We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020, skipping first 275

[ total of 314 entries: 1-25 | ... | 201-225 | 226-250 | 251-275 | 276-300 | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]
[276]  arXiv:2004.13095 (cross-list from cs.IT) [pdf, other]
Title: Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage
Comments: To appear in ACM Workshop on Information Hiding and Multimedia Security 2020
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[277]  arXiv:2004.13115 (cross-list from cs.DB) [pdf, other]
Title: Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data -- Full Version
Comments: A preliminary version of this work was accepted in VLDB 2019. This version has been accepted in IEEE Transactions on Knowledge and Data Engineering (TKDE). The final published version of this paper may differ from this accepted version
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Information Theory (cs.IT)
[278]  arXiv:2004.13289 (cross-list from cs.LO) [pdf, ps, other]
Title: Modeling an Asynchronous Circuit Dedicated to the Protection Against Physical Attacks
Comments: In Proceedings MARS 2020, arXiv:2004.12403
Journal-ref: EPTCS 316, 2020, pp. 200-239
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[279]  arXiv:2004.13328 (cross-list from cs.LG) [pdf, other]
Title: Privacy Guidelines for Contact Tracing Applications
Comments: 10 pages, 0 images
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC)
[280]  arXiv:2004.13598 (cross-list from cs.LG) [pdf, other]
Title: Private Dataset Generation Using Privacy Preserving Collaborative Learning
Authors: Amit Chaulwar
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[281]  arXiv:2004.13799 (cross-list from cs.LG) [pdf, other]
Title: Minority Reports Defense: Defending Against Adversarial Patches
Comments: 9 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[282]  arXiv:2004.13938 (cross-list from cs.IT) [pdf, ps, other]
Title: Families of sequences with good family complexity and cross-correlation measure
Authors: Oğuz Yayla
Comments: 13 pages. Comments are welcome!
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Number Theory (math.NT)
[283]  arXiv:2004.14174 (cross-list from cs.CL) [pdf, other]
Title: Reevaluating Adversarial Examples in Natural Language
Comments: 15 pages; 9 Tables; 5 Figures
Journal-ref: Findings of the Association for Computational Linguistics: EMNLP 2020
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[284]  arXiv:2004.14477 (cross-list from cs.LG) [pdf, other]
Title: Packet2Vec: Utilizing Word2Vec for Feature Extraction in Packet Data
Comments: MLDM 2019
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[285]  arXiv:2004.14495 (cross-list from cs.CY) [pdf, ps, other]
Title: Balancing Personal Privacy and Public Safety during COVID-19: The Case of South Korea
Comments: 11pages
Journal-ref: 2020, Vol.8
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[286]  arXiv:2004.14527 (cross-list from cs.DC) [pdf, other]
Title: From Byzantine Replication to Blockchain: Consensus is only the Beginning
Comments: This is a preprint of a paper to appear on the 50th IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN'20)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[287]  arXiv:2004.14746 (cross-list from cs.DC) [pdf, ps, other]
Title: Cloud+: A safe and restrained data access control program for cloud
Authors: Sarath Pathari
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[288]  arXiv:2004.14756 (cross-list from cs.LG) [pdf, other]
Title: Robustness Certification of Generative Models
Comments: Prior version submitted to ICLR 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Programming Languages (cs.PL); Machine Learning (stat.ML)
[289]  arXiv:2004.14986 (cross-list from cs.IT) [pdf, other]
Title: Compound Secure Groupcast: Key Assignment for Selected Broadcasting
Authors: Hua Sun
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[290]  arXiv:2004.15015 (cross-list from cs.CL) [pdf, other]
Title: Imitation Attacks and Defenses for Black-box Machine Translation Systems
Comments: EMNLP 2020
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[291]  arXiv:2004.00092 (cross-list from eess.SP) [pdf, other]
Title: VoltKey: Using Power Line Noise for Zero-Involvement Pairing and Authentication (Demo Abstract)
Comments: Tools Demo: Accepted at Information Processing in Sensor Networks 2020
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[292]  arXiv:2004.01330 (cross-list from quant-ph) [pdf, other]
Title: Detecting Temporal Correlation via Quantum Random Number Generation
Authors: Yutaka Shikano (Quantum Computing Center, Keio University & Institute for Quantum Stuides, Chapman University), Kentaro Tamura (Department of Applied Physics and Physico-Informatics, Keio University), Rudy Raymond (IBM Research -- Tokyo & Quantum Computing Center, Keio University)
Comments: In Proceedings QSQW 2020, arXiv:2004.01061
Journal-ref: EPTCS 315, 2020, pp. 18-25
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Data Analysis, Statistics and Probability (physics.data-an)
[293]  arXiv:2004.01872 (cross-list from eess.SP) [pdf, ps, other]
Title: Low-complexity and Reliable Transforms for Physical Unclonable Functions
Comments: To appear in IEEE International Conference on Acoustics, Speech, and Signal Processing 2020
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT); Multimedia (cs.MM)
[294]  arXiv:2004.01976 (cross-list from quant-ph) [pdf, ps, other]
Title: Scalable Pseudorandom Quantum States
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[295]  arXiv:2004.02257 (cross-list from math.OC) [pdf, ps, other]
Title: Security Analysis and Fault Detection Against Stealthy Replay Attacks
Comments: 12 pages, 5 figures, grammatical errors and typos corrected
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR)
[296]  arXiv:2004.02744 (cross-list from math.OC) [pdf, ps, other]
Title: Differentially Private Formation Control
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR)
[297]  arXiv:2004.03428 (cross-list from eess.AS) [pdf, other]
Title: Universal Adversarial Perturbations Generative Network for Speaker Recognition
Comments: Accepted by ICME2020
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[298]  arXiv:2004.03434 (cross-list from eess.AS) [pdf, other]
Title: Learning to fool the speaker recognition
Comments: Accepted by ICASSP2020
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[299]  arXiv:2004.03921 (cross-list from math.OC) [pdf, other]
Title: Differentially Private Optimal Power Flow for Distribution Grids
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[300]  arXiv:2004.04680 (cross-list from math.OC) [pdf, other]
Title: A Private and Finite-Time Algorithm for Solving a Distributed System of Linear Equations
Comments: 8 pages, 2 figures
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Systems and Control (eess.SY)
[ total of 314 entries: 1-25 | ... | 201-225 | 226-250 | 251-275 | 276-300 | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)