We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jul 2015

[ total of 77 entries: 1-77 ]
[ showing 77 entries per page: fewer | more ]
[1]  arXiv:1507.00095 [pdf, other]
Title: Secret Key Agreement with Large Antenna Arrays under the Pilot Contamination Attack
Comments: 15 pages, 5 figures, and the paper is under minor revision for the publication in IEEE transactions on wireless communications
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[2]  arXiv:1507.00255 [pdf, other]
Title: ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic
Comments: Please use MobiSys version when referencing this work: this http URL 18 pages, recon.meddle.mobi
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[3]  arXiv:1507.00443 [pdf, other]
Title: Time Distortion Anonymization for the Publication of Mobility Data with High Utility
Authors: Vincent Primault (DRIM, INSA Lyon), Sonia Ben Mokhtar (DRIM, INSA Lyon), Cédric Lauradoux (PRIVATICS), Lionel Brunie (DRIM, INSA Lyon)
Comments: in 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2015, Helsinki, Finland
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:1507.00576 [pdf, other]
Title: Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats
Comments: To be presented at the 2015 Conference on Decision and Game Theory for Security (GameSec 2015)
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[5]  arXiv:1507.00712 [pdf, ps, other]
Title: New Class of Pseudorandom D-sequences to Generate Cryptographic Keys
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:1507.01162 [pdf, ps, other]
Title: Minimal Logarithmic Signatures for Sporadic Groups
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:1507.01163 [pdf, ps, other]
Title: Minimal Logarithmic Signatures for one type of Classical Groups
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:1507.01697 [pdf, other]
Title: Making Digital Artifacts on the Web Verifiable and Reliable
Comments: Extended version of conference paper: arXiv:1401.5775
Subjects: Cryptography and Security (cs.CR); Digital Libraries (cs.DL)
[9]  arXiv:1507.01706 [pdf, ps, other]
Title: ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments
Journal-ref: ENERGY 2011: The First International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies, pp. 19-26, ISBN: 978-1-61208-136-6, 2011
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:1507.01922 [pdf, other]
Title: Cyber-Deception and Attribution in Capture-the-Flag Exercises
Comments: 4 pages Short name accepted to FOSINT-SI 2015
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:1507.01930 [pdf, other]
Title: Malware Task Identification: A Data Driven Approach
Comments: 8 pages full paper, accepted FOSINT-SI (2015)
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:1507.02196 [pdf, other]
Title: Reverse Engineering of RFID devices
Authors: Wouter Bokslag
Comments: 14 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:1507.02331 [pdf, ps, other]
Title: On an almost-universal hash function family with applications to authentication and secrecy codes
Comments: International Journal of Foundations of Computer Science, to appear
Journal-ref: International Journal of Foundations of Computer Science 29 (2018), 357-375
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Combinatorics (math.CO); Number Theory (math.NT)
[14]  arXiv:1507.02458 [pdf, ps, other]
Title: Towards a Security Lifecycle Model against Social Engineering Attacks: SLM-SEA
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[15]  arXiv:1507.02786 [pdf, ps, other]
Title: Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack
Comments: 23 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:1507.02825 [pdf, other]
Title: Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
Comments: 25 pages, 15 figures
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:1507.02992 [pdf, ps, other]
Title: Secure Scrum: Development of Secure Software with Scrum
Comments: The Ninth International Conference on Emerging Security Information, Systems and Technologies - SECURWARE 2015, Venice, Italy, 2015
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[18]  arXiv:1507.03000 [src]
Title: Toward Practical Differential Privacy in Smart Grid with Capacity-Limited Rechargeable Batteries
Comments: This paper has been withdrawn by the author due to a crucial error in definition 3 and theorem 2
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:1507.03109 [pdf, other]
Title: Enhancing the Security of Protocols against Actor Key Compromise Problems
Authors: Jing Ma, Wenhui Zhang
Comments: 14 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:1507.03114 [pdf, other]
Title: A Placement Vulnerability Study in Multi-tenant Public Clouds
