We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 22

[ total of 182 entries: 1-100 | 23-122 | 123-182 ]
[ showing 100 entries per page: fewer | more | all ]

Thu, 4 Dec 2025

[23]  arXiv:2512.03792 [pdf, ps, other]
Title: Unfolding Challenges in Securing and Regulating Unmanned Air Vehicles
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2512.03791 [pdf, ps, other]
Title: CCN: Decentralized Cross-Chain Channel Networks Supporting Secure and Privacy-Preserving Multi-Hop Interactions
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2512.03775 [pdf, ps, other]
Title: "MCP Does Not Stand for Misuse Cryptography Protocol": Uncovering Cryptographic Misuse in Model Context Protocol at Scale
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2512.03765 [pdf, ps, other]
Title: The Treasury Proof Ledger: A Cryptographic Framework for Accountable Bitcoin Treasuries
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2512.03720 [pdf, ps, other]
Title: Context-Aware Hierarchical Learning: A Two-Step Paradigm towards Safer LLMs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[28]  arXiv:2512.03669 [pdf, ps, other]
Title: Towards Privacy-Preserving Range Queries with Secure Learned Spatial Index over Encrypted Data
Comments: IEEE TrustCom-2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[29]  arXiv:2512.03641 [pdf, ps, other]
Title: A Descriptive Model for Modelling Attacker Decision-Making in Cyber-Deception
Comments: 24 Pages, 4 Tables
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2512.03620 [pdf, ps, other]
Title: SELF: A Robust Singular Value and Eigenvalue Approach for LLM Fingerprinting
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[31]  arXiv:2512.03551 [pdf, ps, other]
Title: A User Centric Group Authentication Scheme for Secure Communication
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2512.03465 [pdf, ps, other]
Title: Tuning for TraceTarnish: Techniques, Trends, and Testing Tangible Traits
Authors: Robert Dilworth
Comments: 20 pages, 8 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Information Retrieval (cs.IR)
[33]  arXiv:2512.03462 [pdf, ps, other]
Title: A Hybrid Deep Learning and Anomaly Detection Framework for Real-Time Malicious URL Classification
Comments: 14 pages,2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[34]  arXiv:2512.03461 [pdf, ps, other]
Title: In-Situ Encryption of Single-Transistor Nonvolatile Memories without Density Loss
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[35]  arXiv:2512.03420 [pdf, ps, other]
Title: HarnessAgent: Scaling Automatic Fuzzing Harness Construction with Tool-Augmented LLM Pipelines
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[36]  arXiv:2512.03361 [pdf, ps, other]
Title: Rethinking Security in Semantic Communication: Latent Manipulation as a New Threat
Authors: Zhiyuan Xi, Kun Zhu
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[37]  arXiv:2512.03358 [pdf, ps, other]
Title: Scaling Trust in Quantum Federated Learning: A Multi-Protocol Privacy Design
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2512.03356 [pdf, ps, other]
Title: Immunity memory-based jailbreak detection: multi-agent adaptive guard for large language models
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2512.03351 [pdf, ps, other]
Title: Empirical assessment of the perception of graphical threat model acceptability
Comments: Accepted into the Asia-Pacific Software Engineering Conference (APSEC) 2025. Will appear in APSEC 2025 proceedings
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2512.03238 [pdf, ps, other]
Title: How to DP-fy Your Data: A Practical Guide to Generating Synthetic Data With Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[41]  arXiv:2512.03207 [pdf, ps, other]
Title: Technical Report: The Need for a (Research) Sandstorm through the Privacy Sandbox
Comments: Technical report accompanying the research portal Privacy Sandstorm (this https URL) launched after our HotPETs 2024 talk "The Need for a (Research) Sandstorm through the Privacy Sandbox''
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2512.03121 [pdf, ps, other]
Title: Lost in Modality: Evaluating the Effectiveness of Text-Based Membership Inference Attacks on Large Multimodal Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[43]  arXiv:2512.03100 [pdf, ps, other]
Title: Ensemble Privacy Defense for Knowledge-Intensive LLMs against Membership Inference Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[44]  arXiv:2512.03097 [pdf, ps, other]
Title: Many-to-One Adversarial Consensus: Exposing Multi-Agent Collusion Risks in AI-Based Healthcare
Comments: 7 pages Conference level paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[45]  arXiv:2512.03089 [pdf, ps, other]
Title: Password-Activated Shutdown Protocols for Misaligned Frontier Agents
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[46]  arXiv:2512.03088 [pdf, ps, other]
Title: From Oracle Choice to Oracle Lock-In: An Exploratory Study on Blockchain Oracles Supplier Selection
Comments: Not peer reviewed
