| 151 |
Sequences with small correlation
Kai-Uwe Schmidt
|
👻
Ghosted
|
cs.IT
|
47 |
10 years ago |
| 152 |
One-Wayness in Quantum Cryptography
Tomoyuki Morimae, Takashi Yamakawa
|
👻
Ghosted
|
quant-ph
|
47 |
3 years ago |
| 153 |
FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models
Songze Li, Duanyi Yao, Jin Liu
|
👻
Ghosted
|
cs.LG
|
46 |
3 years ago |
| 154 |
Improved torsion point attacks on SIDH variants
Victoria de Quehen, Péter Kutas, ... (+5 more)
|
👻
Ghosted
|
math.NT
|
46 |
5 years ago |
| 155 |
Interdiction in Practice -- Hardware Trojan Against a High-Security USB Flash Drive
Pawel Swierczynski, Marc Fyrbiak, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
46 |
6 years ago |
| 156 |
Quantum authentication with key recycling
Christopher Portmann
|
👻
Ghosted
|
quant-ph
|
46 |
9 years ago |
| 157 |
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
Gorjan Alagic, Alexander Russell
|
👻
Ghosted
|
quant-ph
|
46 |
9 years ago |
| 158 |
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices
Riccardo Spolaor, Laila Abudahi, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
46 |
9 years ago |
| 159 |
Extension of Overbeck's Attack for Gabidulin Based Cryptosystems
Anna-Lena Horlemann-Trautmann, Kyle Marshall, Joachim Rosenthal
|
👻
Ghosted
|
cs.CR
|
46 |
10 years ago |
| 160 |
Rank distribution of Delsarte codes
Javier de la Cruz, Elisa Gorla, ... (+2 more)
|
👻
Ghosted
|
cs.IT
|
46 |
10 years ago |
| 161 |
Some new results on permutation polynomials over finite fields
Jingxue Ma, Tao Zhang, ... (+2 more)
|
👻
Ghosted
|
cs.IT
|
46 |
10 years ago |
| 162 |
Cryptography using generalized Fibonacci matrices with Affine-Hill cipher
Kalika Prasad, Hrishikesh Mahato
|
👻
Ghosted
|
cs.CR
|
45 |
6 years ago |
| 163 |
How to profit from payments channels
Oguzhan Ersoy, Stefanie Roos, Zekeriya Erkin
|
👻
Ghosted
|
cs.DC
|
45 |
6 years ago |
| 164 |
Secure Multi-party Quantum Computation with a Dishonest Majority
Yfke Dulek, Alex B. Grilo, ... (+3 more)
|
👻
Ghosted
|
quant-ph
|
45 |
6 years ago |
| 165 |
Monetary Stabilization in Cryptocurrencies - Design Approaches and Open Questions
Ingolf G. A. Pernice, Sebastian Henningsen, ... (+4 more)
|
👻
Ghosted
|
q-fin.GN
|
45 |
6 years ago |
| 166 |
Quantum-secure message authentication via blind-unforgeability
Gorjan Alagic, Christian Majenz, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
45 |
8 years ago |
| 167 |
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions
Sreeja Chowdhury, Ana Covic, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
44 |
5 years ago |
| 168 |
Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLA
Philip B. Stark
|
👻
Ghosted
|
stat.AP
|
44 |
6 years ago |
| 169 |
Non-interactive zero-knowledge arguments for QMA, with preprocessing
Andrea Coladangelo, Thomas Vidick, Tina Zhang
|
👻
Ghosted
|
quant-ph
|
44 |
6 years ago |
| 170 |
Applications of Machine Learning in Cryptography: A Survey
Mohammed M. Alani
|
👻
Ghosted
|
cs.CR
|
44 |
7 years ago |
| 171 |
An intrinsical description of group codes
José Joaquín Bernal, Ángel del Río, Juan Jacobo Simón
|
👻
Ghosted
|
cs.IT
|
43 |
2 years ago |
| 172 |
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Yehuda Afek, Anat Bremler-Barr, Lior Shafir
|
👻
Ghosted
|
cs.CR
|
43 |
5 years ago |
| 173 |
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home
Ziaur Rahman, Xun Yi, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
43 |
4 years ago |
| 174 |
Quantum Advantage from Any Non-Local Game
Yael Kalai, Alex Lombardi, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
43 |
4 years ago |
| 175 |
Exploring Blockchain Technology through a Modular Lens: A Survey
Minghui Xu, Yihao Guo, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
42 |
3 years ago |
| 176 |
A general framework for secondary constructions of bent and plateaued functions