Comments: This paper is the full version of the paper that earlier appeared in USENIX Security 2015 as V. Varadarajan, Y. Zhang, T. Ristenpart, and M. Swift. A placement vulnerability study in multi-tenant public clouds. In 24th USENIX Security Symposium. USENIX Association, 2015
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:1507.03117 [pdf, ps, other]
Title: Apate - A Linux Kernel Module for High Interaction Honeypots
Comments: The Ninth International Conference on Emerging Security Information, Systems and Technologies - SECURWARE 2015, Venice, Italy, 2015
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[22]  arXiv:1507.03415 [pdf, other]
Title: A Cross-Layer Security Analysis for Process-Aware Information Systems
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:1507.03467 [pdf, other]
Title: Using HTML5 to Prevent Detection of Drive-by-Download Web Malware
Comments: This is the pre-peer reviewed version of the article: \emph{Using HTML5 to Prevent Detection of Drive-by-Download Web Malware}, which has been published in final form at \url{this http URL}. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving
Journal-ref: Security and Communication Networks, Volume 8, Issue 7, pages 1237-1255, 10 May 2015
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:1507.03480 [pdf, ps, other]
Title: Middle-Solving Grobner bases algorithm for cryptanalysis over finite fields
Comments: arXiv admin note: text overlap with arXiv:1310.2332
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[25]  arXiv:1507.03528 [pdf, other]
Title: Visibility-Aware Optimal Contagion of Malware Epidemics
Comments: Amended to include more explanations on assumptions, add more real-world context on new stealthy malware, and improve figures
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY); Optimization and Control (math.OC)
[26]  arXiv:1507.03674 [pdf, ps, other]
Title: Algorithm for Solving Massively Underdefined Systems of Multivariate Quadratic Equations over Finite Fields
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[27]  arXiv:1507.04089 [pdf, ps, other]
Title: False shares in verifiable secret sharing with finite field commitments
Authors: Hua Lu, Jack Peterson
Comments: 1 page
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:1507.04491 [pdf, other]
Title: Vehicle Authentication via Monolithically Certified Public Key and Attributes
Comments: Accepted in Wireless Networks June 2015, 4 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[29]  arXiv:1507.05085 [pdf, ps, other]
Title: Secure management of logs in internet of things
Authors: Udit Gupta
Comments: 6 pages, 1 table
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:1507.05206 [pdf, other]
Title: Interception in Distance-Vector Routing Networks
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Networking and Internet Architecture (cs.NI)
[31]  arXiv:1507.05278 [pdf, other]
Title: Toward automatic verification of quantum cryptographic protocols
Comments: Accepted by Concur'15
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[32]  arXiv:1507.05316 [pdf, other]
Title: Properties and constructions of coincident functions
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:1507.05644 [pdf, ps, other]
Title: Security Issues in Data Warehouse
Comments: 5th European Conference of Computer Science (ECCS 14)
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:1507.05724 [pdf, ps, other]
Title: HORNET: High-speed Onion Routing at the Network Layer
Comments: 14 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:1507.06183 [pdf, ps, other]
Title: Optimal Selfish Mining Strategies in Bitcoin
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:1507.06189 [pdf, ps, other]
Title: On Dynamic Flow-Sensitive Floating-Label Systems
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[37]  arXiv:1507.06353 [pdf, other]
Title: ShakeMe: Key Generation From Shared Motion
Comments: The paper is accepted to the 13th IEEE International Conference on Pervasive Intelligence and Computing (PIComp-2015)
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:1507.06368 [pdf, ps, other]
Title: Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:1507.06427 [pdf, ps, other]
Title: Evaluation of Contactless Smartcard Antennas
Comments: University of Applied Sciences Upper Austria, JR-Center u'smile, Technical report, 29 pages, 27 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[40]  arXiv:1507.06769 [pdf, other]
Title: Modelling and Analysis Network Security -- a PVCCS approach
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:1507.06812 [pdf, ps, other]
Title: D-DEMOS: A distributed, end-to-end verifiable, internet voting system
Comments: 17 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[42]  arXiv:1507.06955 [pdf, other]
