We gratefully acknowledge support from
the Simons Foundation
and member institutions

Cryptography and Security

Authors and titles for recent submissions

[ total of 41 entries: 1-25 | 26-41 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 17 Nov 2017

[1]  arXiv:1711.06234 [pdf, other]
Title: Privacy-preserving Edit Distance on Genomic Data
Comments: 5 pages, 1 figure, 2 algorithm
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:1711.06073 [pdf, other]
Title: An n-sided polygonal model to calculate the impact of cyber security events
Comments: 16 pages, 5 figures, 2 tables, 11th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2016), Roscoff, France, September 2016
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:1711.06063 [pdf, ps, other]
Title: On error linear complexity of new generalized cyclotomic binary sequences of period $p^2$
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[4]  arXiv:1711.06039 [pdf, ps, other]
Title: Cloud Data Auditing Using Proofs of Retrievability
Comments: A version has been published as a book chapter in Guide to Security Assurance for Cloud Computing (Springer International Publishing Switzerland 2015)
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:1711.05824 [pdf]
Title: Security Issues in Controller Area Networks in Automobiles
Comments: 6 pages. 18th international conference on Sciences and Techniques of Automatic control & computer engineering - STA'2017, Monastir, Tunisia, December 21-23, 2017
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:1711.05934 (cross-list from cs.CV) [pdf, other]
Title: Enhanced Attacks on Defensively Distilled Deep Neural Networks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Learning (cs.LG)

Thu, 16 Nov 2017

[7]  arXiv:1711.05731 [pdf, other]
Title: Android Malware Detection using Markov Chain Model of Application Behaviors in Requesting System Services
Comments: SUBMITTED TO THE IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:1711.05441 [pdf, other]
Title: CTRL+Z: Recovering Anonymized Social Graphs
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[9]  arXiv:1711.05332 [pdf, other]
Title: Barrel Shifter Physical Unclonable Function Based Encryption
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:1711.05296 [pdf, other]
Title: Practical Whole-System Provenance Capture
Comments: 15 pages, 7 figures
Journal-ref: SoCC '17 Proceedings of the 2017 Symposium on Cloud Computing
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:1711.05284 [pdf, other]
Title: Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging
Comments: To be published in Proc. International Conference On Computer Aided Design (ICCAD) 2017
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:1711.05475 (cross-list from cs.LG) [pdf, other]
Title: The best defense is a good offense: Countering black box attacks by predicting slightly wrong labels
Subjects: Learning (cs.LG); Cryptography and Security (cs.CR)
[13]  arXiv:1711.00853 (cross-list from quant-ph) [pdf, other]
Title: Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Authors: Huiqin Xie, Li Yang
Comments: 28 pages, 1 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Wed, 15 Nov 2017 (showing first 12 of 16 entries)

[14]  arXiv:1711.05189 [pdf, other]
Title: CryptoDL: Deep Neural Networks over Encrypted Data
Subjects: Cryptography and Security (cs.CR); Learning (cs.LG)
[15]  arXiv:1711.04974 [pdf, other]
Title: Modeling and Performance Comparison of Privacy Approaches for Location Based Services
Comments: 18 pages and 11 figures
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:1711.04902 [pdf, other]
Title: PassBio: Privacy-Preserving User-Centric Biometric Authentication
Authors: Kai Zhou, Jian Ren
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:1711.04822 [pdf, other]
Title: Vulnerabilities of Electric Vehicle Battery Packs to Cyberattacks on Auxiliary Components
Comments: 7 pages, 5 figures, Supporting Information
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:1711.04808 [pdf, other]
Title: A Design-Space Exploration for Allocating Security Tasks in Multicore Real-Time Systems
Comments: Accepted for publication, 21st DATE (Design, Automation & Test in Europe) conference, 2018
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[19]  arXiv:1711.04709 [pdf, other]
Title: Stampery Blockchain Timestamping Architecture (BTA) - Version 6
Comments: 21 pages, 16 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS)
[20]  arXiv:1711.04642 [pdf, ps, other]
Title: Cryptanalysis of Merkle-Hellman cipher using parallel genetic algorithm
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[21]  arXiv:1711.04591 [pdf, ps, other]
Title: Beyond the Hype: On Using Blockchains in Trust Management for Authentication
Comments: A version of this paper was published in IEEE Trustcom. this http URL
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:1711.04459 [pdf, other]
Title: Multilayer Nonlinear Processing for Information Privacy in Sensor Networks
Comments: 13 pages, 17 figures, submitted to IEEE Transactions on Information Forensics and Security
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[23]  arXiv:1711.04243 [pdf, ps, other]
Title: Strongly Secure and Efficient Data Shuffle On Hardware Enclaves
Comments: Systex'17
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:1711.04062 [pdf, other]
Title: Mathematics of Isogeny Based Cryptography
Authors: Luca De Feo
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[25]  arXiv:1711.05244 (cross-list from cs.IT) [pdf, other]
Title: Private Information Retrieval from Storage Constrained Databases -- Coded Caching meets PIR
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[ total of 41 entries: 1-25 | 26-41 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)