S. Hodžić, E. Pasalic, Y. Wei
|
👻
Ghosted
|
cs.IT
|
42 |
7 years ago |
| 177 |
On the minimum weights of binary linear complementary dual codes
Makoto Araya, Masaaki Harada
|
🔮
The Ethereal
|
math.CO
|
42 |
7 years ago |
| 178 |
Sustained Space Complexity
Joel Alwen, Jeremiah Blocki, Krzysztof Pietrzak
|
👻
Ghosted
|
cs.CR
|
42 |
8 years ago |
| 179 |
On self-dual double circulant codes
Adel Alahmadi, Funda Özdemir, Patrick Solé
|
👻
Ghosted
|
cs.IT
|
42 |
10 years ago |
| 180 |
The supersingular Endomorphism Ring and One Endomorphism problems are equivalent
Aurel Page, Benjamin Wesolowski
|
👻
Ghosted
|
cs.CR
|
42 |
2 years ago |
| 181 |
Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications
Prabhanjan Ananth, Aditya Gulati, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
42 |
3 years ago |
| 182 |
Time to Bribe: Measuring Block Construction Market
Anton Wahrstätter, Liyi Zhou, ... (+3 more)
|
👻
Ghosted
|
cs.NI
|
41 |
2 years ago |
| 183 |
What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
Alex Groce, Josselin Feist, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
41 |
6 years ago |
| 184 |
SoK: Tools for Game Theoretic Models of Security for Cryptocurrencies
Sarah Azouvi, Alexander Hicks
|
👻
Ghosted
|
cs.CR
|
41 |
6 years ago |
| 185 |
A Scale-out Blockchain for Value Transfer with Spontaneous Sharding
Zhijie Ren, Kelong Cong, ... (+4 more)
|
👻
Ghosted
|
cs.DC
|
41 |
8 years ago |
| 186 |
Unforgeable Quantum Encryption
Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
|
👻
Ghosted
|
quant-ph
|
41 |
8 years ago |
| 187 |
Optimal Key Consensus in Presence of Noise
Zhengzhong Jin, Yunlei Zhao
|
👻
Ghosted
|
cs.IT
|
41 |
9 years ago |
| 188 |
Improved Cryptanalysis of Rank Metric Schemes Based on Gabidulin Codes
Ayoub Otmani, Hervé Talé Kalachi, Sélestin Ndjeya
|
👻
Ghosted
|
cs.CR
|
41 |
10 years ago |
| 189 |
Some classes of power functions with low c-differential uniformity over finite fields
Zhengbang Zha, Lei Hu
|
👻
Ghosted
|
cs.IT
|
40 |
5 years ago |
| 190 |
Scattered subspaces and related codes
Giovanni Zini, Ferdinando Zullo
|
🔮
The Ethereal
|
math.CO
|
40 |
5 years ago |
| 191 |
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Jan Czajkowski, Christian Majenz, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
40 |
7 years ago |
| 192 |
QFactory: classically-instructed remote secret qubits preparation
Alexandru Cojocaru, Léo Colisson, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
40 |
7 years ago |
| 193 |
A Polynomial-Time Attack on the BBCRS Scheme
Alain Couvreur, Ayoub Otmani, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
40 |
11 years ago |
| 194 |
FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption
Michiel Van Beirendonck, Jan-Pieter D'Anvers, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
40 |
3 years ago |
| 195 |
Classical Verification of Quantum Computations with Efficient Verifier
Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa
|
👻
Ghosted
|
quant-ph
|
39 |
6 years ago |
| 196 |
Slide Reduction, Revisited---Filling the Gaps in SVP Approximation
Divesh Aggarwal, Jianwei Li, ... (+2 more)
|
👻
Ghosted
|
cs.DS
|
39 |
6 years ago |
| 197 |
Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application
Satsuya Ohata, Koji Nuida
|
👻
Ghosted
|
cs.CR
|
39 |
6 years ago |
| 198 |
Do non-free LCD codes over finite commutative Frobenius rings exist?
Sanjit Bhowmick, Alexandre Fotue-Tabue, ... (+3 more)
|
👻
Ghosted
|
cs.IT
|
39 |
7 years ago |
| 199 |
Sample Efficient Algorithms for Learning Quantum Channels in PAC Model and the Approximate State Discrimination Problem
Kai-Min Chung, Han-Hsuan Lin
|
👻
Ghosted
|
quant-ph
|
39 |
7 years ago |
| 200 |
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions
Sajjad Arshad, Amin Kharraz, William Robertson
|
👻
Ghosted
|
cs.CR
|
39 |
7 years ago |