Title: Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Comments: This paper has been accepted at the 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2016. The final publication is available at link.springer.com
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:1507.07363 [pdf, ps, other]
Title: A note on the security of the hHB protocol
Authors: Carl Löndahl
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:1507.07739 [pdf, other]
Title: Forensic Analysis of WhatsApp Messenger on Android Smartphones
Authors: Cosimo Anglano
Comments: (c)2014. This manuscript version is made available under the CC-BY-NC-ND 4.0 license this http URL
Journal-ref: Digital Investigation, Vol. 11, No. 3, pp. 201-213, September 2014
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:1507.07816 [pdf, ps, other]
Title: Comparison between security majors in virtual machine and linux containers
Authors: Udit Gupta
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:1507.07848 [pdf, ps, other]
Title: Public-key cryptosystem based on invariants of diagonalizable groups
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:1507.07851 [pdf, other]
Title: On the Unicity of Smartphone Applications
Comments: 10 pages, 9 Figures, Appeared at ACM CCS Workshop on Privacy in Electronic Society (WPES) 2015
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:1507.08071 [pdf, ps, other]
Title: Private Stream Aggregation Revisited
Comments: 33 pages, 2 tables, 1 figure
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:1507.08094 [pdf, other]
Title: A SAT-based Public Key Cryptography Scheme
Comments: 7 pages + appendix, 1 figure + 6 in appendix
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:1507.08153 [pdf, other]
Title: A Declarative Framework for Specifying and Enforcing Purpose-aware Policies
Comments: Extended version of the paper accepted at the 11th International Workshop on Security and Trust Management (STM 2015)
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[51]  arXiv:1507.08258 [pdf, ps, other]
Title: Perfect Secrecy under Deep Random assumption
Comments: 30 pages main and 48 pages annex. V12: A more accurate proof of Theorem 1 is given, where Advantage Distillation is proved without the use of Maurer error correcting technique. Addition of a more precise and more efficient method to generate recursively each new distribution in the Deep Random Generator described in section 4
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:1507.08309 [pdf, other]
Title: Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:1507.08475 [pdf, other]
Title: aDTN - Undetectable Communication in Wireless Delay-tolerant Networks (Working Draft)
Authors: Ana Barroso
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[54]  arXiv:1507.08514 [pdf, other]
Title: Investigating SRAM PUFs in large CPUs and GPUs
Comments: 25 pages, 6 figures. Code in appendix
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:1507.08694 [pdf, other]
Title: Android Tapjacking Vulnerability
Authors: Benjamin Lim
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:1507.08838 [pdf, other]
Title: Auditable Versioned Data Storage Outsourcing
Comments: 31 Pages, 12 Figures, 2 Tables, 4 Pseudocodes
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[57]  arXiv:1507.00245 (cross-list from cs.DC) [pdf, other]
Title: Performance analysis of a Tor-like onion routing implementation
Comments: 6 pages, 6 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[58]  arXiv:1507.01083 (cross-list from cs.SC) [pdf, ps, other]
Title: Interactive certificate for the verification of Wiedemann's Krylov sequence: application to the certification of the determinant, the minimal and the characteristic polynomials of sparse matrices
Subjects: Symbolic Computation (cs.SC); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[59]  arXiv:1507.02266 (cross-list from cs.IT) [pdf, ps, other]
Title: Secure Degrees of Freedom of Multi-user Networks: One-Time-Pads in the Air via Alignment
Comments: To appear in Proceedings of the IEEE, special issue on Physical Layer Security and its Applications. arXiv admin note: text overlap with arXiv:1404.7478, arXiv:1209.5370
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[60]  arXiv:1507.02482 (cross-list from cs.DS) [pdf, other]
Title: Differentially Private Ordinary Least Squares
Authors: Or Sheffet
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[61]  arXiv:1507.03518 (cross-list from cs.RO) [pdf, ps, other]
Title: Adverse Events in Robotic Surgery: A Retrospective Study of 14 Years of FDA Data
Comments: Presented as the J. Maxwell Chamberlain Memorial Paper for adult cardiac surgery at the 50th Annual Meeting of the Society of Thoracic Surgeons in January. See Appendix for more detailed results, discussions, and related work. Updated the headers
