Viktor Yakovlev

Orcid: 0009-0007-2861-9605

According to our database1, Viktor Yakovlev authored at least 22 papers between 1992 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Channels with Feedback.
Proceedings of the 35th Conference of Open Innovations Association, 2024

2022
Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions.
Proceedings of the 32nd Conference of Open Innovations Association, 2022

Key Sharing Protocol Using Exchange by Integers over Public Noiseless Channels Between Users that Provides Security without Cryptographic Assumptions.
Proceedings of the 31st Conference of Open Innovations Association, 2022

2021
Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions.
Proceedings of the 44th International Convention on Information, 2021

Authentication of Diffie-Hellman Protocol for Mobile Units Executing a Secure Device Pairing Procedure in Advance.
Proceedings of the 29th Conference of Open Innovations Association, 2021

Digital Watermarking System for Hard Cover Objects Against Cloning Attacks.
Proceedings of the 30th Conference of Open Innovations Association, 2021

2019
Algebraic Matching of Vulnerabilities in a Low-Level Code.
ISC Int. J. Inf. Secur., 2019

Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019

Algebraic Patterns of Vulnerabilities in Binary Code.
Proceedings of the 10th International Conference on Dependable Systems, 2019

2018
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

2016
Secret key agreement based on a communication through wireless MIMO-based fading channels.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

2015
Analysis of Keyless Massive MIMO-based Cryptosystem Security.
IACR Cryptol. ePrint Arch., 2015

2014
Analysis of pattern overlaps and exact computation of P-values of pattern occurrences numbers: case of Hidden Markov Models.
Algorithms Mol. Biol., 2014

Wire-tap channel concept in nature and society.
Proceedings of the 5th International Conference on Information, 2014

2012
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries.
Proceedings of the Computer Network Security, 2012

2011
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna
CoRR, 2011

2010
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary
CoRR, 2010

2008
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization.
IEEE Trans. Inf. Theory, 2008

2003
Achievability of the Key-Capacity in a Scenario of Key Sharing.
Proceedings of the Computer Network Security, 2003

2001
Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

1997
The wire-tap channel concept against eavesdropping of indoor radio telephone.
Proceedings of the 8th IEEE International Symposium on Personal, 1997

1992
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk).
Proceedings of the Advances in Cryptology, 1992


  Loading...