We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 15

[ total of 145 entries: 1-25 | 16-40 | 41-65 | 66-90 | 91-115 | ... | 141-145 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 10 Dec 2025 (continued, showing last 16 of 31 entries)

[16]  arXiv:2512.08291 [pdf, ps, other]
Title: Exposing and Defending Membership Leakage in Vulnerability Prediction Models
Comments: Accepted at APSEC 2025
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[17]  arXiv:2512.08290 [pdf, ps, other]
Title: Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem
Comments: All authors contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[18]  arXiv:2512.08289 [pdf, ps, other]
Title: MIRAGE: Misleading Retrieval-Augmented Generation via Black-box and Query-agnostic Poisoning Attacks
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2512.08204 [pdf, ps, other]
Title: Evaluating Vulnerabilities of Connected Vehicles Under Cyber Attacks by Attack-Defense Tree
Comments: 6 Pages, International Conference on Computing, Networking and Communication (ICNC), Maui, Hawaii, USA, 2026
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[20]  arXiv:2512.08185 [pdf, ps, other]
Title: A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties
Comments: 6 pages, 1 figure, framework proposal
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[21]  arXiv:2512.08172 [pdf, ps, other]
Title: Security Analysis of Integer Learning with Errors with Rejection Sampling
Comments: 24 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[22]  arXiv:2512.08169 [pdf, ps, other]
Title: Information-Dense Reasoning for Efficient and Auditable Security Alert Triage
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[23]  arXiv:2512.08107 [pdf, ps, other]
Title: Detecting Ambiguity Aversion in Cyberattack Behavior to Inform Cognitive Defense Strategies
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[24]  arXiv:2512.08104 [pdf, ps, other]
Title: AgentCrypt: Advancing Privacy and (Secure) Computation in AI Agent Collaboration
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2512.07909 [pdf, ps, other]
Title: Agentic Artificial Intelligence for Ethical Cybersecurity in Uganda: A Reinforcement Learning Framework for Threat Detection in Resource-Constrained Environments
Comments: 29 pages, 7 figures, 2 tables, 1 appendix
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[26]  arXiv:2512.08869 (cross-list from cs.LG) [pdf, ps, other]
Title: Differentially Private Synthetic Data Generation Using Context-Aware GANs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[27]  arXiv:2512.08858 (cross-list from cs.OS) [pdf, ps, other]
Title: NecoFuzz: Effective Fuzzing of Nested Virtualization via Fuzz-Harness Virtual Machines
Comments: To appear in EuroSys 2026
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[28]  arXiv:2512.08856 (cross-list from cs.CY) [pdf, ps, other]
Title: Can the GPC standard eliminate consent banners in the EU?
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[29]  arXiv:2512.08623 (cross-list from quant-ph) [pdf, ps, other]
Title: An Efficient Secret Communication Scheme for the Bosonic Wiretap Channel
Comments: 5 pages, 2 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[30]  arXiv:2512.08067 (cross-list from cs.DC) [pdf, ps, other]
Title: CapsuleFS A Multi-credential DataCapsule Filesystem
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[31]  arXiv:2512.07866 (cross-list from cs.LG) [pdf, ps, other]
Title: Command & Control (C2) Traffic Detection Via Algorithm Generated Domain (Dga) Classification Using Deep Learning And Natural Language Processing
Comments: Language: Portuguese
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Tue, 9 Dec 2025 (showing first 9 of 47 entries)

[32]  arXiv:2512.07827 [pdf, ps, other]
Title: An Adaptive Multi-Layered Honeynet Architecture for Threat Behavior Analysis via Deep Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[33]  arXiv:2512.07725 [pdf, ps, other]
Title: Privacy Practices of Browser Agents
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2512.07533 [pdf, ps, other]
Title: VulnLLM-R: Specialized Reasoning LLM with Agent Scaffold for Vulnerability Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[35]  arXiv:2512.07495 [pdf, ps, other]
Title: Amulet: Fast TEE-Shielded Inference for On-Device Model Protection
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2512.07342 [pdf, ps, other]
Title: PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning
Comments: Accepted at NDSS 2026; code available at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[37]  arXiv:2512.07292 [pdf, ps, other]
Title: Breaking ECDSA with Electromagnetic Side-Channel Attacks: Challenges and Practicality on Modern Smartphones
Comments: This work has been submitted to Euro S&P 2026 for possible publication
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2512.07086 [pdf, ps, other]
Title: ThinkTrap: Denial-of-Service Attacks against Black-box LLM Services via Infinite Thinking
Comments: This version includes the final camera-ready manuscript accepted by NDSS 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[39]  arXiv:2512.07038 [pdf, ps, other]
Title: Ideal Attribution and Faithful Watermarks for Language Models
Comments: 30 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[40]  arXiv:2512.07033 [pdf, ps, other]
Title: Managed TLS Under Migration: Authentication Authority Across CDN and Hosting Transitions
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[ total of 145 entries: 1-25 | 16-40 | 41-65 | 66-90 | 91-115 | ... | 141-145 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)