We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 25

[ total of 395 entries: 1-50 | 26-75 | 76-125 | 126-175 | 176-225 | ... | 376-395 ]
[ showing 50 entries per page: fewer | more | all ]
[26]  arXiv:2205.01429 [pdf, other]
Title: Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model
Comments: Full version of the paper accepted at ACM CCS 2022; The first and second authors made equal contribution
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[27]  arXiv:2205.01547 [pdf, ps, other]
Title: Effective Security by Obscurity
Comments: 28 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2205.01646 [pdf, other]
Title: Implementation of an efficient, portable and platform-agnostic cryptocurrency mining algorithm for Internet of Things devices
Authors: Kinshuk Dua
Comments: 10 pages, 9 figures, 4 tables. Submitted to Array, Elsevier
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[29]  arXiv:2205.01728 [pdf, ps, other]
Title: A Secure File Sharing System Based on IPFS and Blockchain
Comments: 4 pages, 4 figures, published in Proceedings of the 2020 2nd International Electronics Communication Conference
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[30]  arXiv:2205.01932 [pdf, other]
Title: Early Detection of Spam Domains with Passive DNS and SPF
Authors: Simon Fernandez (LIG), Maciej Korczyński (LIG), Andrzej Duda (LIG)
Journal-ref: Passive and Active Measurement, 13210, Springer International Publishing, pp.30-49, 2022, Lecture Notes in Computer Science
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2205.01973 [pdf, other]
Title: V'CER: Efficient Certificate Validation in Constrained Networks
Comments: 18 pages, 7 figures, to be published at USENIX Security 2022
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2205.02089 [pdf, other]
Title: A New Dimensionality Reduction Method Based on Hensel's Compression for Privacy Protection in Federated Learning
Comments: 6 pages, 7 figures
Journal-ref: 2023 International Conference on Computing, Networking and Communications (ICNC
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[33]  arXiv:2205.02116 [pdf, other]
Title: Optimizing One-pixel Black-box Adversarial Attacks
Comments: 9 pasges, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[34]  arXiv:2205.02117 [pdf, ps, other]
Title: ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2205.02130 [pdf, other]
Title: The Limits of Word Level Differential Privacy
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[36]  arXiv:2205.02298 [pdf, other]
Title: Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Comments: 11 pages, 6 figures, submitting to NeurIPS 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[37]  arXiv:2205.02348 [pdf, other]
Title: Secure Decentralized Online Gaming with Lending Functionalities
Comments: 6 pages, 6 figures, BCCA conference 2022
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[38]  arXiv:2205.02506 [pdf, other]
Title: Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[39]  arXiv:2205.02544 [pdf, other]
Title: The Race to the Vulnerable: Measuring the Log4j Shell Incident
Comments: Proc. of Network Traffic Measurement and Analysis Conference (TMA '22), camera ready
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2205.02648 [pdf, ps, other]
Title: Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python
Comments: Paper published in the proceedings of ESORICS 2022
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2205.02753 [pdf, other]
Title: Encrypted, Anonymized System for Protected Health Information Verification Built via Proof of Stake
Authors: Houjun Liu
Comments: 7 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2205.02963 [pdf, other]
Title: Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA
Comments: 13 pages paper and 4 pages appendix. To be published at 2022 IEEE Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[43]  arXiv:2205.02971 [pdf, other]
Title: Transferable Cross-Chain Options
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA)
[44]  arXiv:2205.02997 [pdf, ps, other]
Title: Public key cryptography based on skew dihedral group rings
Comments: arXiv admin note: substantial text overlap with arXiv:2112.07798
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[45]  arXiv:2205.03009 [pdf, other]
Title: Watching the watchers: bias and vulnerability in remote proctoring software
Comments: To appear in USENIX Security Symposium 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[46]  arXiv:2205.03040 [pdf, other]
Title: Fusion: Efficient and Secure Inference Resilient to Malicious Servers
Comments: 19 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2205.03048 [pdf, ps, other]
Title: A Verifiable Multiparty Computation Solver for the Assignment Problem and Applications to Air Traffic Management
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2205.03083 [pdf, ps, other]
Title: Heal the Privacy: Functional Encryption and Privacy-Preserving Analytics
Comments: Originally published at IEEE Melecon 2022
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2205.03170 [pdf, other]
Title: Event Concealment and Concealability Enforcement in Discrete Event Systems Under Partial Observation
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[50]  arXiv:2205.03190 [pdf, other]
Title: Imperceptible Backdoor Attack: From Input Space to Feature Representation
Comments: IJCAI 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[51]  arXiv:2205.03205 [pdf, other]
