Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for September 2015

Total of 48 entries
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:1509.00239 [pdf, other]
Title: CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection
Jeremiah Blocki, Anupam Datta
Comments: 29th IEEE Computer Security Foundations Symposium (Full Version)
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1509.00643 [pdf, other]
Title: How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems
Olga Gadyatskaya
Comments: GraMSec 2015, 16 pages
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1509.00689 [pdf, other]
Title: On Normalized Compression Distance and Large Malware
Rebecca Schuller Borbely
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1509.00789 [pdf, other]
Title: k-fingerprinting: a Robust Scalable Website Fingerprinting Technique
Jamie Hayes, George Danezis
Comments: 17 pages
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1509.00961 [pdf, other]
Title: A Typology of Authentication Systems
Christopher S. Pilson, James C. McElroy
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1509.00981 [pdf, other]
Title: Security Analysis of Secure Force Algorithm for Wireless Sensor Networks
Shujaat Khan, Muhammad Sohail Ibrahim, Kafeel Ahmed Khan, Mansoor Ebrahim
Comments: in Asian Journal of Engineering Science and Technology 2015
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1509.01504 [pdf, other]
Title: Insecure primitive elements in an ElGamal signature protocol
Omar Khadir
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1509.01552 [pdf, other]
Title: Overview on Security Approaches in Intelligent Transportation Systems
Christoph Ponikwar, Hans-Joachim Hof
Comments: The Ninth International Conference on Emerging Security Information, Systems and Technologies - SECURWARE 2015, Venice, Italy, 2015
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[9] arXiv:1509.01763 [pdf, other]
Title: Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler
Yihua Zhang, Marina Blanton, Ghada Almashaqbeh
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[10] arXiv:1509.02268 [pdf, other]
Title: A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds
Yi-Hsuan Kung, Taeho Lee, Po-Ning Tseng, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Yue-Hsun Lin, Adrian Perrig
Comments: 16 pages, a full technical report for 'A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds' in IEEE International Conference on Network Protocols, 2015
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1509.02584 [pdf, other]
Title: XCRUSH: A Family of ARX Block Ciphers
Evan Saulpaugh
Comments: 14 pages, 2 figures. Includes test vectors and C99 reference implementation
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1509.02849 [pdf, other]
Title: Hiding the Rumor Source
Giulia Fanti, Peter Kairouz, Sewoong Oh, Kannan Ramchandran, Pramod Viswanath
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[13] arXiv:1509.03091 [pdf, other]
Title: Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++
Ryan D. L. Engle, Douglas D. Hodson, Michael R. Grimaila, Logan O. Mailloux, Colin V. McLaughlin, Gerald Baumgartner
Comments: Published in: A. Förster, C. Minkenberg, G. R. Herrera, M. Kirsche (Eds.), Proc. of the 2nd OMNeT++ Community Summit, IBM Research - Zurich, Switzerland, September 3-4, 2015
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Quantum Physics (quant-ph)
[14] arXiv:1509.03531 [pdf, other]
Title: Towards Detecting Compromised Accounts on Social Networks
Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna
Journal-ref: TDSC-2014-10-0271.R1
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[15] arXiv:1509.03646 [pdf, other]
Title: Key Exchange Protocol in the Trusted Data Servers Context
Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1509.03843 [pdf, other]
Title: Attack on a classical analogue of the Dunjko, Wallden, Kent and Andersson quantum digital signature protocol
Derrick Newton
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1509.03934 [pdf, other]
