Name
Papers
Collaborators
VALERY I. KORZHIK
36
53
Citations 
PageRank 
Referers 
35
15.45
76
Referees 
References 
172
115
Search Limit
100172
Title
Citations
PageRank
Year
Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions.00.342021
Digital Watermarking System for Hard Cover Objects Against Cloning Attacks00.342021
Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding.00.342020
Perceptual Image Hashing: Tolerant to Brightness and Contrast Corrections Method Based on Cumulative Histogram Slicing00.342019
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions00.342019
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels.00.342018
Steganalysis Based on Statistical Properties of the Encrypted Messages.00.342017
Detection of stegosystems using block ciphers for encryption of the embedded messages00.342017
Design of Audio Digital Watermarking System Resistant to Removal Attack.00.342017
Investigation of keyless cryptosystem proposed by dean and Goldsmith00.342017
Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization.00.342016
Design of High Speed Stegosystem Based on Trellis Codes Jointly with Generalised Viterbi Algorithm.00.342016
Secret key agreement based on a communication through wireless MIMO-based fading channels.00.342016
Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images00.342015
Analysis of Keyless Massive MIMO-based Cryptosystem Security.00.342015
Concatenated digital watermarking system robust to different removal attacks.00.342014
Wire-tap channel concept in nature and society00.342014
Audio Watermarking Based on Echo Hiding with Zero Error Probability.00.342013
A stegosystem with blind decoder based on a noisy channel00.342013
The Capacity of a Stegosystem for the Noisy Attack Channel.00.342012
A Multiple Robust Digital Watermarking System for Still Images.00.342012
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna20.392011
Stegosystems Based on Noisy Channels.20.432011
Robust Digital Watermarking System for Still Images.40.692011
Collusion-Resistant Fingerprints Based on Real Superimposed Codes.00.342010
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary10.352010
Undetectable spread-time stegosystem based on noisy channels10.702010
Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces00.342009
Wet Paper Coding for Watermarking of Binary Images10.402008
On the use of Bhattacharyya distance as a measure of the detectability of steganographic systems30.392008
On the existence of perfect stegosystems70.662005
Achievability of the Key-Capacity in a Scenario of Key Sharing00.342003
Hybrid authentication based on noisy channels20.412003
Digital Semipublic Watermarking00.342002
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk)00.341992
Cryptanalysis of McEliece's public-key cryptosystem122.251991