We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 360

[ total of 395 entries: 1-25 | ... | 286-310 | 311-335 | 336-360 | 361-385 | 386-395 ]
[ showing 25 entries per page: fewer | more | all ]
[361]  arXiv:2205.14964 (cross-list from cs.SE) [pdf, other]
Title: Effectiveness and Scalability of Fuzzing Techniques in CI/CD Pipelines
Comments: 12 pages, 5 figures
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[362]  arXiv:2205.15128 (cross-list from cs.LG) [pdf, other]
Title: Level Up with RealAEs: Leveraging Domain Constraints in Feature Space to Strengthen Robustness of Android Malware Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[363]  arXiv:2205.15564 (cross-list from cs.LG) [pdf, other]
Title: Secure Federated Clustering
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[364]  arXiv:2205.15592 (cross-list from cs.LG) [pdf, ps, other]
Title: Semantic Autoencoder and Its Potential Usage for Adversarial Attack
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[365]  arXiv:2205.15757 (cross-list from cs.DC) [pdf, other]
Title: Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[366]  arXiv:2205.15896 (cross-list from cs.DC) [pdf, other]
Title: FedWalk: Communication Efficient Federated Unsupervised Node Embedding with Differential Privacy
Authors: Qiying Pan (1), Yifei Zhu (1) ((1) Shanghai Jiao Tong University)
Comments: 10 pages, 8 figures, to be published in the Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[367]  arXiv:2205.15970 (cross-list from cs.LG) [pdf, other]
Title: FedHarmony: Unlearning Scanner Bias with Distributed Data
Comments: Accepted to MICCAI 2022, Code available at: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[368]  arXiv:2205.15992 (cross-list from cs.IT) [pdf, ps, other]
Title: Private Federated Submodel Learning with Sparsification
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[369]  arXiv:2205.00135 (cross-list from math.NT) [pdf, other]
Title: Failing to hash into supersingular isogeny graphs
Comments: 34 pages, 8 figures
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[370]  arXiv:2205.00615 (cross-list from quant-ph) [pdf, other]
Title: Distributed Symmetric Key Exchange: A scalable, quantum-proof key distribution system
Comments: Our protocol has been renamed Distributed Symmetric Key Exchange (DSKE). 11 pages, 6 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[371]  arXiv:2205.01528 (cross-list from eess.AS) [pdf, other]
Title: Attentive activation function for improving end-to-end spoofing countermeasure systems
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[372]  arXiv:2205.01552 (cross-list from eess.SP) [pdf, ps, other]
Title: Physical Layer Security for 6G Systems why it is needed and how to make it happen
Authors: Arsenia Chorti
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[373]  arXiv:2205.03174 (cross-list from quant-ph) [pdf, other]
Title: Analysis of Multiple Overlapping Paths algorithms for Secure Key Exchange in Large-Scale Quantum Networks
Comments: 18 pages, 12 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[374]  arXiv:2205.03976 (cross-list from math.NT) [pdf, other]
Title: Orientations and cycles in supersingular isogeny graphs
Comments: 41 pages, 7 figures
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[375]  arXiv:2205.04220 (cross-list from quant-ph) [pdf, other]
Title: On recovering block cipher secret keys in the cold boot attack setting
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[376]  arXiv:2205.04256 (cross-list from econ.GN) [pdf, other]
Title: SoK: Blockchain Decentralization
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Databases (cs.DB); Social and Information Networks (cs.SI); Statistical Finance (q-fin.ST)
[377]  arXiv:2205.04656 (cross-list from quant-ph) [pdf, ps, other]
Title: Classical verification of quantum depth
Comments: 39 pages
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[378]  arXiv:2205.05522 (cross-list from stat.ME) [pdf, other]
Title: Private Hypothesis Testing for Social Sciences
Comments: There are no significant alterations from version 1. We mistakenly included metadata from a journal Latex template while using its document class and it's now removed to avoid any confusion. This article has been accepted at the Workshop on Theory and Practice of Differential Privacy at ICML 2022
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR)
[379]  arXiv:2205.08435 (cross-list from q-fin.RM) [pdf, other]
Title: Cyber Risk Assessment for Capital Management
Comments: This paper was first presented on July 5, 2021, at the 24th International Congress on Insurance: Mathematics and Economics
Subjects: Risk Management (q-fin.RM); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[380]  arXiv:2205.08567 (cross-list from astro-ph.IM) [pdf, other]
Title: Internet of Spacecraft for Multi-planetary Defense and Prosperity
Authors: Yiming Huo
Comments: 28 pages, 19 figures, submitted to a journal as an invited paper
Subjects: Instrumentation and Methods for Astrophysics (astro-ph.IM); Earth and Planetary Astrophysics (astro-ph.EP); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[381]  arXiv:2205.08569 (cross-list from q-fin.GN) [pdf, other]
Title: Investigating the concentration of High Yield Investment Programs in the United Kingdom
Subjects: General Finance (q-fin.GN); Cryptography and Security (cs.CR)
[382]  arXiv:2205.09169 (cross-list from quant-ph) [pdf, other]
Title: Anonymous conference key agreement in linear quantum networks
Comments: 10 pages of main text, 3 figures in main text, 3 tables in main text, 10 pages of appendices, 1 figure in appendices, 3 tables in appendices
Journal-ref: Quantum 7, 1117 (2023)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[383]  arXiv:2205.09303 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum Money Generated by Multiple Untrustworthy Banks
Authors: Yuichi Sano
Comments: 21 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[384]  arXiv:2205.09494 (cross-list from math.OC) [pdf, other]
Title: Differentially private Riemannian optimization
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[385]  arXiv:2205.10488 (cross-list from quant-ph) [pdf, ps, other]
Title: Cryptanalysis of Three Quantum Money Schemes
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 395 entries: 1-25 | ... | 286-310 | 311-335 | 336-360 | 361-385 | 386-395 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)