We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 130 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 126-130 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 26 Apr 2024 (showing first 25 of 27 entries)

[1]  arXiv:2404.16744 [pdf, ps, other]
Title: JITScanner: Just-in-Time Executable Page Check in the Linux Operating System
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2404.16651 [pdf, other]
Title: Evolutionary Large Language Models for Hardware Security: A Comparative Survey
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2404.16632 [pdf, ps, other]
Title: Introducing Systems Thinking as a Framework for Teaching and Assessing Threat Modeling Competency
Comments: Presented at the Annual Conference of the American Society for Engineering Education (ASEE'24) 2024
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[4]  arXiv:2404.16504 [pdf, ps, other]
Title: Hardware Implementation of Double Pendulum Pseudo Random Number Generator
Comments: 15 pages, 12 figure
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[5]  arXiv:2404.16363 [pdf, other]
Title: Byzantine Attacks Exploiting Penalties in Ethereum PoS
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[6]  arXiv:2404.16362 [pdf, other]
Title: Feature graph construction with static features for malware detection
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2404.16271 [pdf, ps, other]
Title: True random number generation using metastable 1T' molybdenum ditelluride
Subjects: Cryptography and Security (cs.CR); Materials Science (cond-mat.mtrl-sci)
[8]  arXiv:2404.16256 [pdf, other]
Title: Probabilistic Tracker Management Policies for Low-Cost and Scalable Rowhammer Mitigation
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[9]  arXiv:2404.16255 [pdf, other]
Title: Enhancing Privacy in Face Analytics Using Fully Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[10]  arXiv:2404.16251 [pdf, ps, other]
Title: Investigating the prompt leakage effect and black-box defenses for multi-turn LLM interactions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[11]  arXiv:2404.16241 [pdf, other]
Title: Synergizing Privacy and Utility in Data Analytics Through Advanced Information Theorization
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2404.16232 [pdf, other]
Title: SECO: Secure Inference With Model Splitting Across Multi-Server Hierarchy
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[13]  arXiv:2404.16212 [pdf, other]
Title: An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape
Comments: Accepted to IEEE S&P 2024; 19 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[14]  arXiv:2404.16195 [pdf, other]
Title: A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[15]  arXiv:2404.16120 [pdf, other]
Title: Securing Hybrid Wireless Body Area Networks (HyWBAN): Advancements in Semantic Communications and Jamming Techniques
Journal-ref: Digital Health and Wireless Solutions, 2024
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[16]  arXiv:2404.16118 [pdf, other]
Title: Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2404.16117 [pdf, other]
Title: Cybersecurity Assessment of the Polar Bluetooth Low Energy Heart-rate Sensor
Authors: Smone Soderi
Comments: Body Area Networks: Smart IoT and Big Data for Intelligent Health Management, 2019
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[18]  arXiv:2404.16751 (cross-list from quant-ph) [pdf, other]
Title: Efficient unitary designs and pseudorandom unitaries from permutations
Comments: 70 pages, 11 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Mathematical Physics (math-ph)
[19]  arXiv:2404.16706 (cross-list from cs.DS) [pdf, other]
Title: Efficient and Near-Optimal Noise Generation for Streaming Differential Privacy
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2404.16638 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Statistical Data Generation: Application to Sepsis Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[21]  arXiv:2404.16287 (cross-list from stat.ML) [pdf, other]
Title: Differentially Private Federated Learning: Servers Trustworthiness, Estimation, and Statistical Inference
Comments: 56 pages, 3 figures
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistics Theory (math.ST); Methodology (stat.ME)
[22]  arXiv:2404.16220 (cross-list from cs.IT) [pdf, other]
Title: When does a bent concatenation not belong to the completed Maiorana-McFarland class?
Comments: This is the authors' version of the camera-ready version to be presented at the 2024 IEEE International Symposium on Information Theory (ISIT 2024)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Combinatorics (math.CO)
[23]  arXiv:2404.16177 (cross-list from cs.IR) [pdf, other]
Title: Advancing Recommender Systems by mitigating Shilling attacks
Comments: Published in IEEE, Proceedings of 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[24]  arXiv:2404.16156 (cross-list from quant-ph) [pdf, other]
Title: Guardians of the Quantum GAN
Comments: 11 pages, 10 figures
Subjects: Quantum Physics (quant-ph); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2404.16154 (cross-list from cs.LG) [pdf, other]
Title: A Comparative Analysis of Adversarial Robustness for Quantum and Classical Machine Learning Models
Comments: submitted to IEEE QCE24
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[ total of 130 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 126-130 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2404, contact, help  (Access key information)