We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 22

[ total of 118 entries: 1-10 | 3-12 | 13-22 | 23-32 | 33-42 | 43-52 | 53-62 | ... | 113-118 ]
[ showing 10 entries per page: fewer | more | all ]

Fri, 2 Jun 2023 (continued, showing last 6 of 28 entries)

[23]  arXiv:2306.00353 (cross-list from stat.ML) [pdf, other]
Title: Constructing Semantics-Aware Adversarial Examples with Probabilistic Perspective
Comments: 17 pages, 14 figures
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[24]  arXiv:2306.00308 (cross-list from cs.PL) [pdf, other]
Title: A Formal Model for Secure Multiparty Computation
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[25]  arXiv:2306.00240 (cross-list from cs.SE) [pdf, other]
Title: Trusting code in the wild: A social network-based centrality rating for developers in the Rust ecosystem
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[26]  arXiv:2306.00127 (cross-list from cs.LG) [pdf, other]
Title: Surrogate Model Extension (SME): A Fast and Accurate Weight Update Attack on Federated Learning
Comments: Accepted at ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[27]  arXiv:2306.00044 (cross-list from cs.LG) [pdf, ps, other]
Title: How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Comments: Interspeech 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[28]  arXiv:2306.00042 (cross-list from cs.LG) [pdf, other]
Title: Graph-based methods coupled with specific distributional distances for adversarial attack detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)

Thu, 1 Jun 2023 (showing first 4 of 18 entries)

[29]  arXiv:2305.19897 [pdf, ps, other]
Title: Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[30]  arXiv:2305.19855 [pdf, other]
Title: Lattice-Aided Extraction of Spread-Spectrum Hidden Data
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2305.19813 [pdf, other]
Title: Aggregated Zero-knowledge Proof and Blockchain-Empowered Authentication for Autonomous Truck Platooning
Comments: Accepted for publication in IEEE Transactions on Intelligent Transportation Systems
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2305.19797 [pdf, other]
Title: A Hybrid Blockchain-Edge Architecture for Electronic Health Records Management with Attribute-based Cryptographic Mechanisms
Comments: Accepted for publication in IEEE Transactions on Network and Service Management (TNSM)
Subjects: Cryptography and Security (cs.CR)
[ total of 118 entries: 1-10 | 3-12 | 13-22 | 23-32 | 33-42 | 43-52 | 53-62 | ... | 113-118 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2306, contact, help  (Access key information)