We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 71 entries: 1-71 ]
[ showing up to 103 entries per page: fewer | more ]

Mon, 30 Jan 2023

[1]  arXiv:2301.11882 [pdf, other]
Title: Privacy-Preserving Methods for Outlier-Resistant Average Consensus and Shallow Ranked Vote Leader Election
Comments: 10 pages + references, 2 figures, 2 algorithms, 7 theorems
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2301.11824 [pdf, other]
Title: PECAN: A Deterministic Certified Defense Against Backdoor Attacks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[3]  arXiv:2301.11804 [pdf, other]
Title: TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection
Comments: Will be presented at the IEEE International Symposium on Circuits and Systems (ISCAS), 2023
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2301.11767 [pdf, other]
Title: CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[5]  arXiv:2301.11745 [pdf, other]
Title: Side Auth: Synthesizing Virtual Sensors for Authentication
Authors: Yan Long, Kevin Fu
Journal-ref: New Security Paradigms Workshop 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[6]  arXiv:2301.11601 [pdf, other]
Title: Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/64
Comments: 22 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[7]  arXiv:2301.11586 [pdf, other]
Title: Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2301.11569 [pdf]
Title: Vulnerablity analysis of Azure Blockchain Workbench key management system
Authors: Dmitry Tanana
Comments: 4 pages, 2 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2301.11524 [pdf, other]
Title: RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage Correlation
Comments: Submitted to IEEE IoT Journal for review
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2301.11463 [pdf, other]
Title: Nik Defense: An Artificial Intelligence Based Defense Mechanism against Selfish Mining in Bitcoin
Comments: Paper code is available on Github with the following link: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[11]  arXiv:2301.11440 [pdf, other]
Title: Secure synchronization of artificial neural networks used to correct errors in quantum cryptography
Comments: The paper submitted to IEEE ICC 2023 conference
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2301.11730 (cross-list from cs.IT) [pdf, ps, other]
Title: Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification
Comments: 6 pages, 1 table
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[13]  arXiv:2301.11600 (cross-list from cs.SI) [pdf, other]
Title: Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[14]  arXiv:2301.11544 (cross-list from cs.LG) [pdf, other]
Title: Targeted Attacks on Timeseries Forecasting
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[15]  arXiv:2301.11521 (cross-list from cs.LO) [pdf, ps, other]
Title: Stack-Aware Hyperproperties
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL)

Fri, 27 Jan 2023

[16]  arXiv:2301.11289 [pdf, other]
Title: Blockchain-aided Secure Semantic Communication for AI-Generated Content in Metaverse
Comments: 10 pages, 8 figures, journal
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[17]  arXiv:2301.11161 [pdf]
Title: New Approach to Malware Detection Using Optimized Convolutional Neural Network
Authors: Marwan Omar
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2301.11119 [pdf, other]
Title: Robust multi-party semi-quantum private comparison protocols with decoherence-free states against collective noises
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2301.11115 [pdf, other]
Title: Hybrid Protection of Digital FIR Filters
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[20]  arXiv:2301.11092 [pdf, ps, other]
Title: LemonLDAP::NG -- A Full AAA Free Open Source WebSSO Solution
Authors: Christophe Maudoux (CEDRIC - ROC), Selma Boumerdassi (CEDRIC - ROC)
Journal-ref: IEEE 11th International Conference on Cloud Networking (CloudNet), IEEE ComSoc; Cnam, Nov 2022, Paris, France. pp.277-281
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[21]  arXiv:2301.11074 [pdf]
Title: Digital Inheritance in Web3: A Case Study of Soulbound Tokens and the Social Recovery Pallet within the Polkadot and Kusama Ecosystems
Comments: To be published in IEEE Access
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2301.11050 [pdf, other]
Title: Minerva: A File-Based Ransomware Detector
Comments: 19 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[23]  arXiv:2301.10904 [pdf, other]
Title: GPU-based Private Information Retrieval for On-Device Machine Learning Inference
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[24]  arXiv:2301.10822 [pdf]
Title: RobustPdM: Designing Robust Predictive Maintenance against Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[25]  arXiv:2301.11014 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Joint Edge Association and Power Optimization for the Internet of Vehicles via Federated Multi-Agent Reinforcement Learning
Comments: 6 pages, 4 figures, IEEE Trans. on Veh. Technol
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[26]  arXiv:2301.10944 (cross-list from econ.GN) [pdf, other]
Title: A Framework of Transaction Packaging in High-throughput Blockchains
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT)
[27]  arXiv:2301.10832 (cross-list from quant-ph) [pdf, other]
Title: Quantum Encryption of superposition states with Quantum Permutation Pad in IBM Quantum Computers
Comments: 28 pages, 18 figures, 2 tables, in revision for EPJ
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[28]  arXiv:2301.10802 (cross-list from cs.NE) [pdf, other]
Title: NASCTY: Neuroevolution to Attack Side-channel Leakages Yielding Convolutional Neural Networks
Comments: 19 pages, 6 figures, 4 tables
Subjects: Neural and Evolutionary Computing (cs.NE); Cryptography and Security (cs.CR)