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); General Economics (econ.GN)
[47]  arXiv:2512.04044 (cross-list from cs.LG) [pdf, ps, other]
Title: MarkTune: Improving the Quality-Detectability Trade-off in Open-Weight LLM Watermarking
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[48]  arXiv:2512.04008 (cross-list from cs.LG) [pdf, ps, other]
Title: Efficient Public Verification of Private ML via Regularization
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[49]  arXiv:2512.03868 (cross-list from cs.SE) [pdf, ps, other]
Title: A Comprehensive Study on the Impact of Vulnerable Dependencies on Open-Source Software
Journal-ref: 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[50]  arXiv:2512.03816 (cross-list from cs.LG) [pdf, ps, other]
Title: Log Probability Tracking of LLM APIs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[51]  arXiv:2512.03771 (cross-list from cs.CL) [pdf, ps, other]
Title: In-Context Representation Hijacking
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[52]  arXiv:2512.03580 (cross-list from cs.CV) [pdf, ps, other]
Title: Dynamic Optical Test for Bot Identification (DOT-BI): A simple check to identify bots in surveys and online processes
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[53]  arXiv:2512.03564 (cross-list from cs.LG) [pdf, ps, other]
Title: Towards Irreversible Machine Unlearning for Diffusion Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[54]  arXiv:2512.03536 (cross-list from cs.NI) [pdf, ps, other]
Title: Mobility Induced Sensitivity of UAV based Nodes to Jamming in Private 5G Airfield Networks An Experimental Study
Comments: 4 pages, 4 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Robotics (cs.RO)
[55]  arXiv:2512.03310 (cross-list from cs.CL) [pdf, ps, other]
Title: Randomized Masked Finetuning: An Efficient Way to Mitigate Memorization of PIIs in LLMs
Comments: To be submitted for ICML 2026
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[56]  arXiv:2512.03079 (cross-list from cs.CL) [pdf, ps, other]
Title: Watermarks for Embeddings-as-a-Service Large Language Models
Authors: Anudeex Shetty
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Wed, 3 Dec 2025

[57]  arXiv:2512.02918 [pdf, ps, other]
Title: Belobog: Move Language Fuzzing Framework For Real-World Smart Contracts
Comments: Slight revision and under review
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[58]  arXiv:2512.02822 [pdf, ps, other]
Title: Decryption Through Polynomial Ambiguity: Noise-Enhanced High-Memory Convolutional Codes for Post-Quantum Cryptography
Authors: Meir Ariel
Comments: 23 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2510.15515
Journal-ref: International Journal on Cryptography and Information Security (IJCIS), Vol. 15, No.1/2/3/4, December 2025
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2512.02654 [pdf, ps, other]
Title: Cybersecurity AI: The World's Top AI Agent for Security Capture-the-Flag (CTF)
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2512.02625 [pdf, ps, other]
Title: CryptoQA: A Large-scale Question-answering Dataset for AI-assisted Cryptography
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[61]  arXiv:2512.02603 [pdf, ps, other]
Title: Semigroup action based on skew polynomial evaluation with applications to Cryptography
Comments: Submitted to the International Journal of Computer Mathematics: Computer Systems Theory in March 2025
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[62]  arXiv:2512.02600 [pdf, ps, other]
Title: S3C2 SICP Summit 2025-06: Vulnerability Response Summit
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2512.02598 [pdf, ps, other]
Title: Equilibrium SAT based PQC: New aegis against quantum computing
Authors: Keum-Bae Cho
Comments: 8 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2512.02534 [pdf, ps, other]
Title: Detection of Crowdsourcing Cryptocurrency Laundering via Multi-Task Collaboration
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2512.02418 [pdf, ps, other]
Title: Leveraging Large Language Models to Bridge On-chain and Off-chain Transparency in Stablecoins
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2512.02414 [pdf, ps, other]
Title: Characterizing Cyber Attacks against Space Infrastructures with Missing Data: Framework and Case Study
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2512.02399 [pdf, ps, other]
Title: AtomGraph: Tackling Atomicity Violation in Smart Contracts using Multimodal GCNs
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2512.02321 [pdf, ps, other]
Title: LeechHijack: Covert Computational Resource Exploitation in Intelligent Agent Systems
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[69]  arXiv:2512.02318 [pdf, ps, other]
Title: COGNITION: From Evaluation to Defense against Multimodal LLM CAPTCHA Solvers
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[70]  arXiv:2512.02301 [pdf, ps, other]
Title: Quantum Vanguard: Server Optimized Privacy Fortified Federated Intelligence for Future Vehicles
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2512.02287 [pdf, ps, other]
