Search Results

Crypto-Oriented Neural Architecture Design

1 code implementation27 Nov 2019

As neural networks revolutionize many applications, significant privacy conflicts between model users and providers emerge.

Crypto-Nets: Neural Networks over Encrypted Data

1 code implementation18 Dec 2014

To achieve the privacy requirements, we use homomorphic encryption in the following protocol: the data owner encrypts the data and sends the ciphertexts to the third party to obtain a prediction from a trained model.

Prediction

Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning

1 code implementation12 Jun 2023

To make cryptographic processors more resilient against side-channel attacks, engineers have developed various countermeasures.

Cryptography and Security

Accelerating Verified-Compiler Development with a Verified Rewriting Engine

2 code implementations2 May 2022

Compilers are a prime target for formal verification, since compiler bugs invalidate higher-level correctness guarantees, but compiler changes may become more labor-intensive to implement, if they must come with proof patches.

Programming Languages F.3.1; D.2.4; F.4.2; D.3.4

A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth

1 code implementation3 Jan 2019

Our analysis pipeline applies both static and dynamic analysis to extract information from the samples, such as wallet identifiers and mining pools.

Cryptography and Security

Market-Derived Financial Sentiment Analysis: Context-Aware Language Models for Crypto Forecasting

1 code implementation17 Feb 2025

A domain-specific language model was fine-tuned on these labels, achieving up to an 11% improvement in short-term trend prediction accuracy over traditional sentiment-based benchmarks.

Financial Tweet Prediction Language Modeling +3

Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code

1 code implementation9 Sep 2020

The continuing use of proprietary cryptography in embedded systems across many industry verticals, from physical access control systems and telecommunications to machine-to-machine authentication, presents a significant obstacle to black-box security-evaluation efforts.

Cryptography and Security 68M25 E.3

Review of deep learning models for crypto price prediction: implementation and evaluation

2 code implementations19 May 2024

In this study, we review the literature about deep learning for cryptocurrency price forecasting and evaluate novel deep learning models for cryptocurrency stock price prediction.

Deep Learning Stock Price Prediction

Learning the Enigma with Recurrent Neural Networks

1 code implementation24 Aug 2017

We demonstrate that RNNs can learn decryption algorithms -- the mappings from plaintext to ciphertext -- for three polyalphabetic ciphers (Vigen\`ere, Autokey, and Enigma).

Cryptanalysis speech-recognition +1

Blockchain mechanism and distributional characteristics of cryptos

1 code implementation26 Nov 2020

We investigate the relationship between underlying blockchain mechanism of cryptocurrencies and its distributional characteristics.

Cryptography and Security General Finance