We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 86

[ total of 143 entries: 1-10 | ... | 57-66 | 67-76 | 77-86 | 87-96 | 97-106 | 107-116 | 117-126 | ... | 137-143 ]
[ showing 10 entries per page: fewer | more | all ]

Thu, 4 Dec 2025 (continued, showing 10 of 34 entries)

[87]  arXiv:2512.03641 [pdf, ps, other]
Title: A Descriptive Model for Modelling Attacker Decision-Making in Cyber-Deception
Comments: 24 Pages, 4 Tables
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2512.03620 [pdf, ps, other]
Title: SELF: A Robust Singular Value and Eigenvalue Approach for LLM Fingerprinting
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[89]  arXiv:2512.03551 [pdf, ps, other]
Title: A User Centric Group Authentication Scheme for Secure Communication
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2512.03465 [pdf, ps, other]
Title: Tuning for TraceTarnish: Techniques, Trends, and Testing Tangible Traits
Authors: Robert Dilworth
Comments: 20 pages, 8 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Information Retrieval (cs.IR)
[91]  arXiv:2512.03462 [pdf, ps, other]
Title: A Hybrid Deep Learning and Anomaly Detection Framework for Real-Time Malicious URL Classification
Comments: 14 pages,2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[92]  arXiv:2512.03461 [pdf, ps, other]
Title: In-Situ Encryption of Single-Transistor Nonvolatile Memories without Density Loss
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[93]  arXiv:2512.03420 [pdf, ps, other]
Title: HarnessAgent: Scaling Automatic Fuzzing Harness Construction with Tool-Augmented LLM Pipelines
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[94]  arXiv:2512.03361 [pdf, ps, other]
Title: Rethinking Security in Semantic Communication: Latent Manipulation as a New Threat
Authors: Zhiyuan Xi, Kun Zhu
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[95]  arXiv:2512.03358 [pdf, ps, other]
Title: Scaling Trust in Quantum Federated Learning: A Multi-Protocol Privacy Design
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2512.03356 [pdf, ps, other]
Title: Immunity memory-based jailbreak detection: multi-agent adaptive guard for large language models
Subjects: Cryptography and Security (cs.CR)
[ total of 143 entries: 1-10 | ... | 57-66 | 67-76 | 77-86 | 87-96 | 97-106 | 107-116 | 117-126 | ... | 137-143 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)