We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021, skipping first 30

[ total of 346 entries: 1-5 | ... | 16-20 | 21-25 | 26-30 | 31-35 | 36-40 | 41-45 | 46-50 | ... | 346 ]
[ showing 5 entries per page: fewer | more | all ]
[31]  arXiv:2110.02022 [pdf, other]
Title: VESPo: Verified Evaluation of Secret Polynomials
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[32]  arXiv:2110.02040 [pdf]
Title: An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment
Comments: To be published in Proceedings of the CIRED 2021 Conference
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[33]  arXiv:2110.02103 [pdf, other]
Title: Notarial timestamps savings in logs management via Merkle trees and Key Derivation Functions
Authors: Andrea Barontini
Comments: 8 pages, 3 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2110.02125 [pdf, other]
Title: Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems
Comments: To Appear, 35th IEEE Computer Security Foundations Symposium (2022)
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Machine Learning (cs.LG); Systems and Control (eess.SY)
[35]  arXiv:2110.02176 [pdf, other]
Title: Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[ total of 346 entries: 1-5 | ... | 16-20 | 21-25 | 26-30 | 31-35 | 36-40 | 41-45 | 46-50 | ... | 346 ]
[ showing 5 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2209, contact, help  (Access key information)