We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 85 entries: 1-25 | 26-50 | 51-75 | 76-85 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 12 Nov 2019

[1]  arXiv:1911.04378 [pdf, other]
Title: DRAB-LOCUS: An Area-Efficient AES Architecture for Hardware Accelerator Co-Location on FPGAs
Comments: 16 pages, initial submission
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[2]  arXiv:1911.04278 [pdf, other]
Title: Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[3]  arXiv:1911.04226 [pdf, ps, other]
Title: Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG)
[4]  arXiv:1911.04124 [pdf, ps, other]
Title: Just Enough Security: Reducing Proof-of-Work Ecological Footprint
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[5]  arXiv:1911.04104 [pdf, other]
Title: Authentication of Smartphone Users Using Behavioral Biometrics
Journal-ref: IEEE Communications Surveys & Tutorials ( Volume: 18 , Issue: 3 , thirdquarter 2016 )
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:1911.04101 [pdf, other]
Title: Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys
Comments: 8 pages, 2 figures, In International Workshop on Privacy Engineering (IWPE'19), co-located with IEEE Symposium on Security and Privacy (S&P'19)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[7]  arXiv:1911.04078 [pdf, other]
Title: GRuB: Gas-Efficient Blockchain Storage via Workload-Adaptive Data Replication
Authors: Kai Li, Yuzhe (Richard) Tang, Qi (Alex) Zhang, Cheng Xu, Jianliang Xu
Comments: Blockchain storage replication, GRuB, 15 pages
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC)
[8]  arXiv:1911.04020 [pdf, ps, other]
Title: Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers
Authors: Ya Xiao, Qingying Hao, Danfeng (Daphne)Yao
Comments: 8 pages, 8 figures, The 2019 IEEE Conference on Dependable and Secure Computing
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:1911.03653 [pdf, other]
Title: Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[10]  arXiv:1911.03623 [pdf, other]
Title: Analyzing Bias in Sensitive Personal Information Used to Train Financial Models
Comments: 5 pages, 4 figures, IEEE Global Conference on Signal and Information Processing (GlobalSIP 2019)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB); Machine Learning (cs.LG)
[11]  arXiv:1911.03563 [pdf, other]
Title: Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments
Comments: Accepted for publication in in the IEEE Consumer Communications & Networking Conference (CCNC 2020)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC)
[12]  arXiv:1911.04429 (cross-list from cs.LG) [pdf, other]
Title: GraphDefense: Towards Robust Graph Convolutional Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[13]  arXiv:1911.04338 (cross-list from cs.LG) [pdf, ps, other]
Title: Active Learning for Black-Box Adversarial Attacks in EEG-Based Brain-Computer Interfaces
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Signal Processing (eess.SP)
[14]  arXiv:1911.04209 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Gradient Boosting Decision Trees
Comments: Accepted by AAAI-20
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[15]  arXiv:1911.04014 (cross-list from cs.LG) [pdf, ps, other]
Title: Interaction is necessary for distributed learning with privacy or communication constraints
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[16]  arXiv:1911.03748 (cross-list from cs.CC) [pdf, ps, other]
Title: Quantum speedups need structure
Comments: 19 pages
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Combinatorics (math.CO); Probability (math.PR)
[17]  arXiv:1911.03674 (cross-list from cs.LG) [pdf, other]
Title: Preservation of Anomalous Subgroups On Machine Learning Transformed Data
Comments: 5 pages, 3 figures, 2 tables, submitted to icassp 2019
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[18]  arXiv:1911.00409 (cross-list from math.NT) [pdf, ps, other]
Title: On the supersingular GPST attack
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR); Information Theory (cs.IT)

Mon, 11 Nov 2019 (showing first 7 of 15 entries)

[19]  arXiv:1911.03395 [pdf, other]
Title: Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin
Journal-ref: IEEE Hardware-Oriented Security and Trust Symposium (HOST), 2020
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:1911.03356 [pdf, other]
Title: On Incentive Compatible Role-based Reward Distribution in Algorand
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[21]  arXiv:1911.03298 [pdf, other]
Title: Blockchain for Future Smart Grid: A Comprehensive Survey
Comments: 24 pages, 13 figures, 5 tables, and this manuscript has been submitted to an IEEE journal for possible publication
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI); Systems and Control (eess.SY)
[22]  arXiv:1911.03242 [pdf, other]
Title: Revocable Federated Learning: A Benchmark of Federated Forest
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[23]  arXiv:1911.03226 [pdf, other]
Title: The coin that never sleeps. The privacy preserving usage of Bitcoin in a longitudinal analysis as a speculative asset
Comments: 7 pages, 5 figures, 24 references
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:1911.03212 [pdf, other]
Title: Statistical Ineffective Fault Analysis of GIMLI
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:1911.03129 [pdf, other]
Title: A Novel Sybil Attack Detection Scheme Based on Edge Computing for Mobile IoT Environment
Authors: Zhengyu Wu, Ruhui Ma
Comments: 14 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[ total of 85 entries: 1-25 | 26-50 | 51-75 | 76-85 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 1911, contact, help  (Access key information)