Thu, 26 Jan 2023

[29]  arXiv:2301.10733 [pdf]
Title: The Synchronic Web
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2301.10629 [pdf, other]
Title: Evaluating Deception and Moving Target Defense with Network Attack Simulation
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2301.10618 [pdf, other]
Title: Clueless: A Tool Characterising Values Leaking as Addresses
Comments: Accepted by Hardware and Architectural Support for Security and Privacy (HASP) 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[32]  arXiv:2301.10597 [pdf, other]
Title: Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript
Authors: Romain Fouquet (CRIStAL, SPIRALS), Pierre Laperdrix (CRIStAL, SPIRALS), Romain Rouvoy (SPIRALS, IUF)
Comments: ACM Transactions on Internet Technology, In press
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2301.10502 [pdf, other]
Title: SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation
Comments: 8 pages, 1 figure, 2 tables, ICISSP 2023 this https URL
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2301.10395 [pdf, ps, other]
Title: Huff-DP: Huffman Coding based Differential Privacy Mechanism for Real-Time Data
Comments: Submitted to Venue
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2301.10336 [pdf, other]
Title: A survey of Digital Manufacturing Hardware and Software Trojans
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2301.10545 (cross-list from cs.SE) [pdf, other]
Title: Beware of the Unexpected: Bimodal Taint Analysis
Journal-ref: International Symposium on Software Testing and Analysis (ISSTA), 2023
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[37]  arXiv:2301.10541 (cross-list from econ.GN) [pdf, other]
Title: Educational Game on Cryptocurrency Investment: Using Microeconomic Decision Making to Understand Macroeconomic Principles
Subjects: General Economics (econ.GN); Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR); Computational Finance (q-fin.CP); General Finance (q-fin.GN)
[38]  arXiv:2301.10433 (cross-list from quant-ph) [pdf, other]
Title: Delegated variational quantum algorithms based on quantum homomorphic encryption
Comments: 12 pages, 15 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[39]  arXiv:2301.10412 (cross-list from cs.CL) [pdf, other]
Title: BDMMT: Backdoor Sample Detection for Language Models through Model Mutation Testing
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[40]  arXiv:2301.10407 (cross-list from cs.SE) [pdf, other]
Title: Don't Lie to Me: Avoiding Malicious Explanations with STEALTH
Comments: 6 pages, 6 Tables, 3 figures
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[41]  arXiv:2301.10400 (cross-list from cs.LG) [pdf, other]
Title: When to Trust Aggregated Gradients: Addressing Negative Client Sampling in Federated Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 25 Jan 2023

[42]  arXiv:2301.10213 [pdf, ps, other]
Title: Database Reconstruction Is Not So Easy and Is Different from Reidentification
Comments: Journal of Official Statistics (to appear)
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[43]  arXiv:2301.10056 [pdf]
Title: Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses
Journal-ref: 2023 IEEE Symposium on Security and Privacy (SP)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Multimedia (cs.MM); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[44]  arXiv:2301.09956 [pdf, other]
Title: Membership Inference of Diffusion Models
Authors: Hailong Hu, Jun Pang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[45]  arXiv:2301.09806 [pdf, other]
Title: Demystifying NFT Promotion and Phishing Scams
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[46]  arXiv:2301.09801 [pdf, other]
Title: Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Comments: Accepted by IEEE Internet of Things Journal
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG); Machine Learning (stat.ML)
[47]  arXiv:2301.09761 [pdf, other]
Title: $\textit{FairShare}$: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT
Comments: Accepted for publication at IEEE Transactions on Network and Service Management under the Special Issue of "Recent Advances on Blockchain for Network and Service Management"
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[48]  arXiv:2301.09740 [pdf, other]
Title: DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[49]  arXiv:2301.09738 [pdf, other]
Title: Security of Electrical, Optical and Wireless On-Chip Interconnects: A Survey
Comments: 35 pages, 16 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Networking and Internet Architecture (cs.NI)
[50]  arXiv:2301.10226 (cross-list from cs.LG) [pdf, other]
Title: A Watermark for Large Language Models
Comments: 12 pages in the main body. Code will be available at github.com/jwkirchenbauer/lm-watermarking
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[51]  arXiv:2301.10216 (cross-list from cs.LO) [pdf, other]
Title: C-SAR: SAT Attack Resistant Logic Locking for RSFQ Circuits
Subjects: Logic in Computer Science (cs.LO); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[52]  arXiv:2301.10053 (cross-list from cs.LG) [pdf, other]
Title: A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[53]  arXiv:2301.10028 (cross-list from cs.CY) [pdf]
Title: Super forecasting the technological singularity risks from artificial intelligence
Journal-ref: Evol. Syst. 2022, pp. 1 11, Jun. 2022
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[54]  arXiv:2301.09892 (cross-list from cs.GT) [pdf, other]
Title: Learning Effective Strategies for Moving Target Defense with Switching Costs
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[55]  arXiv:2301.09732 (cross-list from cs.LG) [pdf, other]
Title: Backdoor Attacks in Peer-to-Peer Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Tue, 24 Jan 2023

[56]  arXiv:2301.09378 [pdf, ps, other]
Title: Citadel: Self-Sovereign Identities on Dusk Network
Authors: Xavier Salleras
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2301.09258 [pdf]
Title: Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2301.09207 [pdf, other]
Title: VeraSel: Verifiable Random Selection for Mixnets Construction
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[59]  arXiv:2301.09185 [pdf]
Title: A New Paradigm for Improved Image Steganography by using Adaptive Number of Dominant Discrete Cosine Transform Coefficients
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2301.09041 [pdf, other]
Title: Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[61]  arXiv:2301.08824 [pdf, ps, other]
Title: An Automated Vulnerability Detection Framework for Smart Contracts
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[62]  arXiv:2301.08806 [pdf, other]
Title: TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts
Comments: To appear in IEEE Transactions on Information Forensics and Security
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[63]  arXiv:2301.08778 [pdf, other]
Title: Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2301.09325 (cross-list from cs.IT) [pdf, ps, other]
Title: cc-differential uniformity, (almost) perfect cc-nonlinearity, and equivalences
Comments: 18 pages. Comments welcome
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[65]  arXiv:2301.09255 (cross-list from cs.CV) [pdf, other]
Title: Combined Use of Federated Learning and Image Encryption for Privacy-Preserving Image Classification with Vision Transformer
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2301.09236 (cross-list from quant-ph) [pdf, other]
Title: On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions
Comments: 55 pages
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[67]  arXiv:2301.09203 (cross-list from cs.DS) [pdf, ps, other]
Title: Relaxed Models for Adversarial Streaming: The Advice Model and the Bounded Interruptions Model
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[68]  arXiv:2301.09201 (cross-list from cs.IR) [pdf, other]
Title: SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[69]  arXiv:2301.08925 (cross-list from eess.AS) [pdf, other]
Title: New Challenges for Content Privacy in Speech and Audio
Comments: Accepted for publication in ISCA SPSC Symposium 2022
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[70]  arXiv:2301.08811 (cross-list from cs.MA) [pdf, ps, other]
Title: Differential Privacy in Cooperative Multiagent Planning
Subjects: Multiagent Systems (cs.MA); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[71]  arXiv:2301.08751 (cross-list from cs.LG) [pdf, other]
Title: Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Comments: Accepted at SafeAI 2023: AAAI's Workshop on Artificial Intelligence Safety
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[ total of 71 entries: 1-71 ]
[ showing up to 103 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2301, contact, help  (Access key information)