default search action
Valery I. Korzhik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Valery I. Korzhik, Viktor Yakovlev, Vladimir Starostin, Alexey Lapshin, Aleksey Zhuvikin:
Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Channels with Feedback. FRUCT 2024: 374-379 - 2022
- [c29]Viktor Yakovlev, Valery I. Korzhik, Milena Akhmetshina, Aleksey Zhuvikin:
Key Sharing Protocol Using Exchange by Integers over Public Noiseless Channels Between Users that Provides Security without Cryptographic Assumptions. FRUCT 2022: 1-8 - [c28]Viktor Yakovlev, Valery I. Korzhik, Vladimir Starostin, Alexey Lapshin, Aleksey Zhuvikin:
Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions. FRUCT 2022: 300-307 - 2021
- [c27]Valery I. Korzhik, Vladimir Starostin, Victor Yakovlev, Dmitri Flaksman, Ivan Bukshin, Boris V. Izotov:
Digital Watermarking System for Hard Cover Objects Against Cloning Attacks. FRUCT 2021: 79-85 - [c26]Viktor Yakovlev, Valery I. Korzhik, Sergey E. Adadurov:
Authentication of Diffie-Hellman Protocol for Mobile Units Executing a Secure Device Pairing Procedure in Advance. FRUCT 2021: 385-392 - [c25]Valery I. Korzhik, Vladimir Starostin, Muaed Kabardov, Viktor Yakovlev, Aleksandr Gerasimovich, Aleksey Zhuvikin:
Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions. MIPRO 2021: 1202-1207 - 2020
- [j15]Valery I. Korzhik, D. C. Nguyen, Kseniia Akhrameeva:
An Approach to Assessing Information Security Effectiveness in Control Systems. Autom. Control. Comput. Sci. 54(8): 879-887 (2020) - [j14]Valery I. Korzhik, Cuong Nguyen, Ivan Fedyanin, Guillermo Morales-Luna:
Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding. J. Inf. Hiding Multim. Signal Process. 11(1): 44-57 (2020)
2010 – 2019
- 2019
- [c24]Guillermo Morales-Luna, Valery I. Korzhik, Vladimir Starostin, Muaed Kabardov, Aleksandr Gerasimovich, Victor Yakovlev, Aleksey Zhuvikin:
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions. FedCSIS 2019: 327-332 - [c23]Valery I. Korzhik, Cuong Nguyen, Guillermo Morales-Luna:
Cipher Modification Against Steganalysis Based on NIST Tests. FRUCT 2019: 179-186 - [c22]Aleksey Zhuvikin, Valery I. Korzhik:
Perceptual Image Hashing: Tolerant to Brightness and Contrast Corrections Method Based on Cumulative Histogram Slicing. FRUCT 2019: 391-397 - 2018
- [c21]Guillermo Morales-Luna, Valery I. Korzhik, Aleksandr Gerasimovich, Cuong Nguyen, Vladimir Starostin, Victor Yakovlev, Muaed Kabardov:
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels. FedCSIS 2018: 569-576 - 2017
- [c20]Guillermo Morales-Luna, Valery I. Korzhik, Vasily Alekseev:
Design of Audio Digital Watermarking System Resistant to Removal Attack. FedCSIS 2017: 647-652 - [c19]Valery I. Korzhik, Ivan Fedyanin, Cuong Nguyen:
Detection of stegosystems using block ciphers for encryption of the embedded messages. FRUCT 2017: 181-186 - [c18]Valery I. Korzhik, Vladimir Starostin, Kseniia Akhrameeva:
Investigation of keyless cryptosystem proposed by dean and Goldsmith. FRUCT 2017: 194-201 - [c17]Valery I. Korzhik, Ivan Fedyanin, Artur Godlewski, Guillermo Morales-Luna:
