We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 365

[ total of 375 entries: 1-10 | ... | 336-345 | 346-355 | 356-365 | 366-375 ]
[ showing 10 entries per page: fewer | more | all ]
[366]  arXiv:2206.08401 (cross-list from econ.GN) [pdf, other]
Title: Is decentralized finance actually decentralized? A social network analysis of the Aave protocol on the Ethereum blockchain
Comments: Accepted at 29th Annual Global Finance Conference featuring Professor Robert Engle, The 2003 Nobel Laureate in Economic Sciences
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Statistical Finance (q-fin.ST); Computation (stat.CO)
[367]  arXiv:2206.09103 (cross-list from eess.AS) [pdf, other]
Title: Identifying Source Speakers for Voice Conversion based Spoofing Attacks on Speaker Verification Systems
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR)
[368]  arXiv:2206.09159 (cross-list from quant-ph) [pdf, other]
Title: Beating the fault-tolerance bound and security loopholes for Byzantine agreement with a quantum solution
Comments: 21 pages, 7 figures. All comments are welcome!
Journal-ref: Research 6, 0272 (2023)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[369]  arXiv:2206.11750 (cross-list from eess.AS) [pdf, other]
Title: Towards End-to-End Private Automatic Speaker Recognition
Comments: Accepted for publication at Interspeech 2022
Journal-ref: Proc. Interspeech 2022, 2798-2802
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR)
[370]  arXiv:2206.11973 (cross-list from q-fin.RM) [pdf, ps, other]
Title: Liquidity Risks in Lending Protocols: Evidence from Aave Protocol
Subjects: Risk Management (q-fin.RM); Cryptography and Security (cs.CR); Computational Finance (q-fin.CP); Trading and Market Microstructure (q-fin.TR)
[371]  arXiv:2206.12527 (cross-list from eess.SP) [pdf, other]
Title: Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids
Comments: 5 pages, 5 figures
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[372]  arXiv:2206.13330 (cross-list from quant-ph) [pdf, ps, other]
Title: Multi-agent blind quantum computation without universal cluster states
Authors: Shuxiang Cao
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[373]  arXiv:2206.14371 (cross-list from stat.ML) [pdf, other]
Title: Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
Comments: A preprint work
Subjects: Machine Learning (stat.ML); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[374]  arXiv:2206.14449 (cross-list from math.ST) [pdf, other]
Title: Hypothesis Testing for Differentially Private Linear Regression
Comments: 62 pages, 18 figures
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR)
[375]  arXiv:2206.14929 (cross-list from quant-ph) [pdf, ps, other]
Title: Succinct Classical Verification of Quantum Computation
Comments: CRYPTO 2022
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 375 entries: 1-10 | ... | 336-345 | 346-355 | 356-365 | 366-375 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)