cicyt UNIZAR

Cryptography and Security

Authors and titles for recent submissions

[ total of 33 entries: 1-25 | 26-33 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 23 Feb 2018

[1]  arXiv:1802.07975 [pdf, other]
Title: Options for encoding names for data linking at the Australian Bureau of Statistics
Comments: University of Melbourne Research Contract 85449779. After receiving a draft of this report, ABS conducted a further assessment of Options 2 and 3, which will be published on their website
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:1802.08232 (cross-list from cs.LG) [pdf, other]
Title: The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets
Subjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[3]  arXiv:1802.08105 (cross-list from math.NT) [pdf, ps, other]
Title: Linear complexity of Ding-Helleseth generalized cyclotomic sequences of order eight
Comments: 18 pages, 7 tables
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)

Thu, 22 Feb 2018

[4]  arXiv:1802.07545 [pdf, ps, other]
Title: A Novel Image Encryption Scheme Based on Different Block Sizes for Grayscale and Color Images
Comments: 7 pages, 4 figures, conference
Journal-ref: 12th International Conference on Computer Engineering and Systems (ICCES) 2017
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:1802.07523 [pdf, other]
Title: Toward Open Data Blockchain Analytics: A Bitcoin Perspective
Comments: 17 pages, 9 Figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[6]  arXiv:1802.07433 [pdf, ps, other]
Title: Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[7]  arXiv:1802.07381 [pdf, ps, other]
Title: How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:1802.07344 [pdf, other]
Title: Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:1802.07673 (cross-list from cs.CC) [pdf, ps, other]
Title: Non-Malleable Codes for Small-Depth Circuits
Comments: 26 pages, 4 figures
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[10]  arXiv:1802.07422 (cross-list from q-fin.GN) [pdf]
Title: Blockchain: Data Malls, Coin Economies and Keyless Payments
Comments: 32 pages
Subjects: General Finance (q-fin.GN); Cryptography and Security (cs.CR); Economics (q-fin.EC)
[11]  arXiv:1802.07300 (cross-list from math.GR) [pdf, ps, other]
Title: Problems in group theory motivated by cryptography
Comments: Please don't hesitate to let me know if you think some other references should be included in this survey
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)

Wed, 21 Feb 2018

[12]  arXiv:1802.07233 [pdf, other]
Title: Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities
Comments: published at the 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017)
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:1802.07231 [pdf, other]
Title: Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions
Comments: published at the 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017)
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:1802.07132 [pdf, other]
Title: Capstone: Mobility Modeling on Smartphones to Achieve Privacy by Design
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[15]  arXiv:1802.07119 [pdf, other]
Title: TRLF: An Effective Semi-fragile Watermarking Method for Tamper Detection and Recovery based on LWT and FNN
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[16]  arXiv:1802.07062 [pdf, other]
Title: A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[17]  arXiv:1802.07060 [pdf, other]
Title: Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:1802.06993 [pdf, other]
Title: A Survey on the Security of Blockchain Systems
Comments: Future Generation Computer Systems
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:1802.07228 (cross-list from cs.AI) [pdf]
Title: The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[20]  arXiv:1802.07023 (cross-list from cs.NI) [pdf, other]
Title: BAN-GZKP: Optimal Zero Knowledge Proof based Scheme for Wireless Body Area Networks
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Performance (cs.PF)
[21]  arXiv:1802.06970 (cross-list from cs.NI) [pdf, other]
Title: ISA-Based Trusted Network Functions And Server Applications In The Untrusted Cloud
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[22]  arXiv:1802.06870 (cross-list from cs.SC) [pdf, other]
Title: Formal Analysis of Galois Field Arithmetics - Parallel Verification and Reverse Engineering
Comments: To appear in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. (TCAD'18); extended version. arXiv admin note: text overlap with arXiv:1611.05101
Subjects: Symbolic Computation (cs.SC); Cryptography and Security (cs.CR)
[23]  arXiv:1802.06816 (cross-list from cs.CV) [pdf, other]
Title: Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Comments: under review at KDD'18
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Tue, 20 Feb 2018 (showing first 2 of 5 entries)

[24]  arXiv:1802.06691 [pdf, other]
Title: Sponge-Based Control-Flow Protection for IoT Devices
Comments: accepted at IEEE EuroS&P 2018
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:1802.06430 [pdf, other]
Title: DARTS: Deceiving Autonomous Cars with Toxic Signs
Comments: Submitted to PACM IMWUT;
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[ total of 33 entries: 1-25 | 26-33 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)