We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 91 entries: 1-25 | 26-50 | 51-75 | 76-91 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 24 May 2022

[1]  arXiv:2205.11459 [pdf, other]
Title: CELEST: Federated Learning for Globally Coordinated Threat Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[2]  arXiv:2205.11458 [pdf, other]
Title: Groundhog: Efficient Request Isolation in FaaS
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2205.11171 [pdf, other]
Title: Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[4]  arXiv:2205.11121 [pdf, ps, other]
Title: A normal approximation for joint frequency estimatation under Local Differential Privacy
Authors: Thomas Carette
Comments: Preliminary development, draft
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Statistics Theory (math.ST)
[5]  arXiv:2205.10963 [pdf, other]
Title: Protecting File Activities via Deception for ARM TrustZone
Comments: Under submission
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[6]  arXiv:2205.10962 [pdf, other]
Title: Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications
Comments: 37 pages including citations, 14 figures
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2205.10961 [pdf, other]
Title: Scalable and Privacy-Focused Company-Centric Supply Chain Management
Comments: IEEE ICBC'22
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2205.10848 [pdf, other]
Title: Robust Quantity-Aware Aggregation for Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[9]  arXiv:2205.10695 [pdf, ps, other]
Title: Evaluation of User Perception on Biometric Fingerprint System
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[10]  arXiv:2205.10686 [pdf, ps, other]
Title: Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2205.10608 [pdf, other]
Title: SERVFAIL: The Unintended Consequences of Algorithm Agility in DNSSEC
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2205.10591 [pdf, other]
Title: Multiplierless Design of Very Large Constant Multiplications in Cryptography
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2205.10580 [pdf, other]
Title: Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2205.11418 (cross-list from cs.IT) [pdf, ps, other]
Title: On non-monimial APcN permutations over finite fields of even characteristic
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[15]  arXiv:2205.11406 (cross-list from cs.SE) [pdf, other]
Title: A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[16]  arXiv:2205.11242 (cross-list from cs.CV) [pdf, other]
Title: Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[17]  arXiv:2205.11212 (cross-list from cs.DC) [pdf, other]
Title: CircleChain: Tokenizing Products with a Role-based Scheme for a Circular Economy
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[18]  arXiv:2205.11156 (cross-list from cs.LG) [pdf, other]
Title: Collaborative Adversarial Training
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[19]  arXiv:2205.11034 (cross-list from quant-ph) [pdf, ps, other]
Title: Watermarking PRFs against Quantum Adversaries
Journal-ref: In: Dunkelman O., Dziembowski S. (eds) Advances in Cryptology - EUROCRYPT 2022 - LNCS 13277. Springer
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[20]  arXiv:2205.10929 (cross-list from cs.OS) [pdf, other]
Title: rgpdOS: GDPR Enforcement By The Operating System
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[21]  arXiv:2205.10827 (cross-list from cs.IT) [pdf, other]
Title: Information Leakage in Index Coding With Sensitive and Non-Sensitive Messages
Comments: Accepted by IEEE International Symposium on Information Theory (ISIT) 2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[22]  arXiv:2205.10821 (cross-list from cs.IT) [pdf, other]
Title: Information Leakage in Index Coding
Comments: Published in Proceedings of IEEE Information Theory Workshop (ITW) 2021
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[23]  arXiv:2205.10552 (cross-list from cs.IT) [pdf, other]
Title: Smoothing Codes and Lattices: Systematic Study and New Bounds
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[24]  arXiv:2205.10488 (cross-list from quant-ph) [pdf, ps, other]
Title: Cryptanalysis of Three Quantum Money Schemes
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[25]  arXiv:2205.10364 (cross-list from cs.LG) [pdf, other]
Title: Learning to Reverse DNNs from AI Programs Automatically
Comments: This paper is accepted by IJCAI 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 91 entries: 1-25 | 26-50 | 51-75 | 76-91 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2205, contact, help  (Access key information)