We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 139 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 126-139 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 2 May 2024

[1]  arXiv:2405.00596 [pdf, other]
Title: Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2405.00531 [pdf, other]
Title: Byzantine-Secure Relying Party for Resilient RPKI
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2405.00526 [pdf, other]
Title: JNI Global References Are Still Vulnerable: Attacks and Defenses
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2405.00482 [pdf, other]
Title: PackVFL: Efficient HE Packing for Vertical Federated Learning
Comments: 12 pages excluding references
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[5]  arXiv:2405.00441 [pdf, other]
Title: Modeling Linear and Non-linear Layers: An MILP Approach Towards Finding Differential and Impossible Differential Propagations
Comments: 42 pages, 2 figures, 21 tables, 7 algorithms
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2405.00426 [pdf, other]
Title: On the Potential of RIS in the Context of PLA in Wireless Communication Systems
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Signal Processing (eess.SP)
[7]  arXiv:2405.00418 [pdf, other]
Title: Detection of ransomware attacks using federated learning based on the CNN model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[8]  arXiv:2405.00395 [pdf, other]
Title: Trust Driven On-Demand Scheme for Client Deployment in Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[9]  arXiv:2405.00393 [pdf, other]
Title: Inferring State Machine from the Protocol Implementation via Large Langeuage Model
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2405.00392 [pdf, other]
Title: Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[11]  arXiv:2405.00329 [pdf, ps, other]
Title: Metric geometry of the privacy-utility tradeoff
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Probability (math.PR)
[12]  arXiv:2405.00308 [pdf, ps, other]
Title: FPGA Digital Dice using Pseudo Random Number Generator
Comments: 15 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[13]  arXiv:2405.00298 [pdf, other]
Title: The Reversing Machine: Reconstructing Memory Assumptions
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2405.00267 [pdf, other]
Title: Differentially Private Release of Israel's National Registry of Live Births
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Data Structures and Algorithms (cs.DS)
[15]  arXiv:2405.00218 [pdf, other]
Title: Constrained Decoding for Secure Code Generation
Comments: 17 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Software Engineering (cs.SE)
[16]  arXiv:2405.00138 [pdf, other]
Title: Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2405.00078 [pdf, other]
Title: Mitigating Spectre-PHT using Speculation Barriers in Linux BPF
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[18]  arXiv:2405.00066 [pdf, other]
Title: Research and application of artificial intelligence based webshell detection model: A literature review
Comments: 21 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[19]  arXiv:2405.00663 (cross-list from quant-ph) [pdf, other]
Title: Quantum cryptographic protocols with dual messaging system via 2D alternate quantum walks and genuine single particle entangled states
Comments: 11 pages (including supplementary material), 2 figures and 1 table
Subjects: Quantum Physics (quant-ph); Disordered Systems and Neural Networks (cond-mat.dis-nn); Cryptography and Security (cs.CR); Quantum Algebra (math.QA); Optics (physics.optics)
[20]  arXiv:2405.00610 (cross-list from math.GR) [pdf, ps, other]
Title: Growth in products of matrices: fastest, average, and generic
Comments: 10 pages. Comments are welcome
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR); Combinatorics (math.CO); Dynamical Systems (math.DS); Probability (math.PR)
[21]  arXiv:2405.00466 (cross-list from cs.CV) [pdf, other]
Title: Lazy Layers to Make Fine-Tuned Diffusion Models More Traceable
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[22]  arXiv:2405.00009 (cross-list from cs.DC) [pdf, other]
Title: Service Level Agreements and Security SLA: A Comprehensive Survey
Comments: 25 pages, 5 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)

Wed, 1 May 2024 (showing first 3 of 21 entries)

[23]  arXiv:2404.19744 [pdf, other]
Title: PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[24]  arXiv:2404.19715 [pdf, other]
Title: Assessing LLMs in Malicious Code Deobfuscation of Real-world Malware Campaigns
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2404.19677 [pdf, ps, other]
Title: A Comprehensive Analysis of Pegasus Spyware and Its Implications for Digital Privacy and Security
Authors: Karwan Kareem
Comments: 13 Pages
Subjects: Cryptography and Security (cs.CR)
[ total of 139 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 126-139 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)