We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2023

[ total of 438 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 401-438 ]
[ showing 50 entries per page: fewer | more | all ]
[1]  arXiv:2311.00066 [pdf, ps, other]
Title: Assessing Mobile Application Privacy: A Quantitative Framework for Privacy Measurement
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2311.00207 [pdf, other]
Title: Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[3]  arXiv:2311.00240 [pdf, other]
Title: Intell-dragonfly: A Cybersecurity Attack Surface Generation Engine Based On Artificial Intelligence-generated Content Technology
Comments: 17 pages, 7 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2311.00270 [pdf, other]
Title: Survey on Quality Assurance of Smart Contracts
Comments: 35 pages, 6 figures, ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[5]  arXiv:2311.00304 [pdf, ps, other]
Title: Stacking an autoencoder for feature selection of zero-day threats
Comments: This paper was presented at the International Conferences on Science and Technology Engineering Science and Technology, Budva, Montenegro
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[6]  arXiv:2311.00354 [pdf, ps, other]
Title: Butson Hadamard matrices, bent sequences, and spherical codes
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2311.00373 [pdf, other]
Title: Architecture of Data Anomaly Detection-Enhanced Decentralized Expert System for Early-Stage Alzheimer's Disease Prediction
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[8]  arXiv:2311.00386 [pdf, other]
Title: On the Integration of Self-Sovereign Identity with TLS 1.3 Handshake to Build Trust in IoT Systems
Journal-ref: Internet of Things, Volume 25, 2024
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2311.00422 [pdf, other]
Title: Towards Universal Atomic Composability: A Formal Model for Multi-Rollup Environments on Ethereum
Authors: Dipankar Sarkar
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2311.00551 [pdf, other]
Title: Generalised DePIN Protocol: A Framework for Decentralized Physical Infrastructure Networks
Authors: Dipankar Sarkar
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2311.00579 [pdf, other]
Title: Revealing CNN Architectures via Side-Channel Analysis in Dataflow-based Inference Accelerators
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[12]  arXiv:2311.00812 [pdf, other]
Title: InfoGuard: A Design and Usability Study of User-Controlled Application-Independent Encryption for Privacy-Conscious Users
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2311.00842 [pdf, ps, other]
Title: healthAIChain: Improving security and safety using Blockchain Technology applications in AI-based healthcare systems
Comments: 6 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[14]  arXiv:2311.00847 [pdf, other]
Title: Signatures From Pseudorandom States via $\bot$-PRFs
Comments: 60 pages
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2311.00903 [pdf, ps, other]
Title: Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[16]  arXiv:2311.00919 [pdf, other]
Title: MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17]  arXiv:2311.01060 [pdf, other]
Title: Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2311.01113 [pdf, other]
Title: A Survey on Coin Selection Algorithms in UTXO-based Blockchains
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[19]  arXiv:2311.01154 [pdf, other]
Title: A Review of Digital Twins and their Application in Cybersecurity based on Artificial Intelligence
Comments: 60 pages, 8 Figures, 15 Tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[20]  arXiv:2311.01247 [pdf, other]
Title: Emergent (In)Security of Multi-Cloud Environments
Journal-ref: 39th ACM Annual Computer Security Applications Conference 2023 (ACM ACSAC 2023)
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2311.01344 [pdf, other]
Title: Like an Open Book? Read Neural Network Architecture with Simple Power Analysis on 32-bit Microcontrollers
Comments: Accepted CARDIS 2023; ANR PICTURE PROJECT (ANR-20-CE39-0013)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[22]  arXiv:2311.01461 [pdf, ps, other]
Title: The Property Law of Crypto Tokens
Authors: Jakub Wyczik
Comments: Legal Status of Crypto Tokens (FT, NFT, etc.)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[23]  arXiv:2311.01532 [pdf, other]
Title: VFCFinder: Seamlessly Pairing Security Advisories and Patches
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2311.01598 [pdf, other]
Title: CiFlow: Dataflow Analysis and Optimization of Key Switching for Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Performance (cs.PF)
[25]  arXiv:2311.01696 [pdf, other]
Title: Universal Perturbation-based Secret Key-Controlled Data Hiding
Comments: 18 pages, 8 tables, 10 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[26]  arXiv:2311.01737 [pdf, other]
Title: CoPriv: Network/Protocol Co-Optimization for Communication-Efficient Private Inference
Comments: Accepted by NeurIPS 2023
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2311.01956 [pdf, other]
Title: Architecture of Smart Certificates for Web3 Applications Against Cyberthreats in Financial Industry
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[28]  arXiv:2311.02288 [pdf, other]
Title: OverHear: Headphone based Multi-sensor Keystroke Inference
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[29]  arXiv:2311.02324 [pdf, other]
Title: Bounded and Unbiased Composite Differential Privacy
Comments: Accepted at 45th IEEE Symposium on Security and Privacy (IEEE S&P)
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2311.02331 [pdf, other]
Title: NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
Comments: The final version of this paper is going to appear in the Conference on Network and Distributed System Security Symposium (NDSS'24), 26 Feb - 1 Mar 2024, San Diego, California
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2311.02378 [pdf, ps, other]
Title: MTS-DVGAN: Anomaly Detection in Cyber-Physical Systems using a Dual Variational Generative Adversarial Network
Comments: 27 pages, 14 figures, 8 tables. Accepted by Computers & Security
Journal-ref: Computers & Security, 2023, 103570
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Systems and Control (eess.SY)
[32]  arXiv:2311.02512 [pdf, ps, other]
Title: Cryptanalysis of Nikooghadam et al.'s lightweight authentication protocol for Internet of Drones
Authors: Iman Jafarian
Comments: 4 pages, 3 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2311.02554 [pdf, other]
Title: Pilot-Based Key Distribution and Encryption for Secure Coherent Passive Optical Networks
Comments: The paper has been submitted to the Journal of Lightwave Technology
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[34]  arXiv:2311.02582 [pdf, ps, other]
Title: RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain
Comments: Accepted by the 23rd International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2023)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[35]  arXiv:2311.02628 [pdf, other]
Title: SparseLock: Securing Neural Network Models in Deep Learning Accelerators
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2311.02630 [pdf, ps, other]
Title: The New Frontier of Cybersecurity: Emerging Threats and Innovations
Comments: 6 pages, 2 Tables
Journal-ref: 2023 29th International Conference on Telecommunications (ICT), pp. 1-6, 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[37]  arXiv:2311.02697 [pdf, other]
Title: SinClave: Hardware-assisted Singletons for TEEs
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2311.02795 [pdf, other]
Title: PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2311.02929 [pdf, other]
Title: SoK: Evaluations in Industrial Intrusion Detection Research
Journal-ref: Journal of Systems Research (JSys) Volume 3(1) 2023
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2311.03024 [pdf, other]
Title: Non Deterministic Pseudorandom Generator for Quantum Key Distribution
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[41]  arXiv:2311.03171 [pdf, other]
Title: An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census Microdata
Comments: 20 pages, 5 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[42]  arXiv:2311.03360 [pdf, ps, other]
Title: Performance Analysis of Security Certificate Management System in Vehicle-to-Everything (V2X)
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Software Engineering (cs.SE)
[43]  arXiv:2311.03373 [pdf, other]
Title: Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[44]  arXiv:2311.03470 [pdf, other]
Title: Orion: A Fully Homomorphic Encryption Compiler for Private Deep Neural Network Inference
Comments: 12 pages, 8 figures, 4 tables
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2311.03530 [pdf, ps, other]
Title: DAO Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2311.03565 [pdf, other]
Title: MIRAGE: Multi-Binary Image Risk Assessment with Attack Graph Employment
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2311.03573 [pdf, ps, other]
Title: Smart Blockchain Networks: Revolutionizing Donation Tracking in the Web 3.0
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2311.03585 [pdf, ps, other]
Title: OpenBSD formal driver verification with SeL4
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO); Operating Systems (cs.OS)
[49]  arXiv:2311.03588 [pdf, ps, other]
Title: Pinky: A Modern Malware-oriented Dynamic Information Retrieval Tool
Authors: Paul Irofti
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS); Software Engineering (cs.SE)
[50]  arXiv:2311.03612 [pdf, other]
Title: BlockEmulator: An Emulator Enabling to Test Blockchain Sharding Protocols
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[ total of 438 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 401-438 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2406, contact, help  (Access key information)