We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 48

[ total of 90 entries: 1-50 | 49-90 ]
[ showing 50 entries per page: fewer | more | all ]

Fri, 5 Aug 2022 (continued, showing last 9 of 16 entries)

[49]  arXiv:2208.02759 (cross-list from cs.HC) [pdf, other]
Title: New Differential Privacy Communication Pipeline and Design Framework
Comments: poster
Journal-ref: The Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[50]  arXiv:2208.02724 (cross-list from eess.SP) [pdf, other]
Title: Disentangled Representation Learning for RF Fingerprint Extraction under Unknown Channel Statistics
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[51]  arXiv:2208.02587 (cross-list from cs.LG) [pdf]
Title: Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption
Comments: 26 pages; 1 Figure; 7 Tables. arXiv admin note: text overlap with arXiv:2205.13265
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[52]  arXiv:2208.02556 (cross-list from cs.CV) [pdf, other]
Title: Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix
Comments: arXiv admin note: text overlap with arXiv:2205.12041
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[53]  arXiv:2208.02482 (cross-list from cs.CV) [pdf, other]
Title: Privacy Safe Representation Learning via Frequency Filtering Encoder
Comments: The IJCAI-ECAI-22 Workshop on Artificial Intelligence Safety (AISafety 2022)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[54]  arXiv:2208.02468 (cross-list from math.GR) [pdf, ps, other]
Title: On Compression Functions over Small Groups with Applications to Cryptography
Authors: Koji Nuida
Comments: 10 pages
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)
[55]  arXiv:2208.02369 (cross-list from cs.AI) [pdf, other]
Title: Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework
Comments: 12 pages, 3 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[56]  arXiv:2208.02304 (cross-list from cs.LG) [pdf, other]
Title: How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?
Comments: Accepted to appear in Proceedings on Privacy Enhancing Technologies (PoPETs) 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[57]  arXiv:2208.02250 (cross-list from cs.SD) [pdf]
Title: Adversarial Attacks on ASR Systems: An Overview
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)

Thu, 4 Aug 2022

[58]  arXiv:2208.02244 [pdf, other]
Title: Contrasting global approaches for identifying and managing cybersecurity risks in supply chains
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[59]  arXiv:2208.02201 [pdf, other]
Title: Statistical Decoding 2.0: Reducing Decoding to LPN
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2208.02160 [pdf]
Title: Scrypt Mining with ASICs
Comments: Published in 2014
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2208.02159 [pdf, other]
Title: CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[62]  arXiv:2208.02125 [pdf, other]
Title: Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature
Comments: Submitted to IEEE TIFS and currently under review
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2208.02094 [pdf]
Title: A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[64]  arXiv:2208.02093 [pdf, other]
Title: Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2208.01968 [pdf, other]
Title: Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[66]  arXiv:2208.01919 [pdf, other]
Title: Spectrum Focused Frequency Adversarial Attacks for Automatic Modulation Classification
Authors: Sicheng Zhang (1), Jiarun Yu (1), Zhida Bao (1), Shiwen Mao (2), Yun Lin (1) ((1) College of Information and Communication Engineering, Harbin Engineering University, Harbin, (2) Department of Electrical & Computer Engineering, Auburn University, Auburn)
Comments: 6 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[67]  arXiv:2208.01908 [pdf, other]
Title: Mass Exit Attacks on the Lightning Network
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[68]  arXiv:2208.01886 [pdf, other]
Title: Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2208.01826 [pdf, ps, other]
Title: A New Implementation of Federated Learning for Privacy and Security Enhancement
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70]  arXiv:2208.01703 [pdf, other]
Title: CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[71]  arXiv:2208.01700 [pdf, other]
Title: Differentially Private Vertical Federated Clustering
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[72]  arXiv:2208.01639 [pdf, ps, other]
Title: Sharpening Your Tools: Updating bulk_extractor for the 2020s
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2208.01636 [pdf, ps, other]
Title: A Roadmap for Greater Public Use of Privacy-Sensitive Government Data: Workshop Report
Comments: 23 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Machine Learning (cs.LG)
[74]  arXiv:2208.01635 [pdf]
Title: Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, Volume 21, No 2
Journal-ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 2, pages 71-88
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2208.01634 [pdf]
Title: Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
Journal-ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2208.02177 (cross-list from cs.NI) [pdf, other]
Title: On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives
Comments: 42 pages, 14 figures, to be published in Journal of Network and Systems Management - Special Issue on Blockchains and Distributed Ledgers in Network and Service Management
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[77]  arXiv:2208.01946 (cross-list from cs.DC) [pdf, other]
Title: Mixed Fault Tolerance Protocols with Trusted Execution Environment
Authors: Mingyuan Gao (1), Hung Dang (2), Ee-Chien Chang (1), Jialin Li (1) ((1) National University of Singapore, Singapore (2) FPT Blockchain Lab, Vietnam)
Comments: 12 pages, 3 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[78]  arXiv:2208.01847 (cross-list from quant-ph) [pdf, other]
Title: Advance sharing of quantum shares for classical secrets
Comments: 23 pages, 1 figure, 1 table. This research is in part presented at QCrypt 2022, Taipei City, Taiwan, August 29-September 2, 2022
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[79]  arXiv:2208.01819 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Camouflage for Node Injection Attack on Graphs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[80]  arXiv:2208.01693 (cross-list from cs.CL) [pdf, other]
Title: Recognizing and Extracting Cybersecurtity-relevant Entities from Text
Journal-ref: Workshop on Machine Learning for Cybersecurity, 2022 International Conference on Machine Learning
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 3 Aug 2022

[81]  arXiv:2208.01548 [pdf, other]
Title: A Turning Point for Verified Spectre Sandboxing
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2208.01524 [pdf, other]
Title: A replication of a controlled experiment with two STRIDE variants
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[83]  arXiv:2208.01442 [pdf, ps, other]
Title: Improvement of algebraic attacks for solving superdetermined MinRank instances
Authors: Magali Bardet, Manon Bertin (LITIS)
Journal-ref: PQCrypto 2022, Sep 2022, virtual, France
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Symbolic Computation (cs.SC)
[84]  arXiv:2208.01411 [pdf, other]
Title: Locating modifications in signed data for partial data integrity
Comments: 14 pages
Journal-ref: Information Processing Letters 115 (2015) 731-737
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2208.01356 [pdf, other]
Title: SCFI: State Machine Control-Flow Hardening Against Fault Attacks
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2208.01277 [pdf, other]
Title: Security Requirement Analysis of Blockchain-based E-Voting Systems
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2208.01263 [pdf, ps, other]
Title: A ZK-SNARK based Proof of Assets Protocol for Bitcoin Exchanges
Authors: B Swaroopa Reddy
Comments: 9 pages, 2 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2208.01242 [pdf]
Title: Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based Infrastructure Management
Comments: 14 pages, currently under review
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[89]  arXiv:2208.01113 [pdf, other]
Title: On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Comments: 15 pages, 20 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[90]  arXiv:2208.01595 (cross-list from cs.SE) [pdf, other]
Title: Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[ total of 90 entries: 1-50 | 49-90 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)