Title: Dpush: A scalable decentralized spam resistant unsolicited messaging protocol
Sam Maloney
Comments: Newest paper/design; signature was moved inside encrypted data for anonymity of sender to non recipients, grammar improvements
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[18] arXiv:1509.04387 [pdf, other]
Title: Dual-Layer Video Encryption using RSA Algorithm
Aman Chadha, Sushmit Mallik, Ankit Chadha, Ravdeep Johar, M. Mani Roja
Comments: arXiv admin note: text overlap with arXiv:1104.0800, arXiv:1112.0836 by other authors
Journal-ref: International Journal of Computer Applications 116(1):33-40, April 2015
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM); Image and Video Processing (eess.IV)
[19] arXiv:1509.04639 [pdf, other]
Title: Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation
Deepjyoti Deka, Ross Baldick, Sriram Vishwanath
Comments: 11 pages, 8 figures, A version of this will appear in HICSS 2016
Subjects: Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[20] arXiv:1509.05582 [pdf, other]
Title: SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network
Roy Ka-Wei Lee, Yingjiu Li
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1509.05988 [pdf, other]
Title: The adaptation of Shamir's protocol for increasing the security of a mobile environment
Jānis Buls, Imants Gorbans, Ivans Kulesovs, Uldis Straujums
Comments: 8 pages
Journal-ref: Baltic J. Modern Computing, Vol.4(2016), No.1, pp. 51-58
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1509.06094 [pdf, other]
Title: A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability
Nilesh Chakraborty, Samrat Mondal
Comments: 8 pages, IEEE Conference format
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1509.06160 [pdf, other]
Title: Transaction Remote Release (TRR): A New Anonymization Technology for Bitcoin
QingChun ShenTu, JianPing Yu
Comments: 18 pages, 5 figures, 5 tables
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1509.06524 [pdf, other]
Title: Option contracts for a privacy-aware market
Maurizio Naldi, Giuseppe D'Acquisto
Subjects: Cryptography and Security (cs.CR); General Finance (q-fin.GN)
[25] arXiv:1509.06813 [pdf, other]
Title: Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Moonseong Kim, Juryon Paik, Dongho Won
Journal-ref: PLoS ONE 10(4): e0116709, 2015
Subjects: Cryptography and Security (cs.CR)
[26] arXiv:1509.06815 [pdf, other]
Title: A Forensically Sound Adversary Model for Mobile Devices
Quang Do, Ben Martini, Kim-Kwang Raymond Choo
Journal-ref: PLoS ONE 10(9): e0138449, 2015
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1509.07092 [pdf, other]
Title: Analysis of Short Blocklength Codes for Secrecy
Willie K. Harrison, Dinis Sarmento, João P. Vilela, Marco Gomes
Comments: 10 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[28] arXiv:1509.07552 [pdf, other]
Title: Formal Support for Standardizing Protocols with State
Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1509.08239 [pdf, other]
Title: Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System
Mohanad Albayati, Biju Issac
Journal-ref: International Journal of Computational Intelligence Systems, 8:5, 841-853 (2015)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[30] arXiv:1509.08562 [pdf, other]
Title: Quantitative Information Flow for Scheduler-Dependent Systems
Yusuke Kawamoto, Thomas Given-Wilson
Comments: In Proceedings QAPL 2015, arXiv:1509.08169
Journal-ref: EPTCS 194, 2015, pp. 48-62
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Programming Languages (cs.PL)
[31] arXiv:1509.00279 (cross-list from cs.IT) [pdf, other]
Title: Information Sets of Multiplicity Codes
Daniel Augot (GRACE), Françoise Levy-Dit-Vehel (ENSTA ParisTech UMA), Man Cuong Ngô (GRACE)
Comments: International Symposium on Information Theory, Jun 2015, Hong-Kong, China. IEEE
Subjects: Information Theory (cs.IT); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[32] arXiv:1509.00844 (cross-list from math.HO) [pdf, other]
Title: Locks and keys: How fast can you open several locks with too many keys?