Steganalysis Based on Statistical Properties of the Encrypted Messages. MMM-ACNS 2017: 288-298 - 2016
- [j13]Valery I. Korzhik, Guillermo Morales-Luna, Ivan Fedyanin:
Design of High Speed Stegosystem Based on Trellis Codes Jointly with Generalised Viterbi Algorithm. Int. J. Comput. Sci. Appl. 13(2): 1-15 (2016) - [c16]Guillermo Morales-Luna, Victor Yakovlev, Valery I. Korzhik, Pavel Mylnikov:
Secret key agreement based on a communication through wireless MIMO-based fading channels. FedCSIS 2016: 823-830 - [i5]Aleksey Zhuvikin, Valery I. Korzhik, Guillermo Morales-Luna:
Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization. CoRR abs/1608.02291 (2016) - 2015
- [c15]Valery I. Korzhik, Guillermo Morales-Luna, Ivan Fedyanin:
Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images. FedCSIS 2015: 855-860 - [c14]Valery I. Korzhik, Aleksey Zhuvikin, Guillermo Morales-Luna:
Selective image authentication tolerant to JPEG compression. IISA 2015: 1-6 - [i4]Valery I. Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev:
Analysis of Keyless Massive MIMO-based Cryptosystem Security. IACR Cryptol. ePrint Arch. 2015: 816 (2015) - 2014
- [j12]Valery I. Korzhik, Guillermo Morales-Luna, Alexander Kochkarev, Dmitriy Flaxman:
Concatenated digital watermarking system robust to different removal attacks. Comput. Sci. Inf. Syst. 11(4): 1581-1594 (2014) - [c13]Valery I. Korzhik, Viktor Yakovlev, Guillermo Morales-Luna:
Wire-tap channel concept in nature and society. IISA 2014: 231-236 - 2013
- [j11]Valery I. Korzhik, Guillermo Morales-Luna, Ivan Fedyanin:
Audio Watermarking Based on Echo Hiding with Zero Error Probability. Int. J. Comput. Sci. Appl. 10(1): 1-10 (2013) - [c12]Valery I. Korzhik, Guillermo Morales-Luna, Alexander Kochkarev, Ivan Shevchuk:
Fingerprinting System for Still Images Based on the Use of a Holographic Transform Domain. FedCSIS 2013: 585-590 - [c11]Valery I. Korzhik, Guillermo Morales-Luna, Ksenia Nebaeva, Maksims Aleksejevs:
A stegosystem with blind decoder based on a noisy channel. DSP 2013: 1-5 - 2012
- [j10]Sergey Anfinogenov, Valery I. Korzhik, Guillermo Morales-Luna:
A Multiple Robust Digital Watermarking System for Still Images. Int. J. Comput. Sci. Appl. 9(3): 37-46 (2012) - [j9]Valery I. Korzhik, Guillermo Morales-Luna, Ksenia Nebaeva:
The Capacity of a Stegosystem for the Noisy Attack Channel. J. Inf. Hiding Multim. Signal Process. 3(2): 205-211 (2012) - [c10]Valery I. Korzhik, Guillermo Morales-Luna, Ivan Fedyanin:
The Use of Wet Paper Codes With Audio Watermarking Based on Echo Hiding. FedCSIS 2012: 727-732 - [c9]Viktor Yakovlev, Valery I. Korzhik, Mihail Bakaev, Guillermo Morales-Luna:
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries. MMM-ACNS 2012: 51-64 - 2011
- [j8]Valery I. Korzhik, Guillermo Morales-Luna, Ksenia Loban:
Stegosystems Based on Noisy Channels. Int. J. Comput. Sci. Appl. 8(1): 1-13 (2011) - [c8]Sergey Anfinogenov, Valery I. Korzhik, Guillermo Morales-Luna:
Robust Digital Watermarking System for Still Images. FedCSIS 2011: 685-689 - [i3]Valery I. Korzhik, Viktor Yakovlev, Guillermo Morales-Luna, Yuri Kovajkin:
