We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 115

[ total of 182 entries: 1-10 | ... | 86-95 | 96-105 | 106-115 | 116-125 | 126-135 | 136-145 | 146-155 | ... | 176-182 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 2 Dec 2025 (continued, showing 10 of 54 entries)

[116]  arXiv:2512.00713 [pdf, ps, other]
Title: Concept-Guided Backdoor Attack on Vision Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.00645 [pdf, ps, other]
Title: Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis
Comments: Accepted at EAI International Conference on Digital Forensics & Cyber Crime 2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118]  arXiv:2512.00635 [pdf, ps, other]
Title: Extended Abstract: Synthesizable Low-overhead Circuit-level Countermeasures and Pro-Active Detection Techniques for Power and EM SCA
Authors: Archisman Ghosh
Comments: This extended abstract is archived for educational purposes as an example for different PhD forum competitions. Total page is 3
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2512.00591 [pdf, ps, other]
Title: TrojanLoC: LLM-based Framework for RTL Trojan Localization
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2512.00480 [pdf, ps, other]
Title: A Unified Framework for Constructing Information-Theoretic Private Information Retrieval
Authors: Liang Feng Zhang
Comments: 22 pages
Journal-ref: Pragmatic Cybersecurity 2025, 1 (1), 3
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[121]  arXiv:2512.00436 [pdf, ps, other]
Title: RECTor: Robust and Efficient Correlation Attack on Tor
Comments: 8 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[122]  arXiv:2512.00414 [pdf, ps, other]
Title: BEACON: Automatic Container Policy Generation using Environment-aware Dynamic Analysis
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2512.00412 [pdf, ps, other]
Title: Red Teaming Large Reasoning Models
Comments: 30 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124]  arXiv:2512.00377 [pdf, ps, other]
Title: Measuring Memecoin Fragility
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[125]  arXiv:2512.00142 [pdf, ps, other]
Title: DeFi TrustBoost: Blockchain and AI for Trustworthy Decentralized Financial Decisions
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computational Finance (q-fin.CP); General Finance (q-fin.GN)
[ total of 182 entries: 1-10 | ... | 86-95 | 96-105 | 106-115 | 116-125 | 126-135 | 136-145 | 146-155 | ... | 176-182 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)