We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 109

[ total of 182 entries: 1-10 | ... | 80-89 | 90-99 | 100-109 | 110-119 | 120-129 | 130-139 | 140-149 | ... | 180-182 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 2 Dec 2025 (continued, showing 10 of 54 entries)

[110]  arXiv:2512.01115 [pdf, ps, other]
Title: Sliced Rényi Pufferfish Privacy: Directional Additive Noise Mechanism and Private Learning with Gradient Clipping
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2512.00966 [pdf, ps, other]
Title: Mitigating Indirect Prompt Injection via Instruction-Following Intent Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2512.00857 [pdf, ps, other]
Title: Hesperus is Phosphorus: Mapping Threat Actor Naming Taxonomies at Scale
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.00833 [pdf, ps, other]
Title: Logic Encryption: This Time for Real
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[114]  arXiv:2512.00804 [pdf, ps, other]
Title: Bias Injection Attacks on RAG Databases and Sanitization Defenses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB)
[115]  arXiv:2512.00741 [pdf, ps, other]
Title: MASCOT: Analyzing Malware Evolution Through A Well-Curated Source Code Dataset
Comments: 11 pages, 6 figures, conference paper; submitted to IEEE BigData 2025 CyberHunt workshop
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116]  arXiv:2512.00713 [pdf, ps, other]
Title: Concept-Guided Backdoor Attack on Vision Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.00645 [pdf, ps, other]
Title: Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis
Comments: Accepted at EAI International Conference on Digital Forensics & Cyber Crime 2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118]  arXiv:2512.00635 [pdf, ps, other]
Title: Extended Abstract: Synthesizable Low-overhead Circuit-level Countermeasures and Pro-Active Detection Techniques for Power and EM SCA
Authors: Archisman Ghosh
Comments: This extended abstract is archived for educational purposes as an example for different PhD forum competitions. Total page is 3
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2512.00591 [pdf, ps, other]
Title: TrojanLoC: LLM-based Framework for RTL Trojan Localization
Subjects: Cryptography and Security (cs.CR)
[ total of 182 entries: 1-10 | ... | 80-89 | 90-99 | 100-109 | 110-119 | 120-129 | 130-139 | 140-149 | ... | 180-182 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)