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna. CoRR abs/1101.3774 (2011) - 2010
- [j7]Valery I. Korzhik, Anton Ushmotkin, Artem Razumov, Guillermo Morales-Luna, Irina Marakova-Begoc:
Collusion-Resistant Fingerprints Based on Real Superimposed Codes. Int. J. Comput. Sci. Appl. 7(3): 1-8 (2010) - [c7]Valery I. Korzhik, Guillermo Morales-Luna, Ksenia Loban, Irina Marakova-Begoc:
Undetectable Spread-time Stegosystem Based on Noisy Channels. IMCSIT 2010: 723-728 - [i2]Viktor Yakovlev, Valery I. Korzhik, Guillermo Morales-Luna, Mihail Bakaev:
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary. CoRR abs/1005.3184 (2010)
2000 – 2009
- 2009
- [c6]Valery I. Korzhik, Anton Ushmotkin, Artem Razumov, Guillermo Morales-Luna, Irina Marakova-Begoc:
Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces. IMCSIT 2009: 487-491 - 2008
- [j6]Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling:
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. Trans. Data Hiding Multim. Secur. 3: 23-32 (2008) - [j5]Viktor Yakovlev, Valery I. Korzhik, Guillermo Morales-Luna:
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization. IEEE Trans. Inf. Theory 54(6): 2535-2549 (2008) - [i1]Michail Zubarev, Valery I. Korzhik, Guillermo Morales-Luna:
Wet Paper Coding for Watermarking of Binary Images. CoRR abs/0808.2486 (2008) - 2006
- [j4]Moon Ho Lee, Valery I. Korzhik, Guillermo Morales-Luna, Sergei Lusse, Evgeny Kurbatov:
Image Authentication Based on Modular Embedding. IEICE Trans. Inf. Syst. 89-D(4): 1498-1506 (2006) - 2005
- [c5]Valery I. Korzhik, Guillermo Morales-Luna, Moon Ho Lee:
On the Existence of Perfect Stegosystems. IWDW 2005: 30-38 - 2003
- [j3]Valery I. Korzhik, Guillermo Morales-Luna:
Hybrid authentication based on noisy channels. Int. J. Inf. Sec. 1(4): 203-210 (2003) - [j2]Valery I. Korzhik, Guillermo Morales-Luna, Dmitry Marakov, Irina Marakova:
Watermarking of binary messages in conditions of an additive binary noise attack. IEEE Signal Process. Lett. 10(9): 277-279 (2003) - [c4]Valery I. Korzhik, Viktor Yakovlev, Alexander Sinuk:
Achievability of the Key-Capacity in a Scenario of Key Sharing. MMM-ACNS 2003: 308-315 - [c3]Valery I. Korzhik, Guillermo Morales-Luna, Irina Marakova, Carlos Patiño-Ruvalcaba:
Digital Watermarking under a Filtering and Additive Noise Attack Condition. MMM-ACNS 2003: 371-382 - 2002
- [j1]Valery I. Korzhik, Guillermo Morales-Luna, Dmitry Marakov, Irina Marakova:
Digital Semipublic Watermarking. Informatica (Slovenia) 26(3) (2002)
1990 – 1999
- 1995
- [b1]Torleiv Kløve, Valery I. Korzhik:
Error detecting codes - general theory and their application in feedback communication systems. The Kluwer international series in engineering and computer science 335, Kluwer 1995, ISBN 978-0-7923-9629-1, pp. I-XIII, 1-249 - 1992
- [c2]Valery I. Korzhik, Viktor Yakovlev:
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk). AUSCRYPT 1992: 185-195 - 1991
- [c1]Valery I. Korzhik, Andrew I. Turkin:
Cryptanalysis of McEliece's Public-Key Cryptosystem. EUROCRYPT 1991: 68-70
Coauthor Index
aka: Victor Yakovlev
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint