Viktor Yakovlev
Orcid: 0009-0007-2861-9605
According to our database1,
Viktor Yakovlev
authored at least 22 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Channels with Feedback.
Proceedings of the 35th Conference of Open Innovations Association, 2024
2022
Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions.
Proceedings of the 32nd Conference of Open Innovations Association, 2022
Key Sharing Protocol Using Exchange by Integers over Public Noiseless Channels Between Users that Provides Security without Cryptographic Assumptions.
Proceedings of the 31st Conference of Open Innovations Association, 2022
2021
Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions.
Proceedings of the 44th International Convention on Information, 2021
Authentication of Diffie-Hellman Protocol for Mobile Units Executing a Secure Device Pairing Procedure in Advance.
Proceedings of the 29th Conference of Open Innovations Association, 2021
Proceedings of the 30th Conference of Open Innovations Association, 2021
2019
ISC Int. J. Inf. Secur., 2019
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019
Proceedings of the 10th International Conference on Dependable Systems, 2019
2018
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018
2016
Secret key agreement based on a communication through wireless MIMO-based fading channels.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
Analysis of pattern overlaps and exact computation of P-values of pattern occurrences numbers: case of Hidden Markov Models.
Algorithms Mol. Biol., 2014
Proceedings of the 5th International Conference on Information, 2014
2012
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries.
Proceedings of the Computer Network Security, 2012
2011
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna
CoRR, 2011
2010
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary
CoRR, 2010
2008
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization.
IEEE Trans. Inf. Theory, 2008
2003
Proceedings of the Computer Network Security, 2003
2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
1997
Proceedings of the 8th IEEE International Symposium on Personal, 1997
1992
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk).
Proceedings of the Advances in Cryptology, 1992