We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2021, skipping first 320

[ total of 338 entries: 1-10 | ... | 291-300 | 301-310 | 311-320 | 321-330 | 331-338 ]
[ showing 10 entries per page: fewer | more | all ]
[321]  arXiv:2111.01481 (cross-list from math.NT) [pdf, ps, other]
Title: The supersingular isogeny path and endomorphism ring problems are equivalent
Comments: FOCS 2021
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[322]  arXiv:2111.02842 (cross-list from stat.ML) [pdf, other]
Title: Adversarial Attacks on Graph Classification via Bayesian Optimisation
Comments: NeurIPS 2021. 11 pages, 8 figures, 2 tables (24 pages, 17 figures, 8 tables including references and appendices)
Subjects: Machine Learning (stat.ML); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[323]  arXiv:2111.03775 (cross-list from quant-ph) [pdf, ps, other]
Title: Long-distance twin-field quantum key distribution with entangled sources
Comments: 4+4 pages, 5 figures
Journal-ref: Opt. Lett. 46, 5529 (2021)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[324]  arXiv:2111.04433 (cross-list from eess.AS) [pdf, other]
Title: RawBoost: A Raw Data Boosting and Augmentation Method applied to Automatic Speaker Verification Anti-Spoofing
Comments: Accepted to IEEE ICASSP 2022
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD); Signal Processing (eess.SP)
[325]  arXiv:2111.04483 (cross-list from econ.GN) [pdf, other]
Title: Revisiting the Properties of Money
Comments: 27 pages, 1 figure
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR)
[326]  arXiv:2111.04609 (cross-list from stat.ML) [pdf, ps, other]
Title: A Private and Computationally-Efficient Estimator for Unbounded Gaussians
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT); Machine Learning (cs.LG)
[327]  arXiv:2111.04906 (cross-list from stat.ML) [pdf, other]
Title: The Role of Adaptive Optimizers for Honest Private Hyperparameter Selection
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[328]  arXiv:2111.05961 (cross-list from math.CO) [pdf, other]
Title: Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms
Subjects: Combinatorics (math.CO); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[329]  arXiv:2111.06578 (cross-list from math.ST) [pdf, ps, other]
Title: Differential privacy and robust statistics in high dimensions
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Machine Learning (stat.ML)
[330]  arXiv:2111.06937 (cross-list from math.NT) [pdf, ps, other]
Title: Reduction Theory of Algebraic Modules and their Successive Minima
Comments: 23 pages, including appendix. Submitted to Journal of Number Theory
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[ total of 338 entries: 1-10 | ... | 291-300 | 301-310 | 311-320 | 321-330 | 331-338 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)