We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 70

[ total of 150 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-120 | 121-145 | 146-150 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 3 Dec 2025 (continued, showing 25 of 29 entries)

[71]  arXiv:2512.02625 [pdf, ps, other]
Title: CryptoQA: A Large-scale Question-answering Dataset for AI-assisted Cryptography
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[72]  arXiv:2512.02603 [pdf, ps, other]
Title: Semigroup action based on skew polynomial evaluation with applications to Cryptography
Comments: Submitted to the International Journal of Computer Mathematics: Computer Systems Theory in March 2025
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[73]  arXiv:2512.02600 [pdf, ps, other]
Title: S3C2 SICP Summit 2025-06: Vulnerability Response Summit
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2512.02598 [pdf, ps, other]
Title: Equilibrium SAT based PQC: New aegis against quantum computing
Authors: Keum-Bae Cho
Comments: 8 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2512.02534 [pdf, ps, other]
Title: Detection of Crowdsourcing Cryptocurrency Laundering via Multi-Task Collaboration
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2512.02418 [pdf, ps, other]
Title: Leveraging Large Language Models to Bridge On-chain and Off-chain Transparency in Stablecoins
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[77]  arXiv:2512.02414 [pdf, ps, other]
Title: Characterizing Cyber Attacks against Space Infrastructures with Missing Data: Framework and Case Study
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2512.02399 [pdf, ps, other]
Title: AtomGraph: Tackling Atomicity Violation in Smart Contracts using Multimodal GCNs
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2512.02321 [pdf, ps, other]
Title: LeechHijack: Covert Computational Resource Exploitation in Intelligent Agent Systems
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[80]  arXiv:2512.02318 [pdf, ps, other]
Title: COGNITION: From Evaluation to Defense against Multimodal LLM CAPTCHA Solvers
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[81]  arXiv:2512.02301 [pdf, ps, other]
Title: Quantum Vanguard: Server Optimized Privacy Fortified Federated Intelligence for Future Vehicles
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2512.02287 [pdf, ps, other]
Title: HOT Protocol
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2512.02270 [pdf, ps, other]
Title: Property-Guided Cyber-Physical Reduction and Surrogation for Safety Analysis in Robotic Vehicles
Comments: Accepted at EAI SmartSP 2025 (EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles), Springer LNICST. The code repository is available here: this https URL
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[84]  arXiv:2512.02259 [pdf, ps, other]
Title: CVE Breadcrumbs: Tracking Vulnerabilities Through Versioned Apache Libraries
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[85]  arXiv:2512.02243 [pdf, ps, other]
Title: PhishSnap: Image-Based Phishing Detection Using Perceptual Hashing
Comments: IEE Standard Formatting, 3 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[86]  arXiv:2512.02157 [pdf, ps, other]
Title: Factor(T,U): Factored Cognition Strengthens Monitoring of Untrusted AI
Comments: 7 pages body; 19 pages total; 8 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[87]  arXiv:2512.02087 [pdf, ps, other]
Title: A survey about Hidden Subgroup Problem from a mathematical and cryptographic perspective
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2512.02082 [pdf, ps, other]
Title: Deterministic Random Bit Generators Based on Ascon for Embedded Systems
Authors: Abel C. H. Chen
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2512.02069 [pdf, ps, other]
Title: Large Language Model based Smart Contract Auditing with LLMBugScanner
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[90]  arXiv:2512.02062 [pdf, ps, other]
Title: Superpixel Attack: Enhancing Black-box Adversarial Attack with Image-driven Division Areas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[91]  arXiv:2512.02973 (cross-list from cs.CV) [pdf, ps, other]
Title: Contextual Image Attack: How Visual Context Exposes Multimodal Safety Vulnerabilities
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[92]  arXiv:2512.02410 (cross-list from cs.MA) [pdf, ps, other]
Title: Decentralized Multi-Agent System with Trust-Aware Communication
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR)
[93]  arXiv:2512.02306 (cross-list from cs.AI) [pdf, ps, other]
Title: OmniGuard: Unified Omni-Modal Guardrails with Deliberate Reasoning
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[94]  arXiv:2512.02276 (cross-list from cs.NI) [pdf, ps, other]
Title: Adversarial Robustness of Traffic Classification under Resource Constraints: Input Structure Matters
Comments: Accepted at the 2025 IEEE International Symposium on Networks, Computers and Communications (ISNCC)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[95]  arXiv:2512.02047 (cross-list from cs.CY) [pdf, ps, other]
Title: Copyright in AI Pre-Training Data Filtering: Regulatory Landscape and Mitigation Strategies
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[ total of 150 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-120 | 121-145 | 146-150 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)