We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020, skipping first 300

[ total of 314 entries: 1-25 | ... | 226-250 | 251-275 | 276-300 | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]
[301]  arXiv:2004.08705 (cross-list from stat.ML) [pdf, other]
Title: Protecting Classifiers From Attacks. A Bayesian Approach
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Computation (stat.CO)
[302]  arXiv:2004.08742 (cross-list from eess.SP) [pdf, other]
Title: Device Authentication Codes based on RF Fingerprinting using Deep Learning
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[303]  arXiv:2004.08800 (cross-list from math.CV) [pdf, ps, other]
Title: Verteilung der Primzahlen und Asymptotik bezüglich der Kongruenzen der rationalen Punkte auf elliptischen Kurven über einem endlichen Körper
Authors: Thi Altenschmidt
Comments: in German, 33 pages
Subjects: Complex Variables (math.CV); Cryptography and Security (cs.CR); Algebraic Geometry (math.AG); Number Theory (math.NT)
[304]  arXiv:2004.08849 (cross-list from eess.AS) [pdf, other]
Title: The Attacker's Perspective on Automatic Speaker Verification: An Overview
Comments: 5 pages, 1 figure, Submitted to Interspeech 2020
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR)
[305]  arXiv:2004.09245 (cross-list from math.NT) [src]
Title: A power APN function CCZ-equivalent to Kasami function in even dimension
Comments: My colleagues have identified some technical errors which require redress
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[306]  arXiv:2004.09909 (cross-list from eess.SP) [pdf, other]
Title: Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[307]  arXiv:2004.10228 (cross-list from eess.SP) [pdf, ps, other]
Title: Non-Orthogonal Waveforms in Secure Communications
Authors: Tongyang Xu
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[308]  arXiv:2004.11596 (cross-list from quant-ph) [pdf]
Title: Quantum Key Recycling with Optimal Key Recycling Rate based on Error Rate
Comments: 8 pages, 3 figures. There is a related study here (arXiv:2005.14488 [quant-ph])
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[309]  arXiv:2004.11738 (cross-list from quant-ph) [pdf]
Title: Multiparty Quantum Key Agreement That is Secure Against Collusive Attacks
Comments: The paper contains 8 pages and one figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[310]  arXiv:2004.12621 (cross-list from quant-ph) [pdf, ps, other]
Title: Succinct Blind Quantum Computation Using a Random Oracle
Authors: Jiayu Zhang
Comments: 231 pages, 8 figures, 1 table. Add a separate section for extended technical overview; several readability improvements
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[311]  arXiv:2004.13874 (cross-list from eess.IV) [pdf, other]
Title: Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[312]  arXiv:2004.13921 (cross-list from quant-ph) [pdf, other]
Title: Provably-secure symmetric private information retrieval with quantum cryptography
Comments: 19 pages
Journal-ref: Entropy 23, 54 (2021)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[313]  arXiv:2004.13927 (cross-list from math.OC) [pdf, other]
Title: Dynamic Anomaly Detection with High-fidelity Simulators: A Convex Optimization Approach
Comments: 19 pages
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR)
[314]  arXiv:2004.01304 (cross-list from q-fin.TR) [pdf, other]
Title: While Stability Lasts: A Stochastic Model of Non-Custodial Stablecoins
Subjects: Trading and Market Microstructure (q-fin.TR); Cryptography and Security (cs.CR)
[ total of 314 entries: 1-25 | ... | 226-250 | 251-275 | 276-300 | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2301, contact, help  (Access key information)