We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 111

[ total of 145 entries: 1-25 | ... | 37-61 | 62-86 | 87-111 | 112-136 | 137-145 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 4 Dec 2025 (showing first 25 of 34 entries)

[112]  arXiv:2512.03792 [pdf, ps, other]
Title: Unfolding Challenges in Securing and Regulating Unmanned Air Vehicles
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.03791 [pdf, ps, other]
Title: CCN: Decentralized Cross-Chain Channel Networks Supporting Secure and Privacy-Preserving Multi-Hop Interactions
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2512.03775 [pdf, ps, other]
Title: "MCP Does Not Stand for Misuse Cryptography Protocol": Uncovering Cryptographic Misuse in Model Context Protocol at Scale
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2512.03765 [pdf, ps, other]
Title: The Treasury Proof Ledger: A Cryptographic Framework for Accountable Bitcoin Treasuries
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2512.03720 [pdf, ps, other]
Title: Context-Aware Hierarchical Learning: A Two-Step Paradigm towards Safer LLMs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.03669 [pdf, ps, other]
Title: Towards Privacy-Preserving Range Queries with Secure Learned Spatial Index over Encrypted Data
Comments: IEEE TrustCom-2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118]  arXiv:2512.03641 [pdf, ps, other]
Title: A Descriptive Model for Modelling Attacker Decision-Making in Cyber-Deception
Comments: 24 Pages, 4 Tables
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2512.03620 [pdf, ps, other]
Title: SELF: A Robust Singular Value and Eigenvalue Approach for LLM Fingerprinting
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[120]  arXiv:2512.03551 [pdf, ps, other]
Title: A User Centric Group Authentication Scheme for Secure Communication
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2512.03465 [pdf, ps, other]
Title: Tuning for TraceTarnish: Techniques, Trends, and Testing Tangible Traits
Authors: Robert Dilworth
Comments: 20 pages, 8 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Information Retrieval (cs.IR)
[122]  arXiv:2512.03462 [pdf, ps, other]
Title: A Hybrid Deep Learning and Anomaly Detection Framework for Real-Time Malicious URL Classification
Comments: 14 pages,2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[123]  arXiv:2512.03461 [pdf, ps, other]
Title: In-Situ Encryption of Single-Transistor Nonvolatile Memories without Density Loss
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[124]  arXiv:2512.03420 [pdf, ps, other]
Title: HarnessAgent: Scaling Automatic Fuzzing Harness Construction with Tool-Augmented LLM Pipelines
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[125]  arXiv:2512.03361 [pdf, ps, other]
Title: Rethinking Security in Semantic Communication: Latent Manipulation as a New Threat
Authors: Zhiyuan Xi, Kun Zhu
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[126]  arXiv:2512.03358 [pdf, ps, other]
Title: Scaling Trust in Quantum Federated Learning: A Multi-Protocol Privacy Design
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[127]  arXiv:2512.03356 [pdf, ps, other]
Title: Immunity memory-based jailbreak detection: multi-agent adaptive guard for large language models
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2512.03351 [pdf, ps, other]
Title: Empirical assessment of the perception of graphical threat model acceptability
Comments: Accepted into the Asia-Pacific Software Engineering Conference (APSEC) 2025. Will appear in APSEC 2025 proceedings
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2512.03238 [pdf, ps, other]
Title: How to DP-fy Your Data: A Practical Guide to Generating Synthetic Data With Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[130]  arXiv:2512.03207 [pdf, ps, other]
Title: Technical Report: The Need for a (Research) Sandstorm through the Privacy Sandbox
Comments: Technical report accompanying the research portal Privacy Sandstorm (this https URL) launched after our HotPETs 2024 talk "The Need for a (Research) Sandstorm through the Privacy Sandbox''
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2512.03121 [pdf, ps, other]
Title: Lost in Modality: Evaluating the Effectiveness of Text-Based Membership Inference Attacks on Large Multimodal Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[132]  arXiv:2512.03100 [pdf, ps, other]
Title: Ensemble Privacy Defense for Knowledge-Intensive LLMs against Membership Inference Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[133]  arXiv:2512.03097 [pdf, ps, other]
Title: Many-to-One Adversarial Consensus: Exposing Multi-Agent Collusion Risks in AI-Based Healthcare
Comments: 7 pages Conference level paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[134]  arXiv:2512.03089 [pdf, ps, other]
Title: Password-Activated Shutdown Protocols for Misaligned Frontier Agents
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[135]  arXiv:2512.03088 [pdf, ps, other]
Title: From Oracle Choice to Oracle Lock-In: An Exploratory Study on Blockchain Oracles Supplier Selection
Comments: Not peer reviewed
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); General Economics (econ.GN)
[136]  arXiv:2512.04044 (cross-list from cs.LG) [pdf, ps, other]
Title: MarkTune: Improving the Quality-Detectability Trade-off in Open-Weight LLM Watermarking
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 145 entries: 1-25 | ... | 37-61 | 62-86 | 87-111 | 112-136 | 137-145 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)