We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 106

[ total of 143 entries: 1-10 | ... | 77-86 | 87-96 | 97-106 | 107-116 | 117-126 | 127-136 | 137-143 ]
[ showing 10 entries per page: fewer | more | all ]

Thu, 4 Dec 2025 (continued, showing last 8 of 34 entries)

[107]  arXiv:2512.03868 (cross-list from cs.SE) [pdf, ps, other]
Title: A Comprehensive Study on the Impact of Vulnerable Dependencies on Open-Source Software
Journal-ref: 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[108]  arXiv:2512.03816 (cross-list from cs.LG) [pdf, ps, other]
Title: Log Probability Tracking of LLM APIs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[109]  arXiv:2512.03771 (cross-list from cs.CL) [pdf, ps, other]
Title: In-Context Representation Hijacking
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[110]  arXiv:2512.03580 (cross-list from cs.CV) [pdf, ps, other]
Title: Dynamic Optical Test for Bot Identification (DOT-BI): A simple check to identify bots in surveys and online processes
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[111]  arXiv:2512.03564 (cross-list from cs.LG) [pdf, ps, other]
Title: Towards Irreversible Machine Unlearning for Diffusion Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[112]  arXiv:2512.03536 (cross-list from cs.NI) [pdf, ps, other]
Title: Mobility Induced Sensitivity of UAV based Nodes to Jamming in Private 5G Airfield Networks An Experimental Study
Comments: 4 pages, 4 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Robotics (cs.RO)
[113]  arXiv:2512.03310 (cross-list from cs.CL) [pdf, ps, other]
Title: Randomized Masked Finetuning: An Efficient Way to Mitigate Memorization of PIIs in LLMs
Comments: To be submitted for ICML 2026
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[114]  arXiv:2512.03079 (cross-list from cs.CL) [pdf, ps, other]
Title: Watermarks for Embeddings-as-a-Service Large Language Models
Authors: Anudeex Shetty
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Wed, 3 Dec 2025 (showing first 2 of 29 entries)

[115]  arXiv:2512.02918 [pdf, ps, other]
Title: Belobog: Move Language Fuzzing Framework For Real-World Smart Contracts
Comments: Slight revision and under review
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[116]  arXiv:2512.02822 [pdf, ps, other]
Title: Decryption Through Polynomial Ambiguity: Noise-Enhanced High-Memory Convolutional Codes for Post-Quantum Cryptography
Authors: Meir Ariel
Comments: 23 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2510.15515
Journal-ref: International Journal on Cryptography and Information Security (IJCIS), Vol. 15, No.1/2/3/4, December 2025
Subjects: Cryptography and Security (cs.CR)
[ total of 143 entries: 1-10 | ... | 77-86 | 87-96 | 97-106 | 107-116 | 117-126 | 127-136 | 137-143 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)