Olivier Marchal
Comments: 12 pages, 6 figures. To be read essentially for fun
Subjects: History and Overview (math.HO); Cryptography and Security (cs.CR); Probability (math.PR)
[33] arXiv:1509.01075 (cross-list from cs.IT) [pdf, other]
Title: Group key management based on semigroup actions
Juan Antonio Lopez-Ramos, Joachim Rosenthal, Davide Schipani, Reto Schnyder
Comments: accepted for publication in Journal of algebra and its applications
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[34] arXiv:1509.02612 (cross-list from math.AC) [pdf, other]
Title: Roots of unity in orders
H. W. Lenstra Jr., A. Silverberg
Comments: The numbering of the results has been changed to agree with the published version
Journal-ref: Foundations of Computational Mathematics (2016)
Subjects: Commutative Algebra (math.AC); Cryptography and Security (cs.CR); Number Theory (math.NT)
[35] arXiv:1509.02944 (cross-list from quant-ph) [pdf, other]
Title: Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model
Edward Eaton, Fang Song
Comments: 15 pages, to appear in Proceedings TQC 2015
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[36] arXiv:1509.03262 (cross-list from math.OC) [pdf, other]
Title: A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks
Yasser Shoukry, Pierluigi Nuzzo, Nicola Bezzo, Alberto L. Sangiovanni-Vincentelli, Sanjit A. Seshia, Paulo Tabuada
Comments: arXiv admin note: text overlap with arXiv:1412.4324
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[37] arXiv:1509.04098 (cross-list from cs.SI) [pdf, other]
Title: Fame for sale: efficient detection of fake Twitter followers
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
Journal-ref: Decision Support Systems, 80, 56-71, 2015
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[38] arXiv:1509.04153 (cross-list from cs.LO) [pdf, other]
Title: Dependency-Based Information Flow Analysis with Declassification in a Program Logic
Bart van Delft, Richard Bubel
Comments: Technical Report; 23 pages
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[39] arXiv:1509.05086 (cross-list from cs.LG) [pdf, other]
Title: Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks
Jordan Landford, Rich Meier, Richard Barella, Xinghui Zhao, Eduardo Cotilla-Sanchez, Robert B. Bass, Scott Wallace
Comments: 8 pages, 4 figures, submitted to IEEE Transactions
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[40] arXiv:1509.05500 (cross-list from math.OC) [pdf, other]
Title: On Reconstructability of Quadratic Utility Functions from the Iterations in Gradient Methods
Farhad Farokhi, Iman Shames, Michael G. Rabbat, Mikael Johansson
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Probability (math.PR)
[41] arXiv:1509.05745 (cross-list from math.NT) [pdf, other]
Title: Narayana Sequences for Cryptographic Applications
Krishnamurthy Kirthi
Comments: 10 pages
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[42] arXiv:1509.05882 (cross-list from quant-ph) [pdf, other]
Title: Efficient Controlled Quantum Secure Direct Communication Protocols
Siddharth Patwardhan, Subhayan Roy Moulick, Prasanta K. Panigrahi
Comments: 9 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[43] arXiv:1509.07106 (cross-list from quant-ph) [pdf, other]
Title: Perfectly secure steganography: hiding information in the quantum noise of a photograph
Bruno Sanguinetti, Anthony Martin, Giulia Traverso, Jonathan Lavoie, Hugo Zbinden
Comments: 5 pages, 3 figures + appendix : 5 pages, 6 figures
Journal-ref: Phys. Rev. A 93, 012336 (2016)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[44] arXiv:1509.07741 (cross-list from cs.CY) [pdf, other]
Title: A vulnerability in Google AdSense: Automatic extraction of links to ads
Manuel Blázquez Ochando
Comments: 8 figures
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[45] arXiv:1509.07892 (cross-list from cs.LG) [pdf, other]
Title: Evasion and Hardening of Tree Ensemble Classifiers
Alex Kantchelian, J. D. Tygar, Anthony D. Joseph
Comments: 11 pages, 7 figures, Appears in Proceedings of the 33rd International Conference on Machine Learning (ICML), New York, NY, USA, 2016. JMLR: W&CP volume 48
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[46] arXiv:1509.08150 (cross-list from cs.ET) [pdf, other]
Title: Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange
Laszlo Bela Kish, Claes-Goran Granqvist
Comments: submitted for journal publication; 8 pages, 4 figures
Journal-ref: Metrology and Measurement Systems, Volume 23, Issue 1, Pages 3-11, 2016
Subjects: Emerging Technologies (cs.ET); Cryptography and Security (cs.CR)
[47] arXiv:1509.08565 (cross-list from cs.LO) [pdf, other]
Title: Semiring-based Specification Approaches for Quantitative Security
Fabio Martinelli (IIT-CNR), Ilaria Matteucci (IIT-CNR), Francesco Santini (IIT-CNR)
Comments: In Proceedings QAPL 2015, arXiv:1509.08169
Journal-ref: EPTCS 194, 2015, pp. 95-109
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Programming Languages (cs.PL)
[48] arXiv:1509.09271 (cross-list from quant-ph) [pdf, other]
Title: Optimal quantum algorithm for polynomial interpolation
Andrew M. Childs, Wim van Dam, Shih-Han Hung, Igor E. Shparlinski
Comments: 17 pages, minor improvements, added conjecture about multivariate interpolation
Journal-ref: Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016), pp. 16:1-16:13 (2016)
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
Total of 48 entries
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack