We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2023, skipping first 75

[ total of 328 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | ... | 326-328 ]
[ showing 25 entries per page: fewer | more | all ]
[76]  arXiv:2301.04370 [pdf, other]
Title: Order-Preserving Database Encryption with Secret Sharing
Authors: Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[77]  arXiv:2301.04400 [pdf, other]
Title: Resynthesis-based Attacks Against Logic Locking
Comments: 8 pages, 7 figures, conference
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2301.04402 [pdf, ps, other]
Title: Secure access system using signature verification over tablet PC
Comments: Published at IEEE Aerospace and Electronic Systems Magazine
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Signal Processing (eess.SP)
[79]  arXiv:2301.04491 [pdf, ps, other]
Title: PMMP -- PQC Migration Management Process
Comments: 17 pages
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2301.04587 [pdf, other]
Title: Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2301.04591 [pdf, ps, other]
Title: MVAM: Multi-variant Attacks on Memory for IoT Trust Computing
Comments: 12 pages, 6 figures, 6 code blocks
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2301.04725 [pdf, ps, other]
Title: Blockchain For Mobile Health Applications: Acceleration With GPU Computing
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[83]  arXiv:2301.04781 [pdf, other]
Title: Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[84]  arXiv:2301.04841 [pdf, other]
Title: LZR: Identifying Unexpected Internet Services
Comments: In 30th USENIX Security Symposium, 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[85]  arXiv:2301.04872 [pdf, other]
Title: Explainable Ponzi Schemes Detection on Ethereum
Comments: Accepted to ACM SAC'24
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[86]  arXiv:2301.04875 [pdf, other]
Title: Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[87]  arXiv:2301.04888 [pdf, other]
Title: Code-based Cryptography in IoT: A HW/SW Co-Design of HQC
Comments: to be published in Proceedings of the 8th IEEE World Forum on the Internet of Things
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[88]  arXiv:2301.05048 [pdf, other]
Title: Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms
Comments: 12 pages, 3 pages appendix, 13 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[89]  arXiv:2301.05060 [pdf, ps, other]
Title: Evaluating the Fork-Awareness of Coverage-Guided Fuzzers
Comments: Keywords: Fuzzing, Fork, Security Testing, Software Security
Journal-ref: Proceedings of the 9th International Conference on Information Systems Security and Privacy 2023
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[90]  arXiv:2301.05097 [pdf, other]
Title: Study of JavaScript Static Analysis Tools for Vulnerability Detection in Node.js Packages
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2301.05264 [pdf, other]
Title: Security-Aware Approximate Spiking Neural Networks
Comments: Accepted full paper in DATE 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Emerging Technologies (cs.ET)
[92]  arXiv:2301.05506 [pdf, other]
Title: On the feasibility of attacking Thai LPR systems with adversarial examples
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[93]  arXiv:2301.05530 [pdf, other]
Title: An RTL Implementation of the Data Encryption Standard (DES)
Comments: 10 Pages with 7 figures
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2301.05538 [pdf, other]
Title: PMFault: Faulting and Bricking Server CPUs through Management Interfaces
Comments: For demo and source code, visit this https URL
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2301.05653 [pdf, other]
Title: Threat Models over Space and Time: A Case Study of E2EE Messaging Applications
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2301.05795 [pdf, other]
Title: Poisoning Attacks and Defenses in Federated Learning: A Survey
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2301.05920 [pdf, other]
Title: An Introduction of System-Scientific Approaches to Cognitive Security
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[98]  arXiv:2301.05941 [pdf, other]
Title: Improving Confidentiality for NFT Referenced Data Stores
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2301.05945 [pdf, other]
Title: Dance of the DAOs: Building Data Assets as a Use Case
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2301.06031 [pdf, ps, other]
Title: A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 328 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | ... | 326-328 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)