Title: HOT Protocol
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2512.02270 [pdf, ps, other]
Title: Property-Guided Cyber-Physical Reduction and Surrogation for Safety Analysis in Robotic Vehicles
Comments: Accepted at EAI SmartSP 2025 (EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles), Springer LNICST. The code repository is available here: this https URL
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[73]  arXiv:2512.02259 [pdf, ps, other]
Title: CVE Breadcrumbs: Tracking Vulnerabilities Through Versioned Apache Libraries
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[74]  arXiv:2512.02243 [pdf, ps, other]
Title: PhishSnap: Image-Based Phishing Detection Using Perceptual Hashing
Comments: IEE Standard Formatting, 3 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[75]  arXiv:2512.02157 [pdf, ps, other]
Title: Factor(T,U): Factored Cognition Strengthens Monitoring of Untrusted AI
Comments: 7 pages body; 19 pages total; 8 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[76]  arXiv:2512.02087 [pdf, ps, other]
Title: A survey about Hidden Subgroup Problem from a mathematical and cryptographic perspective
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2512.02082 [pdf, ps, other]
Title: Deterministic Random Bit Generators Based on Ascon for Embedded Systems
Authors: Abel C. H. Chen
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2512.02069 [pdf, ps, other]
Title: Large Language Model based Smart Contract Auditing with LLMBugScanner
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[79]  arXiv:2512.02062 [pdf, ps, other]
Title: Superpixel Attack: Enhancing Black-box Adversarial Attack with Image-driven Division Areas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[80]  arXiv:2512.02973 (cross-list from cs.CV) [pdf, ps, other]
Title: Contextual Image Attack: How Visual Context Exposes Multimodal Safety Vulnerabilities
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[81]  arXiv:2512.02410 (cross-list from cs.MA) [pdf, ps, other]
Title: Decentralized Multi-Agent System with Trust-Aware Communication
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR)
[82]  arXiv:2512.02306 (cross-list from cs.AI) [pdf, ps, other]
Title: OmniGuard: Unified Omni-Modal Guardrails with Deliberate Reasoning
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[83]  arXiv:2512.02276 (cross-list from cs.NI) [pdf, ps, other]
Title: Adversarial Robustness of Traffic Classification under Resource Constraints: Input Structure Matters
Comments: Accepted at the 2025 IEEE International Symposium on Networks, Computers and Communications (ISNCC)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[84]  arXiv:2512.02047 (cross-list from cs.CY) [pdf, ps, other]
Title: Copyright in AI Pre-Training Data Filtering: Regulatory Landscape and Mitigation Strategies
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[85]  arXiv:2512.02046 (cross-list from cs.CY) [pdf, ps, other]
Title: Global AI Governance Overview: Understanding Regulatory Requirements Across Global Jurisdictions
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)

Tue, 2 Dec 2025 (showing first 37 of 54 entries)

[86]  arXiv:2512.01893 [pdf, ps, other]
Title: Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration
Comments: Data and code available at: this https URL
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2512.01891 [pdf, ps, other]
Title: Behind the Curtain: How Shared Hosting Providers Respond to Vulnerability Notifications
Comments: Accepted at IEEE S&P 2026
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2512.01845 [pdf, ps, other]
Title: JPEGs Just Got Snipped: Croppable Signatures Against Deepfake Images
Journal-ref: 2025 International Joint Conference on Neural Networks (IJCNN)
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2512.01832 [pdf, ps, other]
Title: A Privacy-Preserving Information-Sharing Protocol for Federated Authentication
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2512.01727 [pdf, ps, other]
Title: AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2512.01666 [pdf, ps, other]
Title: Demystifying Feature Engineering in Malware Analysis of API Call Sequences
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2512.01651 [pdf, ps, other]
Title: Rethinking Cybersecurity Ontology Classification and Evaluation: Towards a Credibility-Centered Framework
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2512.01604 [pdf, ps, other]
Title: On the Context-Hiding Property of Shamir-Based Homomorphic Secret Sharing
Comments: 2025 IEEE International Symposium on Information Theory
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2512.01596 [pdf, ps, other]
Title: Towards a Multi-Layer Defence Framework for Securing Near-Real-Time Operations in Open RAN
Comments: This is the authors preprint version. The manuscript has been submitted to IEEE
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[95]  arXiv:2512.01595 [pdf, ps, other]
Title: WhiteLie: A Robust System for Spoofing User Data in Android Platforms
