Valery I. Korzhik
According to our database1,
Valery I. Korzhik
authored at least 51 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Channels with Feedback.
Proceedings of the 35th Conference of Open Innovations Association, 2024
2022
Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions.
Proceedings of the 32nd Conference of Open Innovations Association, 2022
Key Sharing Protocol Using Exchange by Integers over Public Noiseless Channels Between Users that Provides Security without Cryptographic Assumptions.
Proceedings of the 31st Conference of Open Innovations Association, 2022
2021
Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions.
Proceedings of the 44th International Convention on Information, 2021
Authentication of Diffie-Hellman Protocol for Mobile Units Executing a Secure Device Pairing Procedure in Advance.
Proceedings of the 29th Conference of Open Innovations Association, 2021
Proceedings of the 30th Conference of Open Innovations Association, 2021
2020
J. Inf. Hiding Multim. Signal Process., 2020
Autom. Control. Comput. Sci., 2020
2019
Perceptual Image Hashing: Tolerant to Brightness and Contrast Corrections Method Based on Cumulative Histogram Slicing.
Proceedings of the 25th Conference of Open Innovations Association, 2019
Proceedings of the 24th Conference of Open Innovations Association, 2019
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019
2018
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018
2017
Proceedings of the Computer Network Security, 2017
Proceedings of the 21st Conference of Open Innovations Association, 2017
Detection of stegosystems using block ciphers for encryption of the embedded messages.
Proceedings of the 20th Conference of Open Innovations Association, 2017
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017
2016
Design of High Speed Stegosystem Based on Trellis Codes Jointly with Generalised Viterbi Algorithm.
Int. J. Comput. Sci. Appl., 2016
Secret key agreement based on a communication through wireless MIMO-based fading channels.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 6th International Conference on Information, 2015
Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images.
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, 2015
2014
Comput. Sci. Inf. Syst., 2014
Proceedings of the 5th International Conference on Information, 2014
2013
Int. J. Comput. Sci. Appl., 2013
Proceedings of the 18th International Conference on Digital Signal Processing, 2013
Fingerprinting System for Still Images Based on the Use of a Holographic Transform Domain.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013
2012
J. Inf. Hiding Multim. Signal Process., 2012
Int. J. Comput. Sci. Appl., 2012
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries.
Proceedings of the Computer Network Security, 2012
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012
2011
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna
CoRR, 2011
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011
2010
Int. J. Comput. Sci. Appl., 2010
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary
CoRR, 2010
Proceedings of the International Multiconference on Computer Science and Information Technology, 2010
2009
Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2009
2008
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization.
IEEE Trans. Inf. Theory, 2008
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
Trans. Data Hiding Multim. Secur., 2008
2006
2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
2003
IEEE Signal Process. Lett., 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Computer Network Security, 2003
2002
Digital Semipublic Watermarking.
Informatica (Slovenia), 2002
1995
Error detecting codes - general theory and their application in feedback communication systems.
The Kluwer international series in engineering and computer science 335, Kluwer, ISBN: 978-0-7923-9629-1, 1995
1992
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk).
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991