We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 95

[ total of 153 entries: 1-50 | 46-95 | 96-145 | 146-153 ]
[ showing 50 entries per page: fewer | more | all ]

Wed, 22 May 2024 (continued, showing last 1 of 18 entries)

[96]  arXiv:2405.12553 (cross-list from stat.ML) [pdf, other]
Title: Uncertainty quantification by block bootstrap for differentially private stochastic gradient descent
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistics Theory (math.ST); Computation (stat.CO)

Tue, 21 May 2024

[97]  arXiv:2405.12197 [pdf, ps, other]
Title: Automated Hardware Logic Obfuscation Framework Using GPT
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2405.12187 [pdf, ps, other]
Title: Brewer-Nash Scrutinised: Mechanised Checking of Policies featuring Write Revocation
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2405.12177 [pdf, other]
Title: Establishing Trust in the Beyond-5G Core Network using Trusted Execution Environments
Comments: 18 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2405.12115 [pdf, other]
Title: Clap: a Rust eDSL for PlonKish Proof Systems with a Semantics-preserving Optimizing Compiler
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2405.12104 [pdf, ps, other]
Title: Deciding branching hyperproperties for real time systems
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[102]  arXiv:2405.12076 [pdf, other]
Title: GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[103]  arXiv:2405.12043 [pdf, other]
Title: The Incoherency Risk in the EU's New Cyber Security Policies
Authors: Jukka Ruohonen
Comments: Submitted
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[104]  arXiv:2405.12042 [pdf, other]
Title: Attribute-Based Authentication in Secure Group Messaging for Distributed Environments
Authors: David Soler (1), Carlos Dafonte (1), Manuel Fernández-Veiga (2), Ana Fernández Vilas (2), Francisco J. Nóvoa (1) ((1) CITIC, Universidade da Coruňa, A Coruňa, Spain, (2) atlanTTic, Universidade de Vigo, Vigo, Spain)
Comments: Submitted to IEEE Transactions on Dependable and Secure Computing This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2405.11987 [pdf, ps, other]
Title: On Separation Logic, Computational Independence, and Pseudorandomness (Extended Version)
Comments: to be published in CSF'24
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2405.11885 [pdf, ps, other]
Title: Post-Quantum Security: Origin, Fundamentals, and Adoption
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[107]  arXiv:2405.11876 [pdf, other]
Title: Understanding crypter-as-a-service in a popular underground marketplace
Comments: A short version of this paper was accepted at the 6th Workshop on Attackers and Cyber-Crime Operations (WACCO)
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2405.11713 [pdf, other]
Title: Decentralized Privacy Preservation for Critical Connections in Graphs
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[109]  arXiv:2405.11607 [pdf, other]
Title: OFHE: An Electro-Optical Accelerator for Discretized TFHE
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[110]  arXiv:2405.11580 [pdf, other]
Title: Securing Health Data on the Blockchain: A Differential Privacy and Federated Learning Framework
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[111]  arXiv:2405.11497 [pdf, other]
Title: Towards in-situ Psychological Profiling of Cybercriminals Using Dynamically Generated Deception Environments
Authors: Jacob Quibell
Comments: 16 pages, 4 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[112]  arXiv:2405.11456 [pdf, other]
Title: Biometrics-Based Authenticated Key Exchange with Multi-Factor Fuzzy Extractor
Comments: 17 pages
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2405.11440 [pdf, other]
Title: A GAN-Based Data Poisoning Attack Against Federated Learning Systems and Its Countermeasure
Comments: 18 pages, 16 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[114]  arXiv:2405.11368 [pdf, other]
Title: Security of Cloud Services with Low-Performance Devices in Critical Infrastructures
Comments: 5 pages
Journal-ref: Proc of the 10th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2019), Venice, Italy, May 2019, pp. 88-92, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[115]  arXiv:2405.11353 [pdf, other]
Title: NTTSuite: Number Theoretic Transform Benchmarks for Accelerating Encrypted Computation
Comments: 8 pages, 5 figures, and two tables. To download the source code, see this https URL
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[116]  arXiv:2405.11350 [pdf, ps, other]
Title: Cloud Security and Security Challenges Revisited
Comments: 6 pages
Journal-ref: Proc of the 10th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2019), Venice, Italy, May 2019, pp. 61-66, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[117]  arXiv:2405.11341 [pdf, other]
Title: A Secure and Privacy-Friendly Logging Scheme
Comments: 5 pages
Journal-ref: Proc of the 12th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2021), Porto, Portugal, April 2021, pp. 8-12, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[118]  arXiv:2405.11335 [pdf, other]
Title: Detecting Complex Multi-step Attacks with Explainable Graph Neural Network
Comments: Corresponding author: Peng Gao (gao.itslab@gmail.com)
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2405.11316 [pdf, other]
Title: Securing 3rd Party App Integration in Docker-based Cloud Software Ecosystems
Comments: 7 pages
