We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Mar 2021, skipping first 75

[ total of 399 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | ... | 376-399 ]
[ showing 25 entries per page: fewer | more | all ]
[76]  arXiv:2103.04142 [pdf]
Title: On an innovative architecture for digital immunity passports and vaccination certificates
Comments: This work has been funded in part with Federal funds from the National Institutes of Health, Department of Health and Human Services, under Contract No. 75N91020C00035 and in part by the European Union's Horizon 2020 Stimulating innovation by means of cross-fertilisation of knowledge program under Grant 824015 (H2020-MSCA-RISE-2018-INCOGNITO) and the Grant 826404 (H2020-SC1-FA-DTS-2018-1-CUREX)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[77]  arXiv:2103.04203 [pdf, other]
Title: Selective Encryption of the Versatile Video Coding Standard
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM); Image and Video Processing (eess.IV)
[78]  arXiv:2103.04208 [pdf, other]
Title: Utilising Flow Aggregation to Classify Benign Imitating Attacks
Comments: 21 pages, 6 figures
Journal-ref: MDPI Sensors 2021, 21, 1761. Special Issue: Security and Privacy in the Internet of Things (IoT)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[79]  arXiv:2103.04226 [pdf, other]
Title: Threat Modeling of Cyber-Physical Systems in Practice
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2103.04263 [pdf, other]
Title: Deepfake Videos in the Wild: Analysis and Detection
Comments: Accepted to The Web Conference 2021; First two authors contributed equally to this work; 12 pages, 6 tables
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[81]  arXiv:2103.04264 [pdf, other]
Title: T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
Comments: Accepted to Usenix Security 2021; First two authors contributed equally to this work; 18 pages, 11 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[82]  arXiv:2103.04330 [pdf, other]
Title: An Overview of Cryptographic Accumulators
Comments: Note: This is an extended version of a paper published In Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021), pages 661-669
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2103.04428 [pdf, ps, other]
Title: Design of Ciphers based on the Geometric Structure of the Laguerre and Minkowski Planes
Comments: 20 pages, 5 figures. arXiv admin note: text overlap with arXiv:2102.10321
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO)
[84]  arXiv:2103.04443 [pdf, other]
Title: DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks
Comments: To appear at PAM 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[85]  arXiv:2103.04475 [pdf, other]
Title: LogBERT: Log Anomaly Detection via BERT
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2103.04519 [pdf, other]
Title: Formal Verification of Authenticated, Append-Only Skip Lists in Agda: Extended Version
Comments: This is an extended version of our paper published in the 10th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP 2021). This version (2021-02-23) presents a stronger version of the evocr property than originally presented, and provides a link to our development in open source
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[87]  arXiv:2103.04533 [pdf, other]
Title: Volcano: Stateless Cache Side-channel Attack by Exploiting Mesh Interconnect
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2103.04606 [pdf, other]
Title: A Hole in the Ladder: Interleaved Variables in Iterative Conditional Branching (Extended Version)
Authors: Yoann Marquer (IRISA), Tania Richmond (DGA.MI, IRISA), Pascal Véron (IMATH)
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2103.04673 [pdf, other]
Title: Social Media Identity Deception Detection: A Survey
Comments: Accepted for publication in ACM Computing Surveys
Journal-ref: ACM Computing Surveys (CSUR), 54(3), 1-35 (2021)
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[90]  arXiv:2103.04794 [pdf, other]
Title: Packet-Level Adversarial Network Traffic Crafting using Sequence Generative Adversarial Networks
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2103.04816 [pdf, ps, other]
Title: Efficient Error Prediction for Differentially Private Algorithms
Authors: Boel Nelson
Comments: ARES version
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2103.04889 [pdf]
Title: Design and implementation of Energy Efficient Lightweight Encryption (EELWE) algorithm for medical applications
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2103.04901 [pdf]
Title: Socio-Technical Root Cause Analysis of Cyber-enabled Theft of the U.S. Intellectual Property -- The Case of APT41
Authors: Mazaher Kianpour
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2103.04904 [pdf, ps, other]
Title: Bipartite secret sharing and staircases
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[95]  arXiv:2103.04952 [pdf, other]
Title: Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2103.05072 [pdf, ps, other]
Title: Multiparty Protocol that Usually Shuffles
Comments: 28 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[97]  arXiv:2103.05242 [pdf, other]
Title: A deep learning based known plaintext attack method for chaotic cryptosystem
Authors: Fusen Wang (1 and 2), Jun Sang (1 and 2), Qi Liu (1 and 2), Chunlin Huang (1 and 2), Jinghan Tan (1 and 2) ((1) Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education, Chongqing University, Chongqing, China, (2) School of Big Data and Software Engineering, Chongqing University, Chongqing, China)
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2103.05250 [pdf, other]
Title: ByteSGAN: A Semi-supervised Generative Adversarial Network for Encrypted Traffic Classification of SDN Edge Gateway in Green Communication Network
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2103.05292 [pdf, other]
Title: Deep Learning for Android Malware Defenses: a Systematic Literature Review
Comments: Accepted by ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[100]  arXiv:2103.05354 [pdf, other]
Title: Revisiting Model's Uncertainty and Confidences for Adversarial Example Detection
Comments: Under review
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[ total of 399 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | ... | 376-399 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2212, contact, help  (Access key information)