We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2021, skipping first 325

[ total of 338 entries: 1-25 | ... | 251-275 | 276-300 | 301-325 | 326-338 ]
[ showing 25 entries per page: fewer | more | all ]
[326]  arXiv:2111.04609 (cross-list from stat.ML) [pdf, ps, other]
Title: A Private and Computationally-Efficient Estimator for Unbounded Gaussians
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT); Machine Learning (cs.LG)
[327]  arXiv:2111.04906 (cross-list from stat.ML) [pdf, other]
Title: The Role of Adaptive Optimizers for Honest Private Hyperparameter Selection
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[328]  arXiv:2111.05961 (cross-list from math.CO) [pdf, other]
Title: Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms
Subjects: Combinatorics (math.CO); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[329]  arXiv:2111.06578 (cross-list from math.ST) [pdf, ps, other]
Title: Differential privacy and robust statistics in high dimensions
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Machine Learning (stat.ML)
[330]  arXiv:2111.06937 (cross-list from math.NT) [pdf, ps, other]
Title: Reduction Theory of Algebraic Modules and their Successive Minima
Comments: 23 pages, including appendix. Submitted to Journal of Number Theory
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[331]  arXiv:2111.07059 (cross-list from quant-ph) [pdf, other]
Title: Classical and quantum dynamic programming for Subset-Sum and variants
Comments: 29 pages, 1 figure
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[332]  arXiv:2111.07892 (cross-list from eess.IV) [pdf]
Title: Data privacy protection in microscopic image analysis for material data mining
Comments: 14 pages
Subjects: Image and Video Processing (eess.IV); Materials Science (cond-mat.mtrl-sci); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[333]  arXiv:2111.08476 (cross-list from math.GR) [pdf, ps, other]
Title: An analogue of the ElGamal scheme based on the Markovski algorithm
Comments: 10 pages
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR); Combinatorics (math.CO)
[334]  arXiv:2111.08484 (cross-list from quant-ph) [pdf, other]
Title: Asymptotically secure All-or-nothing Quantum Oblivious Transfer
Authors: Ramij Rahaman
Comments: 8 pages, 1 figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[335]  arXiv:2111.09028 (cross-list from quant-ph) [pdf, other]
Title: United Nation Security Council in Quantum World: Experimental Realization of Quantum Anonymous Veto Protocols using IBM Quantum Computer
Comments: Two schemes of quantum anonymous veto which may be of great use to United Nation and other similar organizations, are implemented using IBM quantum computer
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[336]  arXiv:2111.09506 (cross-list from quant-ph) [pdf, other]
Title: Certified Random Number Generation from Quantum Steering
Comments: 7 pages, 3 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Optics (physics.optics)
[337]  arXiv:2111.11867 (cross-list from quant-ph) [pdf, other]
Title: Quantum Analogue of Entropy Based DDoS Detection
Authors: Del Rajan
Comments: Revised version, 5 pages main text, 3 pages supplementary material
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[338]  arXiv:2111.14992 (cross-list from eess.SP) [pdf, other]
Title: Network Traffic Shaping for Enhancing Privacy in IoT Systems
Comments: 18 pages, 10 figures, submitted to IEEE Transactions on Networking
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[ total of 338 entries: 1-25 | ... | 251-275 | 276-300 | 301-325 | 326-338 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2206, contact, help  (Access key information)