We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 84

[ total of 150 entries: 1-10 | ... | 55-64 | 65-74 | 75-84 | 85-94 | 95-104 | 105-114 | 115-124 | ... | 145-150 ]
[ showing 10 entries per page: fewer | more | all ]

Wed, 3 Dec 2025 (continued, showing 10 of 29 entries)

[85]  arXiv:2512.02243 [pdf, ps, other]
Title: PhishSnap: Image-Based Phishing Detection Using Perceptual Hashing
Comments: IEE Standard Formatting, 3 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[86]  arXiv:2512.02157 [pdf, ps, other]
Title: Factor(T,U): Factored Cognition Strengthens Monitoring of Untrusted AI
Comments: 7 pages body; 19 pages total; 8 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[87]  arXiv:2512.02087 [pdf, ps, other]
Title: A survey about Hidden Subgroup Problem from a mathematical and cryptographic perspective
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2512.02082 [pdf, ps, other]
Title: Deterministic Random Bit Generators Based on Ascon for Embedded Systems
Authors: Abel C. H. Chen
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2512.02069 [pdf, ps, other]
Title: Large Language Model based Smart Contract Auditing with LLMBugScanner
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[90]  arXiv:2512.02062 [pdf, ps, other]
Title: Superpixel Attack: Enhancing Black-box Adversarial Attack with Image-driven Division Areas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[91]  arXiv:2512.02973 (cross-list from cs.CV) [pdf, ps, other]
Title: Contextual Image Attack: How Visual Context Exposes Multimodal Safety Vulnerabilities
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[92]  arXiv:2512.02410 (cross-list from cs.MA) [pdf, ps, other]
Title: Decentralized Multi-Agent System with Trust-Aware Communication
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR)
[93]  arXiv:2512.02306 (cross-list from cs.AI) [pdf, ps, other]
Title: OmniGuard: Unified Omni-Modal Guardrails with Deliberate Reasoning
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[94]  arXiv:2512.02276 (cross-list from cs.NI) [pdf, ps, other]
Title: Adversarial Robustness of Traffic Classification under Resource Constraints: Input Structure Matters
Comments: Accepted at the 2025 IEEE International Symposium on Networks, Computers and Communications (ISNCC)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 150 entries: 1-10 | ... | 55-64 | 65-74 | 75-84 | 85-94 | 95-104 | 105-114 | 115-124 | ... | 145-150 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)