We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Mar 2024

[ total of 521 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 501-521 ]
[ showing 25 entries per page: fewer | more | all ]
[1]  arXiv:2403.00018 [pdf, ps, other]
Title: Crypto Technology -- Impact on Global Economy
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[2]  arXiv:2403.00023 [pdf, other]
Title: Auditable Homomorphic-based Decentralized Collaborative AI with Attribute-based Differential Privacy
Comments: 12 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[3]  arXiv:2403.00028 [pdf, ps, other]
Title: Lower Bounds for Differential Privacy Under Continual Observation and Online Threshold Queries
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[4]  arXiv:2403.00108 [pdf, other]
Title: LoRA-as-an-Attack! Piercing LLM Safety Under The Share-and-Play Scenario
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[5]  arXiv:2403.00239 [pdf, other]
Title: OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2403.00280 [pdf, ps, other]
Title: SoK: Security of Programmable Logic Controllers
Authors: Efrén López-Morales (Texas A&M University-Corpus Christi), Ulysse Planta (CISPA Helmholtz Center for Information Security), Carlos Rubio-Medrano (Texas A&M University-Corpus Christi), Ali Abbasi (CISPA Helmholtz Center for Information Security), Alvaro A. Cardenas (University of California, Santa Cruz)
Comments: 25 pages, 13 figures, Extended version February 2024, A shortened version is to be published in the 33rd USENIX Security Symposium, for more information, see this https URL
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2403.00393 [pdf, other]
Title: Private Benchmarking to Prevent Contamination and Improve Comparative Evaluation of LLMs
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[8]  arXiv:2403.00404 [pdf, ps, other]
Title: Secure Routing for Mobile Ad hoc Networks
Comments: arXiv admin note: text overlap with arXiv:1208.3486, arXiv:1303.7300 by other authors
Journal-ref: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 27-31, 2002
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2403.00405 [pdf, other]
Title: SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2403.00406 [pdf, ps, other]
Title: Adaptive Restructuring of Merkle and Verkle Trees for Enhanced Blockchain Scalability
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2403.00464 [pdf, other]
Title: Attacking Delay-based PUFs with Minimal Adversary Model
Comments: 13 pages, 6 figures, journal
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[12]  arXiv:2403.00864 [pdf, ps, other]
Title: Analysis of Logistic Map for Pseudorandom Number Generation in Game Development
Authors: Chenxiao Zhou
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2403.00867 [pdf, other]
Title: Gradient Cuff: Detecting Jailbreak Attacks on Large Language Models by Exploring Refusal Loss Landscapes
Comments: Project page: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[14]  arXiv:2403.00871 [pdf, other]
Title: Teach LLMs to Phish: Stealing Private Information from Language Models
Comments: ICLR 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[15]  arXiv:2403.00873 [pdf, ps, other]
Title: Blockchain-empowered Federated Learning: Benefits, Challenges, and Solutions
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[16]  arXiv:2403.00878 [pdf, other]
Title: Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models
Comments: 9 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[17]  arXiv:2403.00889 [pdf, other]
Title: Time-bound Contextual Bio-ID Generation for Minimalist Wearables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[18]  arXiv:2403.00890 [pdf, ps, other]
Title: Improving Android Malware Detection Through Data Augmentation Using Wasserstein Generative Adversarial Networks
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[19]  arXiv:2403.00935 [pdf, other]
Title: Transfer Learning for Security: Challenges and Future Directions
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2403.01008 [pdf, other]
Title: BasedAI: A decentralized P2P network for Zero Knowledge Large Language Models (ZK-LLMs)
Authors: Sean Wellington
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[21]  arXiv:2403.01038 [pdf, other]
Title: AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[22]  arXiv:2403.01048 [pdf, ps, other]
Title: Attacking the Diebold Signature Variant -- RSA Signatures with Unverified High-order Padding
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2403.01100 [pdf, other]
Title: Adaptive Security in 6G for Sustainable Healthcare
Comments: 9 pages,2 figures, accepted by NCDHWS, to be published by Springer
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2403.01155 [pdf, other]
Title: Query Recovery from Easy to Hard: Jigsaw Attack against SSE
Comments: 21 pages, accepted in USENIX Security 2024
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2403.01182 [pdf, other]
Title: d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases
Comments: 23pages, 13 figures, will be published in USENIX Security'24
Subjects: Cryptography and Security (cs.CR)
[ total of 521 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 501-521 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)