Journal-ref: Proc of the 9th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2018), Barcelona, Spain, February 2018, pp. 77-83, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[120]  arXiv:2405.11258 [pdf, other]
Title: Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning
Comments: 8 pages, 2 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2405.11247 [pdf, other]
Title: Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework
Comments: 13 pages, 8 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2405.11245 [pdf, other]
Title: Dynamic Quantum Key Distribution for Microgrids with Distributed Error Correction
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[123]  arXiv:2405.11227 [pdf, other]
Title: BadActs: A Universal Backdoor Defense in the Activation Space
Comments: ACL2024 Findings
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[124]  arXiv:2405.11141 [pdf, other]
Title: Enhancing Automata Learning with Statistical Machine Learning: A Network Security Case Study
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[125]  arXiv:2405.11135 [pdf, other]
Title: AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA
Comments: Code is available at this https URL
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2405.11109 [pdf, other]
Title: Enhancing Watermarked Language Models to Identify Users
Comments: 37 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[127]  arXiv:2405.11041 [pdf, ps, other]
Title: Two RSA-based Cryptosystems
Authors: A. Telveenus
Comments: 23 pages
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2405.11035 [pdf, other]
Title: DeFiTail: DeFi Protocol Inspection through Cross-Contract Execution Analysis
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2405.10994 [pdf, other]
Title: "What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation
Comments: To appear at Usenix Security 2024
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2405.10986 [pdf, ps, other]
Title: Benchmark Early and Red Team Often: A Framework for Assessing and Managing Dual-Use Hazards of AI Foundation Models
Comments: 62 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[131]  arXiv:2405.10979 [pdf, other]
Title: Private Data Leakage in Federated Human Activity Recognition for Wearable Healthcare Devices
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2405.12121 (cross-list from quant-ph) [pdf, other]
Title: Insecurity of Quantum Two-Party Computation with Applications to Cheat-Sensitive Protocols and Oblivious Transfer Reductions
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[133]  arXiv:2405.12085 (cross-list from quant-ph) [pdf, other]
Title: Noise-tolerant learnability of shallow quantum circuits from statistics and the cost of quantum pseudorandomness
Comments: 23+7 pages, 2 figures
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[134]  arXiv:2405.11916 (cross-list from cs.LG) [pdf, ps, other]
Title: Information Leakage from Embedding in Large Language Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[135]  arXiv:2405.11767 (cross-list from eess.AS) [pdf, other]
Title: Multi-speaker Text-to-speech Training with Speaker Anonymized Data
Comments: 5 pages. Submitted to Signal Processing Letters. Audio sample page: this https URL
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[136]  arXiv:2405.11724 (cross-list from cs.CL) [pdf, other]
Title: Token-wise Influential Training Data Retrieval for Large Language Models
Comments: Accepted to ACL 2024
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[137]  arXiv:2405.11608 (cross-list from quant-ph) [pdf, other]
Title: Full private delegated quantum computing tailored from user to industry
Comments: 15 pages, 9 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Emerging Technologies (cs.ET)
[138]  arXiv:2405.11575 (cross-list from cs.CL) [pdf, other]
Title: SEEP: Training Dynamics Grounds Latent Representation Search for Mitigating Backdoor Poisoning Attacks
Comments: accepted to TACL
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[139]  arXiv:2405.11547 (cross-list from stat.ML) [pdf, other]
Title: Certified Robust Accuracy of Neural Networks Are Bounded due to Bayes Errors
Authors: Ruihan Zhang, Jun Sun
Comments: accepted by CAV 2024
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[140]  arXiv:2405.11419 (cross-list from cs.DB) [pdf, other]
Title: Sketches-based join size estimation under local differential privacy
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[141]  arXiv:2405.11002 (cross-list from cs.LG) [pdf, other]
Title: Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[142]  arXiv:2405.10989 (cross-list from cs.LG) [pdf, other]
Title: Learnable Privacy Neurons Localization in Language Models
Comments: ACL 2024 main conference
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[143]  arXiv:2405.10970 (cross-list from cs.LG) [pdf, other]
Title: Untargeted Adversarial Attack on Knowledge Graph Embeddings
Comments: Accepted by SIGIR 2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 20 May 2024 (showing first 2 of 10 entries)

[144]  arXiv:2405.10906 [pdf, other]
Title: POSTER: Testing network-based RTK for GNSS receiver security
Comments: To appear in the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR)
[145]  arXiv:2405.10880 [pdf, ps, other]
Title: The MESA Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration
Journal-ref: International Journal of Network Security & Its Applications (IJNSA) 2024
Subjects: Cryptography and Security (cs.CR)
[ total of 153 entries: 1-50 | 46-95 | 96-145 | 146-153 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)