We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 70

[ total of 103 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-103 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 29 Nov 2022 (continued, showing last 3 of 25 entries)

[71]  arXiv:2211.14886 (cross-list from cs.CY) [pdf, other]
Title: Managing Controlled Unclassified Information in Research Institutions
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[72]  arXiv:2211.14769 (cross-list from cs.AI) [pdf, other]
Title: Navigation as the Attacker Wishes? Towards Building Byzantine-Robust Embodied Agents under Federated Learning
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[73]  arXiv:2211.14428 (cross-list from cs.LG) [pdf, other]
Title: Utility Assessment of Synthetic Data Generation Methods
Comments: Published in Privacy in Statistical Databases Conference 2022 USB Proceedings
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Mon, 28 Nov 2022 (showing first 22 of 30 entries)

[74]  arXiv:2211.14233 [pdf, ps, other]
Title: strategFTO: Untimed control for timed opacity
Comments: This work is partially supported by the ANR-NRF French-Singaporean research program ProMiS (ANR-19-CE25-0015 / 2019 ANR NRF 0092) and the ANR research program BisoUS. Experiments presented in this paper were carried out using the Grid'5000 testbed, supported by a scientific interest group hosted by Inria and including CNRS, RENATER and several universities as well as other organizations
Journal-ref: Proceedings of the 8th International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS 2022)
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[75]  arXiv:2211.14206 [pdf, ps, other]
Title: McEliece cryptosystem based on Plotkin construction with QC-MDPC and QC-LDPC codes
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2211.14196 [pdf, other]
Title: Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2211.14062 [pdf, other]
Title: M$^2$M: A general method to perform various data analysis tasks from a differentially private sketch
Comments: Published at the 18th International Workshop on Security and Trust Management (STM 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[78]  arXiv:2211.13964 [pdf, other]
Title: Generating 2D and 3D Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution
Comments: accepted for publication in IEEE Transactions on Biometrics, Behavior, and Identity Science (TBIOM). This paper extends arXiv:2108.01077 that was accepted to IEEE FG 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[79]  arXiv:2211.13958 [pdf, other]
Title: Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2211.13955 [pdf, other]
Title: MPCViT: Searching for MPC-friendly Vision Transformer with Heterogeneous Attention
Comments: 6 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[81]  arXiv:2211.13907 [pdf, other]
Title: Blockchain based solution design for Energy Exchange Platform
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2211.13860 [pdf, other]
Title: Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning
Comments: Accepted for presentation and publication at the 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2211.13780 [pdf, other]
Title: CryptoLight: An Electro-Optical Accelerator for Fully Homomorphic Encryption
Comments: 6 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[84]  arXiv:2211.13737 [pdf, other]
Title: CycleGANWM: A CycleGAN watermarking method for ownership verification
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2211.13696 [pdf, other]
Title: FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[86]  arXiv:2211.13670 [pdf, other]
Title: SmartIntentNN: Towards Smart Contract Intent Detection
Comments: 4 pages, 3 figures, conference tool track. arXiv admin note: substantial text overlap with arXiv:2211.10724
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[87]  arXiv:2211.13554 [pdf]
Title: Quality-Based Conditional Processing in Multi-Biometrics: Application to Sensor Interoperability
Comments: Published at IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[88]  arXiv:2211.13546 [pdf, other]
Title: Number Theoretic Transform and Its Applications in Lattice-based Cryptosystems: A Survey
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2211.13542 [pdf, other]
Title: A Privacy-Preserving Outsourced Data Model in Cloud Environment
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[90]  arXiv:2211.13535 [pdf, other]
Title: Tracking Dataset IP Use in Deep Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91]  arXiv:2211.13526 [pdf, other]
Title: Specognitor: Identifying Spectre Vulnerabilities via Prediction-Aware Symbolic Execution
Authors: Ali Sahraee
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Symbolic Computation (cs.SC); Software Engineering (cs.SE)
[92]  arXiv:2211.13498 [pdf, other]
Title: GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences
Comments: Accepted at QRS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[93]  arXiv:2211.13419 [pdf, other]
Title: Network Security Modelling with Distributional Data
Comments: Accepted and presented in CAMLIS 2022, this https URL arXiv admin note: text overlap with arXiv:2108.08924
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP)
[94]  arXiv:2211.13389 [pdf, other]
Title: FedCut: A Spectral Analysis Framework for Reliable Detection of Byzantine Colluders
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[95]  arXiv:2211.13345 [pdf, other]
Title: Principled Data-Driven Decision Support for Cyber-Forensic Investigations
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 103 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-103 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2212, contact, help  (Access key information)