We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 90

[ total of 150 entries: 1-25 | 16-40 | 41-65 | 66-90 | 91-115 | 116-140 | 141-150 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 3 Dec 2025 (continued, showing last 6 of 29 entries)

[91]  arXiv:2512.02973 (cross-list from cs.CV) [pdf, ps, other]
Title: Contextual Image Attack: How Visual Context Exposes Multimodal Safety Vulnerabilities
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[92]  arXiv:2512.02410 (cross-list from cs.MA) [pdf, ps, other]
Title: Decentralized Multi-Agent System with Trust-Aware Communication
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR)
[93]  arXiv:2512.02306 (cross-list from cs.AI) [pdf, ps, other]
Title: OmniGuard: Unified Omni-Modal Guardrails with Deliberate Reasoning
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[94]  arXiv:2512.02276 (cross-list from cs.NI) [pdf, ps, other]
Title: Adversarial Robustness of Traffic Classification under Resource Constraints: Input Structure Matters
Comments: Accepted at the 2025 IEEE International Symposium on Networks, Computers and Communications (ISNCC)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[95]  arXiv:2512.02047 (cross-list from cs.CY) [pdf, ps, other]
Title: Copyright in AI Pre-Training Data Filtering: Regulatory Landscape and Mitigation Strategies
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[96]  arXiv:2512.02046 (cross-list from cs.CY) [pdf, ps, other]
Title: Global AI Governance Overview: Understanding Regulatory Requirements Across Global Jurisdictions
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)

Tue, 2 Dec 2025 (showing first 19 of 54 entries)

[97]  arXiv:2512.01893 [pdf, ps, other]
Title: Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration
Comments: Data and code available at: this https URL
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2512.01891 [pdf, ps, other]
Title: Behind the Curtain: How Shared Hosting Providers Respond to Vulnerability Notifications
Comments: Accepted at IEEE S&P 2026
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2512.01845 [pdf, ps, other]
Title: JPEGs Just Got Snipped: Croppable Signatures Against Deepfake Images
Journal-ref: 2025 International Joint Conference on Neural Networks (IJCNN)
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2512.01832 [pdf, ps, other]
Title: A Privacy-Preserving Information-Sharing Protocol for Federated Authentication
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2512.01727 [pdf, ps, other]
Title: AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2512.01666 [pdf, ps, other]
Title: Demystifying Feature Engineering in Malware Analysis of API Call Sequences
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:2512.01651 [pdf, ps, other]
Title: Rethinking Cybersecurity Ontology Classification and Evaluation: Towards a Credibility-Centered Framework
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2512.01604 [pdf, ps, other]
Title: On the Context-Hiding Property of Shamir-Based Homomorphic Secret Sharing
Comments: 2025 IEEE International Symposium on Information Theory
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2512.01596 [pdf, ps, other]
Title: Towards a Multi-Layer Defence Framework for Securing Near-Real-Time Operations in Open RAN
Comments: This is the authors preprint version. The manuscript has been submitted to IEEE
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[106]  arXiv:2512.01595 [pdf, ps, other]
Title: WhiteLie: A Robust System for Spoofing User Data in Android Platforms
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2512.01594 [pdf, ps, other]
Title: Confidential, Attestable, and Efficient Inter-CVM Communication with Arm CCA
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[108]  arXiv:2512.01577 [pdf, ps, other]
Title: Beyond the Hype: A Large-Scale Empirical Analysis of On-Chain Transactions in NFT Scams
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2512.01574 [pdf, ps, other]
Title: IVE: An Accelerator for Single-Server Private Information Retrieval Using Versatile Processing Elements
Comments: 15 pages, 14 figures, accepted at HPCA 2026
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[110]  arXiv:2512.01437 [pdf, ps, other]
Title: Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2512.01391 [pdf, ps, other]
Title: INFERMAL: Inferential analysis of maliciously registered domains
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[112]  arXiv:2512.01353 [pdf, ps, other]
Title: The Trojan Knowledge: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.01335 [pdf, ps, other]
Title: EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations
Comments: Accepted to ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[114]  arXiv:2512.01326 [pdf, ps, other]
Title: Securing Large Language Models (LLMs) from Prompt Injection Attacks
Comments: 10 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[115]  arXiv:2512.01295 [pdf, ps, other]
Title: Systems Security Foundations for Agentic Computing
Subjects: Cryptography and Security (cs.CR)
[ total of 150 entries: 1-25 | 16-40 | 41-65 | 66-90 | 91-115 | 116-140 | 141-150 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)