We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 74

[ total of 90 entries: 1-10 | ... | 45-54 | 55-64 | 65-74 | 75-84 | 85-90 ]
[ showing 10 entries per page: fewer | more | all ]

Thu, 4 Aug 2022 (continued, showing last 6 of 23 entries)

[75]  arXiv:2208.01634 [pdf]
Title: Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
Journal-ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2208.02177 (cross-list from cs.NI) [pdf, other]
Title: On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives
Comments: 42 pages, 14 figures, to be published in Journal of Network and Systems Management - Special Issue on Blockchains and Distributed Ledgers in Network and Service Management
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[77]  arXiv:2208.01946 (cross-list from cs.DC) [pdf, other]
Title: Mixed Fault Tolerance Protocols with Trusted Execution Environment
Authors: Mingyuan Gao (1), Hung Dang (2), Ee-Chien Chang (1), Jialin Li (1) ((1) National University of Singapore, Singapore (2) FPT Blockchain Lab, Vietnam)
Comments: 12 pages, 3 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[78]  arXiv:2208.01847 (cross-list from quant-ph) [pdf, other]
Title: Advance sharing of quantum shares for classical secrets
Comments: 23 pages, 1 figure, 1 table. This research is in part presented at QCrypt 2022, Taipei City, Taiwan, August 29-September 2, 2022
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[79]  arXiv:2208.01819 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Camouflage for Node Injection Attack on Graphs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[80]  arXiv:2208.01693 (cross-list from cs.CL) [pdf, other]
Title: Recognizing and Extracting Cybersecurtity-relevant Entities from Text
Journal-ref: Workshop on Machine Learning for Cybersecurity, 2022 International Conference on Machine Learning
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 3 Aug 2022 (showing first 4 of 10 entries)

[81]  arXiv:2208.01548 [pdf, other]
Title: A Turning Point for Verified Spectre Sandboxing
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2208.01524 [pdf, other]
Title: A replication of a controlled experiment with two STRIDE variants
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[83]  arXiv:2208.01442 [pdf, ps, other]
Title: Improvement of algebraic attacks for solving superdetermined MinRank instances
Authors: Magali Bardet, Manon Bertin (LITIS)
Journal-ref: PQCrypto 2022, Sep 2022, virtual, France
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Symbolic Computation (cs.SC)
[84]  arXiv:2208.01411 [pdf, other]
Title: Locating modifications in signed data for partial data integrity
Comments: 14 pages
Journal-ref: Information Processing Letters 115 (2015) 731-737
Subjects: Cryptography and Security (cs.CR)
[ total of 90 entries: 1-10 | ... | 45-54 | 55-64 | 65-74 | 75-84 | 85-90 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)