We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 150

[ total of 374 entries: 1-25 | ... | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | ... | 351-374 ]
[ showing 25 entries per page: fewer | more | all ]
[151]  arXiv:2206.10835 [pdf, other]
Title: Interpreting Graph-based Sybil Detection Methods as Low-Pass Filtering
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[152]  arXiv:2206.10898 [src]
Title: Q-rMinRank attack: The first quantum approach for key recovery attacks on Rainbow
Comments: The paper has been withdrawn because the research work is still in progress
Subjects: Cryptography and Security (cs.CR)
[153]  arXiv:2206.10927 [pdf]
Title: Exploration of User Privacy in 802.11 Probe Requests with MAC Address Randomization Using Temporal Pattern Analysis
Comments: 10 pages, 5 figures, submitted to LBS2022 conference
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[154]  arXiv:2206.10963 [pdf, other]
Title: FLaaS: Cross-App On-device Federated Learning in Mobile Environments
Comments: 12 pages, 6 figures, 46 references
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[155]  arXiv:2206.11024 [pdf, other]
Title: ROSE: A RObust and SEcure DNN Watermarking
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[156]  arXiv:2206.11133 [pdf, other]
Title: Multi-party Secure Broad Learning System for Privacy Preserving
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2206.11171 [pdf, other]
Title: Attack Techniques and Threat Identification for Vulnerabilities
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[158]  arXiv:2206.11175 [pdf, other]
Title: HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[159]  arXiv:2206.11182 [pdf, other]
Title: Vulnerability Prioritization: An Offensive Security Approach
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[160]  arXiv:2206.11402 [pdf, other]
Title: Optimal Local Bayesian Differential Privacy over Markov Chains
Journal-ref: In AAMAS (pp. 1563-1565) 2022
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2206.11411 [pdf, other]
Title: Linear recurrent cryptography: golden-like cryptography for higher order linear recurrences
Comments: 27 pages, 1 figure
Journal-ref: Discrete Mathematics, Algorithms and Applications, 2022
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Number Theory (math.NT); Spectral Theory (math.SP)
[162]  arXiv:2206.11519 [pdf]
Title: Homomorphic Sortition -- Secret Leader Election for PoS Blockchains
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[163]  arXiv:2206.11586 [pdf, ps, other]
Title: MAGIC: A Method for Assessing Cyber Incidents Occurrence
Comments: 16 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2206.11641 [pdf, other]
Title: Advancing Blockchain-based Federated Learning through Verifiable Off-chain Computations
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[165]  arXiv:2206.11793 [pdf, other]
Title: Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Comments: Paper accepted at the 29th IEEE International Conference on Image Processing (IEEE ICIP)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[166]  arXiv:2206.11821 [pdf, other]
Title: A Survey of DeFi Security: Challenges and Opportunities
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2206.11840 [pdf, other]
Title: Design Exploration and Security Assessment of PUF-on-PUF Implementations
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[168]  arXiv:2206.11961 [pdf, ps, other]
Title: LRPC codes with multiple syndromes: near ideal-size KEMs without ideals
Comments: 31 pages
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2206.11974 [pdf, other]
Title: Keep Your Transactions On Short Leashes
Authors: Bennet Yee
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2206.12093 [pdf, ps, other]
Title: An Improved Lattice-Based Ring Signature with Unclaimable Anonymity in the Standard Model
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2206.12224 [pdf, other]
Title: MPClan: Protocol Suite for Privacy-Conscious Computations
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (cs.LG)
[172]  arXiv:2206.12227 [pdf, other]
Title: Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[173]  arXiv:2206.12236 [pdf, other]
Title: Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison
Comments: Accepted by EAI SecureComm 2022, 20 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2206.12251 [pdf]
Title: Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[175]  arXiv:2206.12447 [pdf, other]
Title: XMD: An Expansive Hardware-telemetry based Malware Detector to enhance Endpoint Detection
Subjects: Cryptography and Security (cs.CR)
[ total of 374 entries: 1-25 | ... | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | ... | 351-374 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2302, contact, help  (Access key information)