We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jul 2015, skipping first 25

[ total of 77 entries: 1-25 | 26-50 | 51-75 | 76-77 ]
[ showing 25 entries per page: fewer | more | all ]
[26]  arXiv:1507.03674 [pdf, ps, other]
Title: Algorithm for Solving Massively Underdefined Systems of Multivariate Quadratic Equations over Finite Fields
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[27]  arXiv:1507.04089 [pdf, ps, other]
Title: False shares in verifiable secret sharing with finite field commitments
Authors: Hua Lu, Jack Peterson
Comments: 1 page
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:1507.04491 [pdf, other]
Title: Vehicle Authentication via Monolithically Certified Public Key and Attributes
Comments: Accepted in Wireless Networks June 2015, 4 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[29]  arXiv:1507.05085 [pdf, ps, other]
Title: Secure management of logs in internet of things
Authors: Udit Gupta
Comments: 6 pages, 1 table
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:1507.05206 [pdf, other]
Title: Interception in Distance-Vector Routing Networks
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Networking and Internet Architecture (cs.NI)
[31]  arXiv:1507.05278 [pdf, other]
Title: Toward automatic verification of quantum cryptographic protocols
Comments: Accepted by Concur'15
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[32]  arXiv:1507.05316 [pdf, other]
Title: Properties and constructions of coincident functions
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:1507.05644 [pdf, ps, other]
Title: Security Issues in Data Warehouse
Comments: 5th European Conference of Computer Science (ECCS 14)
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:1507.05724 [pdf, ps, other]
Title: HORNET: High-speed Onion Routing at the Network Layer
Comments: 14 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:1507.06183 [pdf, ps, other]
Title: Optimal Selfish Mining Strategies in Bitcoin
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:1507.06189 [pdf, ps, other]
Title: On Dynamic Flow-Sensitive Floating-Label Systems
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[37]  arXiv:1507.06353 [pdf, other]
Title: ShakeMe: Key Generation From Shared Motion
Comments: The paper is accepted to the 13th IEEE International Conference on Pervasive Intelligence and Computing (PIComp-2015)
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:1507.06368 [pdf, ps, other]
Title: Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:1507.06427 [pdf, ps, other]
Title: Evaluation of Contactless Smartcard Antennas
Comments: University of Applied Sciences Upper Austria, JR-Center u'smile, Technical report, 29 pages, 27 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[40]  arXiv:1507.06769 [pdf, other]
Title: Modelling and Analysis Network Security -- a PVCCS approach
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:1507.06812 [pdf, ps, other]
Title: D-DEMOS: A distributed, end-to-end verifiable, internet voting system
Comments: 17 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[42]  arXiv:1507.06955 [pdf, other]
Title: Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Comments: This paper has been accepted at the 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2016. The final publication is available at link.springer.com
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:1507.07363 [pdf, ps, other]
Title: A note on the security of the hHB protocol
Authors: Carl Löndahl
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:1507.07739 [pdf, other]
Title: Forensic Analysis of WhatsApp Messenger on Android Smartphones
Authors: Cosimo Anglano
Comments: (c)2014. This manuscript version is made available under the CC-BY-NC-ND 4.0 license this http URL
Journal-ref: Digital Investigation, Vol. 11, No. 3, pp. 201-213, September 2014
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:1507.07816 [pdf, ps, other]
Title: Comparison between security majors in virtual machine and linux containers
Authors: Udit Gupta
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:1507.07848 [pdf, ps, other]
Title: Public-key cryptosystem based on invariants of diagonalizable groups
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:1507.07851 [pdf, other]
Title: On the Unicity of Smartphone Applications
Comments: 10 pages, 9 Figures, Appeared at ACM CCS Workshop on Privacy in Electronic Society (WPES) 2015
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:1507.08071 [pdf, ps, other]
Title: Private Stream Aggregation Revisited
Comments: 33 pages, 2 tables, 1 figure
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:1507.08094 [pdf, other]
Title: A SAT-based Public Key Cryptography Scheme
Comments: 7 pages + appendix, 1 figure + 6 in appendix
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:1507.08153 [pdf, other]
Title: A Declarative Framework for Specifying and Enforcing Purpose-aware Policies
Comments: Extended version of the paper accepted at the 11th International Workshop on Security and Trust Management (STM 2015)
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[ total of 77 entries: 1-25 | 26-50 | 51-75 | 76-77 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)