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2512.01594 [pdf, ps, other]
Title: Confidential, Attestable, and Efficient Inter-CVM Communication with Arm CCA
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[97]  arXiv:2512.01577 [pdf, ps, other]
Title: Beyond the Hype: A Large-Scale Empirical Analysis of On-Chain Transactions in NFT Scams
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2512.01574 [pdf, ps, other]
Title: IVE: An Accelerator for Single-Server Private Information Retrieval Using Versatile Processing Elements
Comments: 15 pages, 14 figures, accepted at HPCA 2026
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[99]  arXiv:2512.01437 [pdf, ps, other]
Title: Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2512.01391 [pdf, ps, other]
Title: INFERMAL: Inferential analysis of maliciously registered domains
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[101]  arXiv:2512.01353 [pdf, ps, other]
Title: The Trojan Knowledge: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2512.01335 [pdf, ps, other]
Title: EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations
Comments: Accepted to ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[103]  arXiv:2512.01326 [pdf, ps, other]
Title: Securing Large Language Models (LLMs) from Prompt Injection Attacks
Comments: 10 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[104]  arXiv:2512.01295 [pdf, ps, other]
Title: Systems Security Foundations for Agentic Computing
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2512.01255 [pdf, ps, other]
Title: Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Software Engineering (cs.SE)
[106]  arXiv:2512.01247 [pdf, ps, other]
Title: Benchmarking and Understanding Safety Risks in AI Character Platforms
Comments: Accepted to NDSS '26: The Network and Distributed System Security Symposium 2026
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[107]  arXiv:2512.01233 [pdf, ps, other]
Title: CTF Archive: Capture, Curate, Learn Forever
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2512.01185 [pdf, ps, other]
Title: DefenSee: Dissecting Threat from Sight and Text - A Multi-View Defensive Pipeline for Multi-modal Jailbreaks
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2512.01164 [pdf, ps, other]
Title: Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[110]  arXiv:2512.01115 [pdf, ps, other]
Title: Sliced Rényi Pufferfish Privacy: Directional Additive Noise Mechanism and Private Learning with Gradient Clipping
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2512.00966 [pdf, ps, other]
Title: Mitigating Indirect Prompt Injection via Instruction-Following Intent Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2512.00857 [pdf, ps, other]
Title: Hesperus is Phosphorus: Mapping Threat Actor Naming Taxonomies at Scale
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.00833 [pdf, ps, other]
Title: Logic Encryption: This Time for Real
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[114]  arXiv:2512.00804 [pdf, ps, other]
Title: Bias Injection Attacks on RAG Databases and Sanitization Defenses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB)
[115]  arXiv:2512.00741 [pdf, ps, other]
Title: MASCOT: Analyzing Malware Evolution Through A Well-Curated Source Code Dataset
Comments: 11 pages, 6 figures, conference paper; submitted to IEEE BigData 2025 CyberHunt workshop
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116]  arXiv:2512.00713 [pdf, ps, other]
Title: Concept-Guided Backdoor Attack on Vision Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.00645 [pdf, ps, other]
Title: Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis
Comments: Accepted at EAI International Conference on Digital Forensics & Cyber Crime 2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118]  arXiv:2512.00635 [pdf, ps, other]
Title: Extended Abstract: Synthesizable Low-overhead Circuit-level Countermeasures and Pro-Active Detection Techniques for Power and EM SCA
Authors: Archisman Ghosh
Comments: This extended abstract is archived for educational purposes as an example for different PhD forum competitions. Total page is 3
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2512.00591 [pdf, ps, other]
Title: TrojanLoC: LLM-based Framework for RTL Trojan Localization
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2512.00480 [pdf, ps, other]
Title: A Unified Framework for Constructing Information-Theoretic Private Information Retrieval
Authors: Liang Feng Zhang
Comments: 22 pages
Journal-ref: Pragmatic Cybersecurity 2025, 1 (1), 3
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[121]  arXiv:2512.00436 [pdf, ps, other]
Title: RECTor: Robust and Efficient Correlation Attack on Tor
Comments: 8 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[122]  arXiv:2512.00414 [pdf, ps, other]
Title: BEACON: Automatic Container Policy Generation using Environment-aware Dynamic Analysis
Subjects: Cryptography and Security (cs.CR)
[ total of 182 entries: 1-100 | 23-122 | 123-182 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)