based
-
BianLian ransomware actors are likely based in Russia and have multiple Russia-based affiliates, according to new information shared by the FBI and Australian law enforcement.
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
LummaC2 is an Infostealer actively being distributed while being disguised as illegal software such as cracks, and its distribution and creation methods are changing continuously. It has recently been distributed by being inserted into legitimate programs, so caution is needed.
-
Boneh et al. (CRYPTO’18) proposed two $t$-out-of-$N$ threshold fully homomorphic encryption ($\sf TFHE$) schemes based on Shamir secret sharing scheme and $\{0,1\}$-linear secret sharing scheme. They demonstrated the simulation security, ensuring no information leakage during partial or final decryption. This breakthrough allows any scheme to be converted into a threshold scheme by using $\sf TFHE$.
-
[Submitted on 22 Jan 2024 (v1), last revised 7 Nov 2024 (this version, v2)] View a PDF of the paper titled A Security Risk Assessment Method for Distributed Ledger Technology (DLT) based Applications: Three Industry Case Studies, by Elena Baninemeh and 3 other authors
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels
·
Ruonan Chen, Ye Dong, Yizhong Liu, Tingyu Fan, Dawei Li, Zhenyu Guan, Jianwei Liu, Jianying Zhou ePrint Report \textit{Federated Learning} (FL) is a distributed machine learning paradigm that allows multiple clients to train models collaboratively without sharing local data. Numerous works have explored security and privacy protection in FL, as well as its integration with…
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges
·
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
In this paper, we introduce OT-PCA, a novel approach for conducting Plaintext-Checking (PC) oracle based side-channel attacks, specifically designed for Hamming Quasi-Cyclic (HQC). By calling the publicly accessible HQC decoder, we build offline templates that enable efficient extraction of soft information for hundreds of secret positions with just a single PC oracle call. Our method…
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
[Submitted on 17 Dec 2023 (v1), last revised 15 Oct 2024 (this version, v4)] View a PDF of the paper titled A Novel RFID Authentication Protocol Based on A Block-Order-Modulus Variable Matrix Encryption Algorithm, by Yan Wang and 7 other authors
-
Mastercard has unveiled an Identity Attribute Verification service for online interactions based on new industry specifications from EMVCo.
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
Sulaiman Alhussaini, Serge˘ı Sergeev ePrint Report Recently, a more efficient attack on the initial tropical Stickel protocol has been proposed, different from the previously known Kotov-Ushakov attack, yet equally guaranteed to succeed. Given that the Stickel protocol can be implemented in various ways, such as utilizing platforms beyond the tropical semiring or employing alternative commutative…
-
We propose a new cryptographic primitive called “selective batched identity-based encryption” (Selective Batched IBE) and its thresholdized version. The new primitive allows encrypting messages with specific identities and batch labels, where the latter can represent, for example, a block number on a blockchain. Given an arbitrary subset of identities for a particular batch, our primitive…
-
We extend the usual ideal action on oriented elliptic curves to a (Hermitian) module action on oriented (polarised) abelian varieties. Oriented abelian varieties are naturally enriched in $R$-modules, and our module action comes from the canonical power object construction on categories enriched in a closed symmetric monoidal category. In particular our action is canonical and…