Journal-ref: PLOS ONE 11(4) (2016) e0151470
Subjects: Robotics (cs.RO); Cryptography and Security (cs.CR)
[62]  arXiv:1507.04292 (cross-list from cs.NI) [pdf, other]
Title: Resistance against brute-force attacks on stateless forwarding in information centric networking
Comments: ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2015
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[63]  arXiv:1507.04499 (cross-list from cs.DS) [pdf, other]
Title: The Bernstein Mechanism: Function Release under Differential Privacy
Comments: 10 pages; 2 figures; abridged version to appear in AAAI 2017
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[64]  arXiv:1507.04585 (cross-list from cs.CY) [pdf, ps, other]
Title: Design and implementation of an Android application to anonymously analyse locations of the citizens in Barcelona
Comments: M.Sc. Thesis
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[65]  arXiv:1507.04860 (cross-list from cs.NI) [pdf, other]
Title: MiniCPS: A toolkit for security research on CPS Networks
Comments: 8 pages, 6 figures, 1 code listing
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[66]  arXiv:1507.05766 (cross-list from cs.LO) [pdf, ps, other]
Title: Quantitative information flow under generic leakage functions and adaptive adversaries
Authors: M. Boreale (University of Florence), Francesca Pampaloni (IMT - Lucca)
Comments: Revised and extended version of conference paper with the same title appeared in Proc. of FORTE 2014, LNCS
Journal-ref: Logical Methods in Computer Science, Volume 11, Issue 4 (November 10, 2015) lmcs:1606
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[67]  arXiv:1507.06538 (cross-list from cs.NI) [pdf, ps, other]
Title: Algorithmization, requirements analysis and architectural challenges of TraConDa
Journal-ref: International Journal of Advanced Computer Research (IJACR), Volume-5, Issue-19, June-2015 ,pp.145-175
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[68]  arXiv:1507.06673 (cross-list from cs.CY) [pdf, other]
Title: 2001-2013: Survey and Analysis of Major Cyberattacks
Authors: Tavish Vaidya
Comments: Correction of vulnerabilities exploited in Operation Aurora attacks. Zero-day vulnerability in many versions on Microsoft Internet explorer was exploited and not in Adobe Reader
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[69]  arXiv:1507.07479 (cross-list from cs.SE) [pdf, other]
Title: Modularity for Security-Sensitive Workflows
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[70]  arXiv:1507.07872 (cross-list from cs.CY) [pdf, other]
Title: Web Tracking: Mechanisms, Implications, and Defenses
Comments: 29 pages, 212 references
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[71]  arXiv:1507.00239 (cross-list from quant-ph) [pdf, other]
Title: Arbitrarily long relativistic bit commitment
Comments: In an independent and concurrent work, Fehr and Fillinger [FF15] proved a general composition theorem for two-prover commitments which implies a similar bound on the security of the Lunghi et al. protocol than the one derived here
Journal-ref: Phys. Rev. Lett. 115, 250501 (2015)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[72]  arXiv:1507.00592 (cross-list from quant-ph) [pdf, ps, other]
Title: GHZ correlation provides secure Anonymous Veto Protocol
Comments: 5 pages, In this version we provide detail security proof of our quantum protocols
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[73]  arXiv:1507.01625 (cross-list from quant-ph) [pdf, other]
Title: Classical Cryptographic Protocols in a Quantum World
Comments: Full version of an old paper in Crypto'11. Invited to IJQI. This is authors' copy with different formatting
Journal-ref: International Journal of Quantum Information Vol. 13, No. 4 (2015) 1550028 (43 pages)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[74]  arXiv:1507.01929 (cross-list from quant-ph) [pdf, other]
Title: Linear-Optic Heralded Photon Source
Comments: 9 pages, 7 figures
Journal-ref: Phys. Rev. A 92, 033855 (2015)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[75]  arXiv:1507.03765 (cross-list from quant-ph) [pdf, ps, other]
Title: A complete Classification of Quantum Public-key Encryption Protocols
Authors: Chenmiao Wu, Li Yang
Comments: 14 pages, no figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[76]  arXiv:1507.06763 (cross-list from stat.ML) [pdf, ps, other]
Title: Differentially Private Analysis of Outliers
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[77]  arXiv:1507.08555 (cross-list from math.NT) [pdf, ps, other]
Title: Compression for trace zero points on twisted Edwards curves
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[ total of 77 entries: 1-77 ]
[ showing 77 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)