Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for December 2015

Total of 87 entries : 1-25 26-50 51-75 76-87
Showing up to 25 entries per page: fewer | more | all
[76] arXiv:1512.04965 (cross-list from quant-ph) [pdf, other]
Title: Applying Grover's algorithm to AES: quantum resource estimates
Markus Grassl, Brandon Langenberg, Martin Roetteler, Rainer Steinwandt
Comments: 13 pages, 3 figures, 5 tables; to appear in: Proceedings of the 7th International Conference on Post-Quantum Cryptography (PQCrypto 2016)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[77] arXiv:1512.05864 (cross-list from cs.DC) [pdf, other]
Title: Optimization of Tree Modes for Parallel Hash Functions: A Case Study
Kevin Atighehchi, Robert Rolland
Comments: Preprint version. Added citations, IEEE Transactions on Computers, 2017
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[78] arXiv:1512.06423 (cross-list from cs.DB) [pdf, other]
Title: On-the fly AES Decryption/Encryption for Cloud SQL Databases
Sushil Jajodia, Witold Litwin, Thomas Schwarz
Comments: 12 pages
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[79] arXiv:1512.06961 (cross-list from cs.IT) [pdf, other]
Title: Two-faced processes and random number generators
Boris Ryabko
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Probability (math.PR)
[80] arXiv:1512.06992 (cross-list from cs.AI) [pdf, other]
Title: On the Differential Privacy of Bayesian Inference
Zuhe Zhang, Benjamin Rubinstein, Christos Dimitrakakis
Comments: AAAI 2016, Feb 2016, Phoenix, Arizona, United States
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistics Theory (math.ST); Machine Learning (stat.ML)
[81] arXiv:1512.07158 (cross-list from cs.LG) [pdf, other]
Title: Feature Selection for Classification under Anonymity Constraint
Baichuan Zhang, Noman Mohammed, Vachik Dave, Mohammad Al Hasan
Comments: Transactions on Data Privacy 2017
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[82] arXiv:1512.07207 (cross-list from cs.CY) [pdf, other]
Title: A Critical Survey Of Privacy Infrastructures
B H Priyanka, Ravi Prakash
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[83] arXiv:1512.07330 (cross-list from cs.SI) [pdf, other]
Title: Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks
Srishti Gupta, Payas Gupta, Mustaque Ahamad, Ponnurangam Kumaraguru
Comments: Submitted to AsiaCCS 2016
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[84] arXiv:1512.07372 (cross-list from cs.SI) [pdf, other]
Title: Multi-centrality Graph Spectral Decompositions and their Application to Cyber Intrusion Detection
Pin-Yu Chen, Sutanay Choudhury, Alfred O. Hero
Comments: To appear in ICASSP 2016
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[85] arXiv:1512.08048 (cross-list from cs.AI) [pdf, other]
Title: Using Data Analytics to Detect Anomalous States in Vehicles
Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[86] arXiv:1512.08383 (cross-list from cs.DC) [pdf, other]
Title: Data Migration among Different Clouds
Ismail Hababeh
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[87] arXiv:1512.08951 (cross-list from cs.IT) [pdf, other]
Title: Robust Power Allocation and Outage Analysis for Secrecy in Independent Parallel Gaussian Channels
Siddhartha Sarma, Kundan Kandhway, Joy Kuri
Comments: 4 pages, 2 figures. Author version of the paper published in IEEE Wireless Communications Letters. Published version is accessible at this http URL
Journal-ref: IEEE Wireless Communications Letters, vol. 5, Issue 1, pp. 68-71, Feb. 2016
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
Total of 87 entries : 1-25 26-50 51-75 76-87
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack