Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for December 2021

Total of 337 entries : 1-25 ... 101-125 126-150 151-175 176-200 201-225 226-250 251-275 ... 326-337
Showing up to 25 entries per page: fewer | more | all
[176] arXiv:2112.11484 [pdf, other]
Title: CryptoMiniSat Switches-Optimization for Solving Cryptographic Instances
A.-M. Leventi-Peetz, O. Zendel, W. Lennartz, K. Weber
Journal-ref: Daniel Le Berre, Matti J\"arvisalo (eds). Proceedings of Pragmatics of SAT 2015 and 2018. EPiC Series in Computing, vol. 59, pp. 79--93, 2019
Subjects: Cryptography and Security (cs.CR)
[177] arXiv:2112.11721 [pdf, other]
Title: Towards Malicious address identification in Bitcoin
Deepesh Chaudhari, Rachit Agarwal, Sandeep Kumar Shukla
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[178] arXiv:2112.11745 [pdf, other]
Title: Security Risks of Porting C Programs to WebAssembly
Quentin Stiévenart, Coen De Roover, Mohammad Ghafari
Comments: The 37th ACM/SIGAPP Symposium on Applied Computing (SAC'22), 2022. arXiv admin note: text overlap with arXiv:2111.01421
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[179] arXiv:2112.11986 [pdf, other]
Title: Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection
George Gunter, Huichen Li, Avesta Hojjati, Matthew Nice, Matthew Bunting, Carl A. Gunter, Bo Li, Jonathan Sprinkle, Daniel Work
Subjects: Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Systems and Control (eess.SY)
[180] arXiv:2112.12006 [pdf, other]
Title: Catch Me If You GAN: Using Artificial Intelligence for Fake Log Generation
Christian Toemmel
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[181] arXiv:2112.12042 [pdf, other]
Title: Physical ZKP for Makaro Using a Standard Deck of Cards
Suthee Ruangwises, Toshiya Itoh
Comments: This paper has appeared at TAMC 2022
Subjects: Cryptography and Security (cs.CR)
[182] arXiv:2112.12095 [pdf, other]
Title: Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems
Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza
Comments: Advances in Cyber Security. ACeS 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[183] arXiv:2112.12232 [pdf, other]
Title: Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher
Nilupulee A. Gunathilake, Ahmed Al-Dubai, William J. Buchanan, Owen Lo
Journal-ref: 2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)
Subjects: Cryptography and Security (cs.CR)
[184] arXiv:2112.12268 [pdf, html, other]
Title: An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG
Carla Mascia, Enrico Piccione, Massimiliano Sala
Comments: Advances in Mathematics of Communications. 2023
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[185] arXiv:2112.12279 [pdf, other]
Title: Randomize the Future: Asymptotically Optimal Locally Private Frequency Estimation Protocol for Longitudinal Data
Olga Ohrimenko, Anthony Wirth, Hao Wu
Subjects: Cryptography and Security (cs.CR)
[186] arXiv:2112.12310 [pdf, other]
Title: Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu
Comments: Accepted by ELSEVIER Computers & Security (COSE)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[187] arXiv:2112.12315 [pdf, other]
Title: A Multi-Objective Degree-Based Network Anonymization Approach
Ola N. Halawi, Faisal N. Abu-Khzam
Subjects: Cryptography and Security (cs.CR)
[188] arXiv:2112.12346 [pdf, other]
Title: Statistical Feature-based Personal Information Detection in Mobile Network Traffic
Shuang Zhao, Shuhui Chen, Ziling Wei
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[189] arXiv:2112.12411 [pdf, other]
Title: Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy
Riad Ladjel, Nicolas Anciaux, Aurélien Bellet, Guillaume Scerri
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[190] arXiv:2112.12445 [pdf, other]
Title: An analysis of Coggia-Couvreur attack on Loidreau's rank-metric public key encryption scheme in the general case
Pierre Loidreau (1), Ba-Duc Pham (2) ((1) Univ Rennes, DGA MI, CNRS, IRMAR - UMR 6625, F-35000 Rennes, France, (2) Univ Rennes, IRMAR - UMR 6625, F-35000 Rennes, France)
Comments: Long version of an article submitted at the conference WCC 2022
Subjects: Cryptography and Security (cs.CR)
[191] arXiv:2112.12546 [pdf, other]
Title: Collaborative adversary nodes learning on the logs of IoT devices in an IoT network
Sandhya Aneja, Melanie Ang Xuan En, Nagender Aneja
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[192] arXiv:2112.12595 [pdf, other]
Title: KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration
Mubin Ul Haque, M. Mehdi Kholoosi, M. Ali Babar
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[193] arXiv:2112.12597 [pdf, other]
Title: Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities
Mubin Ul Haque, M. Ali Babar
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[194] arXiv:2112.12727 [pdf, other]
Title: EIFFeL: Ensuring Integrity for Federated Learning
Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten
Subjects: Cryptography and Security (cs.CR)
[195] arXiv:2112.12790 [pdf, other]
Title: Out to Explore the Cybersecurity Planet
Giampaolo Bella
Subjects: Cryptography and Security (cs.CR)
[196] arXiv:2112.12855 [pdf, other]
Title: SoK: Privacy-preserving Deep Learning with Homomorphic Encryption
Robert Podschwadt, Daniel Takabi, Peizhao Hu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[197] arXiv:2112.12906 [pdf, other]
Title: Efficient decision tree training with new data structure for secure multi-party computation
Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Koji Chida
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR)
[198] arXiv:2112.12998 [pdf, other]
Title: DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning
Ismat Jarin, Birhanu Eshete
Comments: To appear in proceedings of the 12th ACM Conference on Data and Application Security and Privacy (CODASPY 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[199] arXiv:2112.13009 [pdf, other]
Title: One Bad Apple Spoils the Bunch: Transaction DoS in MimbleWimble Blockchains
Seyed Ali Tabatabaee, Charlene Nicer, Ivan Beschastnikh, Chen Feng
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[200] arXiv:2112.13064 [pdf, html, other]
Title: CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path Fuzzing
Haibo Jin, Ruoxi Chen, Jinyin Chen, Haibin Zheng, Yang Zhang, Haohan Wang
Comments: 35 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
Total of 337 entries : 1-25 ... 101-125 126-150 151-175 176-200 201-225 226-250 251-275 ... 326-337
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack