We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,570 results
  1. Watermarking PRFs and PKE Against Quantum Adversaries

    We initiate the study of software watermarking against quantum adversaries. A quantum adversary generates a quantum state as a pirate software that...

    Fuyuki Kitagawa, Ryo Nishimaki in Journal of Cryptology
    Article 26 April 2024
  2. On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing

    We study the power of preprocessing adversaries in finding bounded-length collisions in the widely used Merkle-Damgård (MD) hashing in the random...

    Ashrujit Ghoshal, Ilan Komargodski in computational complexity
    Article 13 September 2023
  3. On Differential Privacy and Adaptive Data Analysis with Bounded Space

    We study the space complexity of the two related fields of differential privacy and adaptive data analysis. Specifically,...
    Itai Dinur, Uri Stemmer, ... Samson Zhou in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  4. On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing

    We studyGhoshal,Ashrujit Komargodski,Ilan the power of preprocessing adversaries in finding bounded-length collisions in the widely used...
    Ashrujit Ghoshal, Ilan Komargodski in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  5. Verification of randomized consensus algorithms under round-rigid adversaries

    Randomized fault-tolerant distributed algorithms pose a number of challenges for automated verification: (i) parameterization in the number of...

    Nathalie Bertrand, Igor Konnov, ... Josef Widder in International Journal on Software Tools for Technology Transfer
    Article Open access 02 February 2021
  6. Reducing classifier overconfidence against adversaries through graph algorithms

    In this work we show that deep learning classifiers tend to become overconfident in their answers under adversarial attacks, even when the classifier...

    Leonardo Teixeira, Brian Jalaian, Bruno Ribeiro in Machine Learning
    Article 14 March 2023
  7. The Relationship Between Idealized Models Under Computationally Bounded Adversaries

    The random oracle, generic group, and generic bilinear map models (ROM, GGM, GBM, respectively) are fundamental heuristics used to justify new...
    Cong Zhang, Mark Zhandry in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  8. Pruning in the Face of Adversaries

    The vulnerability of deep neural networks against adversarial examples – inputs with small imperceptible perturbations – has gained a lot of...
    Florian Merkle, Maximilian Samsinger, Pascal Schöttle in Image Analysis and Processing – ICIAP 2022
    Conference paper 2022
  9. Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity

    We initiate the study of verifiable capacity-bound function (VCBF). The main VCBF property imposes a strict lower bound on the number of bits read...
    Giuseppe Ateniese, Long Chen, ... Qiang Tang in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  10. Valency-Based Consensus Under Message Adversaries Without Limit-Closure

    We introduce a novel two-step approach for develo** a distributed consensus algorithm, which does not require the designer to identify and exploit...
    Kyrill Winkler, Ulrich Schmid, Thomas Nowak in Fundamentals of Computation Theory
    Conference paper 2021
  11. Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights

    With the growing use of Deep Learning (DL) to tackle various problems, securing these models against adversaries has become a primary concern for...

    Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili in Journal of Computer Virology and Hacking Techniques
    Article 27 September 2023
  12. Adversarial Deep Learning

    Deep learning is not provably secure. Deep neural networks are vulnerable to security attacks from malicious adversaries, which is an ongoing and...
    Aneesh Sreevallabh Chivukula, **nghao Yang, ... Wanlei Zhou in Adversarial Machine Learning
    Chapter 2023
  13. Packet Forwarding with Swaps

    We consider packet forwarding in the adversarial queueing theory (AQT) model introduced by Borodin et al. In this context, a series of recent works...
    Cameron Matsui, Will Rosenbaum in Structural Information and Communication Complexity
    Conference paper 2023
  14. Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model

    We consider the problem of constant-round secure two-party computation in the presence of active (malicious) adversaries. We present the first...

    Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam in Journal of Cryptology
    Article 08 June 2023
  15. Quantum Query Lower Bounds for Key Recovery Attacks on the Even-Mansour Cipher

    The Even-Mansour (EM) cipher is one of the famous constructions for a block cipher. Kuwakado and Morii demonstrated that a quantum adversary can...
    Akinori Kawachi, Yuki Naito in Computing and Combinatorics
    Conference paper 2024
  16. A deep reinforcement learning approach for multi-agent mobile robot patrolling

    Patrolling strategies primarily deal with minimising the time taken to visit specific locations and cover an area. The use of intelligent agents in...

    Meghdeep Jana, Leena Vachhani, Arpita Sinha in International Journal of Intelligent Robotics and Applications
    Article 04 May 2022
  17. Nearly Optimal Robust Secret Sharing Against Rushing Adversaries

    Robust secret sharing is a strengthening of standard secret sharing that allows the shared secret to be recovered even if some of the shares being...
    Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan in Advances in Cryptology – CRYPTO 2020
    Conference paper 2020
  18. On Non-uniform Security for Black-Box Non-interactive CCA Commitments

    We obtain a black-box construction of non-interactive CCA commitments against non-uniform adversaries. This makes black-box use of an appropriate...
    Rachit Garg, Dakshita Khurana, ... Brent Waters in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  19. Towards Defending Multiple \(\ell _p\)-Norm Bounded Adversarial Perturbations via Gated Batch Normalization

    There has been extensive evidence demonstrating that deep neural networks are vulnerable to adversarial examples, which motivates the development of...

    Aishan Liu, Shiyu Tang, ... Dacheng Tao in International Journal of Computer Vision
    Article 04 September 2023
  20. BVDFed: Byzantine-resilient and verifiable aggregation for differentially private federated learning

    Federated Learning (FL) has emerged as a powerful technology designed for collaborative training between multiple clients and a server while...

    **nwen Gao, Shao**g Fu, ... Yuchuan Luo in Frontiers of Computer Science
    Article 23 December 2023
Did you find what you were looking for? Share feedback.