We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 90 entries: 1-25 | 26-50 | 51-75 | 76-90 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 27 Jan 2022

[1]  arXiv:2201.11111 [pdf]
Title: Doers, not Watchers: Intelligent Autonomous Agents are a Path to Cyber Resilience
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2201.10905 [pdf, ps, other]
Title: Boomerang Spectra of Two Classes of Power Functions via Their Differential Spectra
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[3]  arXiv:2201.10839 [pdf, other]
Title: Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2201.10838 [pdf, other]
Title: Privacy-Preserving Logistic Regression Training with a Faster Gradient Variant
Authors: John Chiang
Comments: The basic work of this paper, $\texttt{quadratic gradient}$ and the enhanced full batch NAG, was nearly finished in September 2019. The initial version of this paper was written in April 2020, rejected by ICANN 2020. The enhanced mini-batch NAG was introduced into this paper in September 2020 and later rejected by a special issue on the journal FGCS 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[5]  arXiv:2201.10833 [pdf]
Title: Automatic detection of access control vulnerabilities via API specification processing
Journal-ref: Voprosy kiberbezopasnosti.2022.1(47).p.49-65
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2201.10831 [pdf, ps, other]
Title: Tracking on the Web, Mobile and the Internet-of-Things
Authors: Reuben Binns
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2201.10752 [pdf]
Title: Phishing Attacks Detection -- A Machine Learning-Based Approach
Comments: 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[8]  arXiv:2201.10606 [pdf, other]
Title: Common Evaluation Pitfalls in Touch-Based Authentication Systems
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2201.11079 (cross-list from math.NT) [pdf, other]
Title: Orienteering with one endomorphism
Comments: 38 pages, 1 figure
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[10]  arXiv:2201.11006 (cross-list from cs.CV) [pdf, other]
Title: An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[11]  arXiv:2201.10787 (cross-list from cs.LG) [pdf, other]
Title: Variational Model Inversion Attacks
Comments: 35th Conference on Neural Information Processing Systems (NeurIPS 2021)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[12]  arXiv:2201.10761 (cross-list from cs.LG) [pdf, other]
Title: An Efficient and Robust System for Vertically Federated Random Forest
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

Wed, 26 Jan 2022 (showing first 13 of 18 entries)

[13]  arXiv:2201.10531 [pdf, other]
Title: HOLL: Program Synthesis for Higher OrderLogic Locking
Comments: Accepted in TACAS-22 conference. 24 pages llncs format (without references), 11 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[14]  arXiv:2201.10505 [pdf, other]
Title: Load-Altering Attacks under COVID-19 Low-Inertia Conditions
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[15]  arXiv:2201.10500 [pdf, other]
Title: A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[16]  arXiv:2201.10473 [pdf, other]
Title: Faster multiplication over $\mathbb{F}_2[X]$ using AVX512 instruction set and VPCLMULQDQ instruction
Journal-ref: Journal of Cryptographic Engineering (ISSN : 2190-8508, ISSN \'electronique : 2190-8516), november 2021
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2201.10371 [pdf, other]
Title: ML-based tunnel detection and tunneled application classification
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[18]  arXiv:2201.10351 [pdf, other]
Title: AI-based Re-identification of Behavioral Clickstream Data
Comments: Submitted to the EMAC Conference 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); General Economics (econ.GN)
[19]  arXiv:2201.10349 [pdf]
Title: Roadmap for Cybersecurity in Autonomous Vehicles
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[20]  arXiv:2201.10348 [pdf, other]
Title: Correcting for Reporting Delays in Cyber Incidents
Journal-ref: In JSM Proceedings, 2021, pp. 721-735
Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
[21]  arXiv:2201.10272 [pdf]
Title: Image Fragile Watermarking Algorithm Based on Deneighborhood Mapping
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[22]  arXiv:2201.10087 [pdf, ps, other]
Title: Tree Representation, Growth Rate of Blockchain and Reward Allocation in Ethereum with Multiple Mining Pools
Comments: 50 pages, 18 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Performance (cs.PF); Probability (math.PR)
[23]  arXiv:2201.09956 [pdf, other]
Title: DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting
Authors: Tomer Laor (1), Naif Mehanna (2 and 3 and 4), Antonin Durey (2 and 3 and 4), Vitaly Dyadyuk (1), Pierre Laperdrix (2 and 3 and 4), Clémentine Maurice (2 and 3 and 4), Yossi Oren (1), Romain Rouvoy (2 and 3 and 4), Walter Rudametkin (2 and 3 and 4), Yuval Yarom (5) ((1) Ben-Gurion University of the Negev, (2) University of Lille, (3) CNRS, (4) Inria, (5) University of Adelaide)
Comments: Network and Distributed System Security Symposium, Feb 2022, San Diego, United States
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2201.09941 [pdf, other]
Title: TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
Authors: Aakash Tyagi (1), Addison Crump (1), Ahmad-Reza Sadeghi (2), Garrett Persyn (1), Jeyavijayan Rajendran (1), Patrick Jauernig (2), Rahul Kande (1) ((1) Texas A&M University, College Station, USA, (2) Technische Universität Darmstadt, Germany)
Comments: To be published in the proceedings of the 31st USENIX Security Symposium, 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Software Engineering (cs.SE)
[25]  arXiv:2201.10290 (cross-list from cs.IT) [pdf, ps, other]
Title: Characterizations and constructions of n-to-1 mappings over finite fields
Comments: 23 pages, submitted to a journel
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[ total of 90 entries: 1-25 | 26-50 | 51-75 | 76-90 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2201, contact, help  (Access key information)