Cryptography and Security

Authors and titles for recent submissions

[ total of 52 entries: 1-25 | 26-50 | 51-52 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 27 Mar 2020

[1]  arXiv:2003.12034 [pdf, ps, other]
Title: Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[2]  arXiv:2003.12027 [pdf, ps, other]
Title: Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[3]  arXiv:2003.11936 [pdf, ps, other]
Title: Cryptography using generalized Fibonacci matrices with Affine-Hill cipher
Comments: Construction, development and efficiency
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO); Number Theory (math.NT)
[4]  arXiv:2003.11855 [pdf, other]
Title: On the adversarial robustness of DNNs based on error correcting output codes
Comments: This paper is a preprint of a paper submitted to Electronics Letters. If accepted, the copy of record will be available at the IET Digital Library
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[5]  arXiv:2003.11663 [pdf, other]
Title: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography
Comments: PhD thesis, 152 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Information Theory (cs.IT); Quantum Physics (quant-ph)
[6]  arXiv:2003.12052 (cross-list from stat.ML) [pdf, other]
Title: Corella: A Private Multi Server Learning Approach based on Correlated Queries
Comments: 10 pages, 5 figures, 3 tables
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[7]  arXiv:2003.12020 (cross-list from cs.LG) [pdf, ps, other]
Title: Obliviousness Makes Poisoning Adversaries Weaker
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[8]  arXiv:2003.11995 (cross-list from cs.IT) [pdf, other]
Title: Secure Groupcast with Shared Keys
Authors: Hua Sun
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[9]  arXiv:2003.11967 (cross-list from cs.CE) [pdf, other]
Title: XBlock-EOS: Extracting and Exploring Blockchain Data From EOSIO
Comments: 15 pages, 10 figures, 7 tables
Subjects: Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR)
[10]  arXiv:2003.11915 (cross-list from cs.LG) [pdf, other]
Title: robROSE: A robust approach for dealing with imbalanced data in fraud detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Applications (stat.AP); Machine Learning (stat.ML)
[11]  arXiv:2003.10712 (cross-list from quant-ph) [pdf, ps, other]
Title: Information-theoretically-sound non-interactive classical verification of quantum computing with trusted center
Authors: Tomoyuki Morimae
Comments: 14 pages, no figure
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)

Thu, 26 Mar 2020

[12]  arXiv:2003.11511 [pdf, other]
Title: Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs
Comments: 12 pages, 1 table, 1 figure
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2003.11506 [pdf, other]
Title: FastPay: High-Performance Byzantine Fault Tolerant Settlement
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2003.11446 [pdf, other]
Title: Probabilistic Counters for Privacy Preserving Data Aggregation
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2003.11424 [pdf, other]
Title: BlockMarkchain: A Secure Decentralized Data Market with a Constant Load on the Blockchain
Comments: 16 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2003.11340 [pdf, other]
Title: Towards an Insightful Computer Security Seminar
Comments: 6 pages, 3 figures
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[17]  arXiv:2003.11231 [pdf, other]
Title: Unsupervised Learning for security of Enterprise networks by micro-segmentation
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2003.11110 [pdf, other]
Title: PoisHygiene: Detecting and Mitigating Poisoning Attacks in Neural Networks
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[19]  arXiv:2003.11061 [pdf, other]
Title: The DAO Induction Attack Against the RPL-based Internet of Things
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[20]  arXiv:2003.11323 (cross-list from cs.LG) [pdf, other]
Title: Plausible Counterfactuals: Auditing Deep Learning Classifiers with Realistic Adversarial Examples
Comments: 7 pages, 5 figures. Accepted for its presentation at WCCI 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[21]  arXiv:2003.11286 (cross-list from math.AG) [pdf, ps, other]
Title: Parallel Computation of Optimal Ate Cryptographic Pairings at the $128$, $192$ and $256$-bit security levels using elliptic net algorithm
Subjects: Algebraic Geometry (math.AG); Cryptography and Security (cs.CR); Number Theory (math.NT)
[22]  arXiv:2003.11170 (cross-list from cs.MA) [pdf, other]
Title: Norms and Sanctions as a Basis for Promoting Cybersecurity Practices
Authors: Nirav Ajmeri (1), Shubham Goyal (2), Munindar P. Singh (1) ((1) North Carolina State University, (2) Amazon)
Comments: 10 pages, 4 figures
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR)

Wed, 25 Mar 2020 (showing first 3 of 14 entries)

[23]  arXiv:2003.10877 [pdf, other]
Title: Improving Transaction Success Rate via Smart Gateway Selection in Cryptocurrency Payment Channel Networks
Comments: arXiv admin note: text overlap with arXiv:2003.00294
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[24]  arXiv:2003.10830 [pdf, other]
Title: Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging
Comments: arXiv admin note: text overlap with arXiv:1711.05284
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2003.10639 [pdf, other]
Title: Attention-Based Self-Supervised Feature Learning for Security Data
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 52 entries: 1-25 | 26-50 | 51-52 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2003, contact, help  (Access key information)