Title: Unlimited Lives: Secure In-Process Rollback with Isolated Domains
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2205.03255 [pdf, ps, other]
Title: Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability
Authors: Bagus Santoso (The University of Electro-Communications), Yasuhiko Ikematsu (Kyushu University), Shuhei Nakamura (Nihon University), Takanori Yasuda (Okayama University of Science)
Comments: The short version of this paper has been submitted to ISITA 2022
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2205.03322 [pdf, ps, other]
Title: Private delegated computations using strong isolation
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS); Programming Languages (cs.PL)
[54]  arXiv:2205.03326 [pdf, other]
Title: Leveraging strategic connection migration-powered traffic splitting for privacy
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2205.03332 [pdf, ps, other]
Title: The Supervisionary proof-checking kernel (or: a work-in-progress towards proof generating code)
Comments: Two page abstract, presented at PriSC 2022
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[56]  arXiv:2205.03336 [pdf, other]
Title: Statistical Data Privacy: A Song of Privacy and Utility
Comments: Submitted to Annual Review of Statistics and Its Application, March 2023 Volume
Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
[57]  arXiv:2205.03469 [pdf, ps, other]
Title: Using cyber threat intelligence to support adversary understanding applied to the Russia-Ukraine conflict
Comments: in Spanish language
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2205.03470 [pdf, other]
Title: Privacy accounting $\varepsilon$conomics: Improving differential privacy composition via a posteriori bounds
Comments: 25 pages, 2 figures. The formal proof and the code for generating the plots can be found at this https URL Current version: fixed a mistake in the legend of Fig. 1
Journal-ref: Proceedings on Privacy Enhancing Technologies 3 (2022) 222-246
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2205.03511 [pdf, ps, other]
Title: Lattices, Homomorphic Encryption, and CKKS
Authors: Vir Pathak
Comments: One should note that CKKS has been proven to have some vulnerabilities due to an attack from Micciancio and Li. In particular, CKKS does not satisfy the security definition which they propose for for approximate encryption schemes (CKKS is one such approximate encryption scheme)
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2205.03537 [pdf, other]
Title: Anomaly Detection in Intra-Vehicle Networks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[61]  arXiv:2205.03746 [pdf, other]
Title: Reasoning about inter-procedural security requirements in IoT applications
Journal-ref: Advanced Information Networking and Applications; AINA 2022; Lecture Notes in Networks and Systems, vol 451
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2205.03788 [pdf, other]
Title: Privacy Preserving Data Analytics in 5G-Enabled IoT for the Financial Industry
Authors: Cheng Lock Lim
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2205.03822 [pdf, other]
Title: Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[64]  arXiv:2205.03850 [pdf, other]
Title: SeqNet: An Efficient Neural Network for Automatic Malware Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[65]  arXiv:2205.03890 [pdf, ps, other]
Title: Entropically secure cipher for messages generated by Markov chains with unknown statistics
Authors: Boris Ryabko
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2205.03894 [pdf, ps, other]
Title: VPN: Verification of Poisoning in Neural Networks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[67]  arXiv:2205.03915 [pdf, other]
Title: FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2205.03971 [pdf, other]
Title: Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing
Journal-ref: 2023 IEEE Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[69]  arXiv:2205.04002 [pdf, other]
Title: Towards a High-performance and Secure Memory System and Architecture for Emerging Applications
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[70]  arXiv:2205.04005 [pdf, ps, other]
Title: A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection
Comments: 43 pages, 40 tables
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2205.04108 [pdf, other]
Title: On the Storage Overhead of Proof-of-Work Blockchains
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2205.04145 [pdf, ps, other]
Title: Verifying Integrity of Deep Ensemble Models by Lossless Black-box Watermarking with Sensitive Samples
Authors: Lina Lin, Hanzhou Wu
Comments: A new paragraph is added to the last section in this version compared to the previous version
Journal-ref: IEEE International Symposium on Digital Forensics and Security 2022 (Final version at IEEE Xplore)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[73]  arXiv:2205.04210 [pdf, other]
Title: Boolean Expressions in Firewall Analysis
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2205.04229 [pdf, ps, other]
Title: Near-collisions and their Impact on Biometric Security
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2205.04293 [pdf, other]
Title: Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks
Subjects: Cryptography and Security (cs.CR)
[ total of 395 entries: 1-50 | 26-75 | 76-125 | 126-175 | 176-225 | ... | 376-395 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)