We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 153 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 151-153 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 27 May 2024 (showing first 25 of 29 entries)

[1]  arXiv:2405.15753 [pdf, ps, other]
Title: Data Reconstruction: When You See It and When You Don't
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2405.15652 [pdf, other]
Title: $$\mathbf{L^2\cdot M = C^2}$$ Large Language Models as Covert Channels... a Systematic Analysis
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2405.15614 [pdf, ps, other]
Title: Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[4]  arXiv:2405.15537 [pdf, ps, other]
Title: Do Not Trust Power Management: Challenges and Hints for Securing Future Trusted Execution Environments
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[5]  arXiv:2405.15426 [pdf, other]
Title: AuthNet: Neural Network with Integrated Authentication Logic
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2405.15342 [pdf, other]
Title: Implementation of New Security Features in CMSWEB Kubernetes Cluster at CERN
Comments: 26TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY & NUCLEAR PHYSICS - 2023
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[7]  arXiv:2405.15322 [pdf, other]
Title: Dishonest Approximate Computing: A Coming Crisis for Cloud Clients
Comments: 12 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[8]  arXiv:2405.15308 [pdf, other]
Title: Nudging Users to Change Breached Passwords Using the Protection Motivation Theory
Comments: Manuscript under review at ACM Transactions on Computer-Human Interaction
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[9]  arXiv:2405.15293 [pdf, other]
Title: Transaction Fee Estimation in the Bitcoin System
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2405.15288 [pdf, other]
Title: The Writing is on the Wall: Analyzing the Boom of Inscriptions and its Impact on EVM-compatible Blockchains
Comments: This research article is a work of scholarship and reflects the authors' own views and opinions. It does not necessarily reflect the views or opinions of any other person or organization, including the authors' employer. Readers should not rely on this article for making strategic or commercial decisions, and the authors are not responsible for any losses that may result from such use. arXiv admin note: substantial text overlap with arXiv:2404.11189
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2405.15258 [pdf, other]
Title: Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2405.15201 [pdf, other]
Title: A Simple Solution for Homomorphic Evaluation on Large Intervals
Authors: John Chiang
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2405.15184 [pdf, other]
Title: TrojanForge: Adversarial Hardware Trojan Examples with Reinforcement Learning
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[14]  arXiv:2405.15182 [pdf, other]
Title: RFLPA: A Robust Federated Learning Framework against Poisoning Attacks with Secure Aggregation
Comments: 22 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[15]  arXiv:2405.15161 [pdf, other]
Title: Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark
Comments: 11 pages, 7 figures,
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[16]  arXiv:2405.15089 [pdf, ps, other]
Title: Targeted Nakamoto: A Bitcoin Protocol to Balance Network Security and Energy Consumption
Authors: Daniel Aronoff
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2405.14993 [pdf, other]
Title: SoK: A Defense-Oriented Evaluation of Software Supply Chain Security
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2405.14975 [pdf, other]
Title: Surveilling the Masses with Wi-Fi-Based Positioning Systems
Authors: Erik Rye, Dave Levin
Comments: Published at IEEE S&P 2024
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[19]  arXiv:2405.14970 [pdf, other]
Title: P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF
Comments: Accepted at IEEE Symposium on Security and Privacy (S&P) 2024
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[20]  arXiv:2405.15749 (cross-list from cs.DC) [pdf, other]
Title: Collaborative Access Control for IoT -- A Blockchain Approach
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[21]  arXiv:2405.15747 (cross-list from cs.NI) [pdf, other]
Title: Over-the-Air Runtime Wi-Fi MAC Address Re-randomization
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[22]  arXiv:2405.15736 (cross-list from quant-ph) [pdf, other]
Title: Single-Round Proofs of Quantumness from Knowledge Assumptions
Comments: 51 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[23]  arXiv:2405.15589 (cross-list from cs.LG) [pdf, other]
Title: Efficient Adversarial Training in LLMs with Continuous Attacks
Comments: 19 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[24]  arXiv:2405.15556 (cross-list from cs.LG) [pdf, other]
Title: Certifiably Robust RAG against Retrieval Corruption
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[25]  arXiv:2405.15423 (cross-list from cs.LG) [pdf, other]
Title: Lost in the Averages: A New Specific Setup to Evaluate Membership Inference Attacks Against Machine Learning Models
Authors: Florent Guépin (1), Nataša Krčo (1), Matthieu Meeus (1), Yves-Alexandre de Montjoye (1) ((1) Department of Computing, Imperial College London, United Kingdom)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 153 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 151-153 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)