korzhik, Sergey E. Adadurov:
Authentication of Diffie-Hellman Protocol for Mobile Units Executing a Secure Device Pairing Procedure in Advance. FRUCT 2021: 385-392 - [c11]Valery I. Korzhik, Vladimir Starostin, Muaed Kabardov, Viktor Yakovlev, Aleksandr Gerasimovich, Aleksey Zhuvikin:
Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions. MIPRO 2021: 1202-1207
2010 – 2019
- 2019
- [j3]Oleksandr A. Letychevskyi, Yaroslav Hryniuk, Viktor Yakovlev, Volodymyr Peschanenko, Viktor Radchenko:
Algebraic Matching of Vulnerabilities in a Low-Level Code. ISC Int. J. Inf. Secur. 11(3): 1-7 (2019) - [c10]Oleksandr A. Letychevskyi, Volodymyr Peschanenko, Viktor Radchenko, Yaroslav Hryniuk, Viktor Yakovlev:
Algebraic Patterns of Vulnerabilities in Binary Code. DESSERT 2019: 70-73 - [c9]Guillermo Morales-Luna, Valery I. Korzhik, Vladimir Starostin, Muaed Kabardov, Aleksandr Gerasimovich, Victor Yakovlev, Aleksey Zhuvikin:
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions. FedCSIS 2019: 327-332 - 2018
- [c8]Guillermo Morales-Luna, Valery I. Korzhik, Aleksandr Gerasimovich, Cuong Nguyen, Vladimir Starostin, Victor Yakovlev, Muaed Kabardov:
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels. FedCSIS 2018: 569-576 - 2016
- [c7]Guillermo Morales-Luna, Victor Yakovlev, Valery I. Korzhik, Pavel Mylnikov:
Secret key agreement based on a communication through wireless MIMO-based fading channels. FedCSIS 2016: 823-830 - 2015
- [i3]Valery I. Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev:
Analysis of Keyless Massive MIMO-based Cryptosystem Security. IACR Cryptol. ePrint Arch. 2015: 816 (2015) - 2014
- [j2]Mireille Régnier, Evgenia Furletova, Victor Yakovlev, Mikhail A. Roytberg:
Analysis of pattern overlaps and exact computation of P-values of pattern occurrences numbers: case of Hidden Markov Models. Algorithms Mol. Biol. 9: 25 (2014) - [c6]Valery I. Korzhik, Viktor Yakovlev, Guillermo Morales-Luna:
Wire-tap channel concept in nature and society. IISA 2014: 231-236 - 2012
- [c5]Viktor Yakovlev, Valery I. Korzhik, Mihail Bakaev, Guillermo Morales-Luna:
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries. MMM-ACNS 2012: 51-64 - 2011
- [i2]Valery I. Korzhik, Viktor Yakovlev, Guillermo Morales-Luna, Yuri Kovajkin:
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna. CoRR abs/1101.3774 (2011) - 2010
- [i1]Viktor Yakovlev, Valery I. Korzhik, Guillermo Morales-Luna, Mihail Bakaev:
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary. CoRR abs/1005.3184 (2010)
2000 – 2009
- 2008
- [j1]Viktor Yakovlev, Valery I. Korzhik, Guillermo Morales-Luna:
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization. IEEE Trans. Inf. Theory 54(6): 2535-2549 (2008) - 2003
- [c4]Valery I. Korzhik, Viktor Yakovlev, Alexander Sinuk:
Achievability of the Key-Capacity in a Scenario of Key Sharing. MMM-ACNS 2003: 308-315 - 2001
- [c3]Viktor Yakovlev, Valery Korjik, Alexander Sinuk:
Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes. MMM-ACNS 2001: 242-250
1990 – 1999
- 1997
- [c2]Valery Korjik, Viktor Yakovlev, I. Babkov:
The wire-tap channel concept against eavesdropping of indoor radio telephone. PIMRC 1997: 477-479 - 1992
- [c1]Valery I. Korzhik, Viktor Yakovlev:
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk). AUSCRYPT 1992: 185-195
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-20 00:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint