We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 155

[ total of 182 entries: 1-10 | ... | 126-135 | 136-145 | 146-155 | 156-165 | 166-175 | 176-182 ]
[ showing 10 entries per page: fewer | more | all ]

Mon, 1 Dec 2025 (continued, showing 10 of 43 entries)

[156]  arXiv:2511.22317 [pdf, ps, other]
Title: Enhancing the Security of Rollup Sequencers using Decentrally Attested TEEs
Comments: This paper is under review at IEEE Transactions on Emerging Topics in Computing
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2511.22259 [pdf, ps, other]
Title: Silence Speaks Volumes: A New Paradigm for Covert Communication via History Timing Patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2511.22215 [pdf, ps, other]
Title: Real-PGDN: A Two-level Classification Method for Full-Process Recognition of Newly Registered Pornographic and Gambling Domain Names
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[159]  arXiv:2511.22189 [pdf, ps, other]
Title: Department-Specific Security Awareness Campaigns: A Cross-Organizational Study of HR and Accounting
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2511.22180 [pdf, ps, other]
Title: Personalized 3D Spatiotemporal Trajectory Privacy Protection with Differential and Distortion Geo-Perturbation
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2511.22117 [pdf, ps, other]
Title: Privacy-preserving formal concept analysis: A homomorphic encryption-based concept construction
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[162]  arXiv:2511.22095 [pdf, ps, other]
Title: Binary-30K: A Heterogeneous Dataset for Deep Learning in Binary Analysis and Malware Detection
Comments: 35 pages, 7 figures, 11 tables, 4 appendices. Dataset available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[163]  arXiv:2511.22047 [pdf, ps, other]
Title: Evaluating the Robustness of Large Language Model Safety Guardrails Against Adversarial Attacks
Authors: Richard J. Young
Comments: 21 pages, 9 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2511.22044 [pdf, ps, other]
Title: Distillability of LLM Security Logic: Predicting Attack Success Rate of Outline Filling Attack via Ranking Regression
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[165]  arXiv:2511.22017 [pdf, ps, other]
Title: POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization
Subjects: Cryptography and Security (cs.CR)
[ total of 182 entries: 1-10 | ... | 126-135 | 136-145 | 146-155 | 156-165 | 166-175 | 176-182 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)