Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for July 2022

Total of 337 entries : 1-25 ... 101-125 126-150 151-175 176-200 201-225 226-250 251-275 ... 326-337
Showing up to 25 entries per page: fewer | more | all
[176] arXiv:2207.10979 [pdf, other]
Title: Cryptanalysis of a System based on Twisted Dihedral Group Algebras
Simran Tinani
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[177] arXiv:2207.10999 [pdf, other]
Title: Applying Machine Learning on RSRP-based Features for False Base Station Detection
Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah
Comments: 9 pages,5 figure, 3 tables, 2 algorithms
Subjects: Cryptography and Security (cs.CR)
[178] arXiv:2207.11076 [pdf, other]
Title: Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence
Markus Bayer, Tobias Frey, Christian Reuter
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[179] arXiv:2207.11171 [pdf, other]
Title: Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js
Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu
Comments: USENIX Security'23
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[180] arXiv:2207.11181 [pdf, other]
Title: Secure and Lightweight Strong PUF Challenge Obfuscation with Keyed Non-linear FSR
Kleber Stangherlin, Zhuanhao Wu, Hiren Patel, Manoj Sachdev
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[181] arXiv:2207.11306 [pdf, other]
Title: Security policy audits: why and how
Arvind Narayanan, Kevin Lee
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[182] arXiv:2207.11456 [pdf, html, other]
Title: Accelerating Vertical Federated Learning
Dongqi Cai, Tao Fan, Yan Kang, Lixin Fan, Mengwei Xu, Shangguang Wang, Qiang Yang
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF)
[183] arXiv:2207.11519 [pdf, other]
Title: Bandwidth-Hard Functions from Random Permutations
Rishiraj Bhattacharyya, Avradip Mandal
Subjects: Cryptography and Security (cs.CR)
[184] arXiv:2207.11610 [pdf, other]
Title: Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)
Martin Ukrop, Lydia Kraus, Vashek Matyas
Journal-ref: Digital Threats: Research and Practice, Volume 1, Issue 4, December 2020, Article No.: 25, pp 1-29
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[185] arXiv:2207.11615 [pdf, other]
Title: SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony
Oğuzhan Ersoy, Jérémie Decouchant, Satwik Prabhu Kimble, Stefanie Roos
Comments: Preprint of a paper accepted at the ACM conference on Advances in Financial Technologies (AFT 2022)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[186] arXiv:2207.11657 [pdf, other]
Title: FileInsurer: A Scalable and Reliable Protocol for Decentralized File Storage in Blockchain
Hongyin Chen, Yuxuan Lu, Yukun Cheng
Subjects: Cryptography and Security (cs.CR)
[187] arXiv:2207.11689 [pdf, other]
Title: PMUSpill: The Counters in Performance Monitor Unit that Leak SGX-Protected Secrets
Pengfei Qiu, Yongqiang Lyu, Haixia Wang, Dongsheng Wang, Chang Liu, Qiang Gao, Chunlu Wang, Rihui Sun, Gang Qu
Subjects: Cryptography and Security (cs.CR)
[188] arXiv:2207.11872 [pdf, other]
Title: FAB: An FPGA-based Accelerator for Bootstrappable Fully Homomorphic Encryption
Rashmi Agrawal, Leo de Castro, Guowei Yang, Chiraag Juvekar, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Ajay Joshi
Comments: 14 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[189] arXiv:2207.11939 [pdf, other]
Title: An Encryption Method of ConvMixer Models without Performance Degradation
Ryota Iijima, Hitoshi Kiya
Comments: 6 pages, 5 figures. arXiv admin note: substantial text overlap with arXiv:2207.05366
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[190] arXiv:2207.12068 [pdf, other]
Title: A Dataset Generation Framework for profiling Disassembly attacks using Side-Channel Leakages and Deep Neural Networks
Pouya Narimani, Seyed Amin Habibi, Mohammad Ali Akhaee
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[191] arXiv:2207.12140 [pdf, other]
Title: Techniques for Continuous Touch-Based Authentication Modeling
Martin Georgiev, Simon Eberz, Ivan Martinovic
Subjects: Cryptography and Security (cs.CR)
[192] arXiv:2207.12197 [pdf, other]
Title: LiPI: Lightweight Privacy-Preserving Data Aggregation in IoT
Himanshu Goyal, Krishna Kodali, Sudipta Saha
Comments: 12 Pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[193] arXiv:2207.12326 [pdf, other]
Title: Automatic Fair Exchanges
Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, Luca Viganò
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[194] arXiv:2207.12355 [pdf, other]
Title: Developing Optimal Causal Cyber-Defence Agents via Cyber Security Simulation
Alex Andrew, Sam Spillard, Joshua Collyer, Neil Dhir
Comments: Presented at the Workshop on Machine Learning for Cybersecurity (ML4Cyber), at the 39th Proceedings of International Conference for Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[195] arXiv:2207.12405 [pdf, other]
Title: Versatile Weight Attack via Flipping Limited Bits
Jiawang Bai, Baoyuan Wu, Zhifeng Li, Shu-tao Xia
Comments: Extension of our ICLR 2021 work: arXiv:2102.10496
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[196] arXiv:2207.12482 [pdf, other]
Title: AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework with Oblivious Smart Contracts
Servio Palacios, Aaron Ault, James V. Krogmeier, Bharat Bhargava, Christopher G. Brinton
Comments: to be published in IEEE Transactions on Dependable and Secure Computing
Subjects: Cryptography and Security (cs.CR)
[197] arXiv:2207.12535 [pdf, other]
Title: Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning
Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang
Comments: Accepted to ECCV 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[198] arXiv:2207.12610 [pdf, other]
Title: Scalable Cyber-Physical Testbed for Cybersecurity Evaluation of Synchrophasors in Power Systems
Shuvangkar Chandra Das, Tuyen Vu
Comments: 11 pages, 14 figures
Subjects: Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[199] arXiv:2207.12796 [pdf, other]
Title: Secure Internet Exams Despite Coercion
Mohammadamin Rakeei, Rosario Giustolisi, Gabriele Lenzini
Subjects: Cryptography and Security (cs.CR)
[200] arXiv:2207.12816 [pdf, other]
Title: Generative Extraction of Audio Classifiers for Speaker Identification
Tejumade Afonja, Lucas Bourtoule, Varun Chandrasekaran, Sageev Oore, Nicolas Papernot
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
Total of 337 entries : 1-25 ... 101-125 126-150 151-175 176-200 201-225 226-250 251-275 ... 326-337
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack