We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2021, skipping first 325

[ total of 338 entries: 1-10 | ... | 296-305 | 306-315 | 316-325 | 326-335 | 336-338 ]
[ showing 10 entries per page: fewer | more | all ]
[326]  arXiv:2111.04609 (cross-list from stat.ML) [pdf, ps, other]
Title: A Private and Computationally-Efficient Estimator for Unbounded Gaussians
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT); Machine Learning (cs.LG)
[327]  arXiv:2111.04906 (cross-list from stat.ML) [pdf, other]
Title: The Role of Adaptive Optimizers for Honest Private Hyperparameter Selection
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[328]  arXiv:2111.05961 (cross-list from math.CO) [pdf, other]
Title: Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms
Subjects: Combinatorics (math.CO); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[329]  arXiv:2111.06578 (cross-list from math.ST) [pdf, ps, other]
Title: Differential privacy and robust statistics in high dimensions
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Machine Learning (stat.ML)
[330]  arXiv:2111.06937 (cross-list from math.NT) [pdf, ps, other]
Title: Reduction Theory of Algebraic Modules and their Successive Minima
Comments: 23 pages, including appendix. Submitted to Journal of Number Theory
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[331]  arXiv:2111.07059 (cross-list from quant-ph) [pdf, other]
Title: Classical and Quantum Algorithms for Variants of Subset-Sum via Dynamic Programming
Comments: 28 pages, 1 figure; v2: title changed, referee's comments incorporated
Journal-ref: Proceedings of the 30th European Symposium on Algorithms (ESA), volume 244 of LIPIcs, pages 6:1--6:18, 2022
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[332]  arXiv:2111.07892 (cross-list from eess.IV) [pdf, ps, other]
Title: Data privacy protection in microscopic image analysis for material data mining
Comments: 14 pages
Subjects: Image and Video Processing (eess.IV); Materials Science (cond-mat.mtrl-sci); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[333]  arXiv:2111.08476 (cross-list from math.GR) [pdf, ps, other]
Title: An analogue of the ElGamal scheme based on the Markovski algorithm
Comments: 10 pages
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR); Combinatorics (math.CO)
[334]  arXiv:2111.08484 (cross-list from quant-ph) [pdf, other]
Title: Asymptotically secure All-or-nothing Quantum Oblivious Transfer
Authors: Ramij Rahaman
Comments: 8 pages, 1 figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[335]  arXiv:2111.09028 (cross-list from quant-ph) [pdf, other]
Title: United Nation Security Council in Quantum World: Experimental Realization of Quantum Anonymous Veto Protocols using IBM Quantum Computer
Comments: Two schemes of quantum anonymous veto which may be of great use to United Nation and other similar organizations, are implemented using IBM quantum computer
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 338 entries: 1-10 | ... | 296-305 | 306-315 | 316-325 | 326-335 | 336-338 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)