We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 120

[ total of 143 entries: 1-250 | 121-143 ]
[ showing up to 250 entries per page: fewer | more ]

Thu, 25 Dec 2025 (continued, showing last 1 of 26 entries)

[121]  arXiv:2512.20622 (cross-list from cs.NI) [pdf, ps, other]
Title: How Feasible are Passive Network Attacks on 5G Networks and Beyond? A Survey
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

Wed, 24 Dec 2025

[122]  arXiv:2512.20583 [pdf, ps, other]
Title: Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem
Comments: To appear in PETS 2026
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2512.20535 [pdf, ps, other]
Title: ARBITER: AI-Driven Filtering for Role-Based Access Control
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2512.20423 [pdf, ps, other]
Title: Evasion-Resilient Detection of DNS-over-HTTPS Data Exfiltration: A Practical Evaluation and Toolkit
Authors: Adam Elaoumari
Comments: 61 pages Advisor : Dr Darren Hurley-Smith
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[125]  arXiv:2512.20405 [pdf, ps, other]
Title: ChatGPT: Excellent Paper! Accept It. Editor: Imposter Found! Review Rejected
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2512.20402 [pdf, ps, other]
Title: iblock: Accurate and Scalable Bitcoin Simulations with OMNeT++
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[127]  arXiv:2512.20396 [pdf, ps, other]
Title: Symmaries: Automatic Inference of Formal Security Summaries for Java Programs
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Programming Languages (cs.PL); Software Engineering (cs.SE)
[128]  arXiv:2512.20323 [pdf, ps, other]
Title: Differentially Private Feature Release for Wireless Sensing: Adaptive Privacy Budget Allocation on CSI Spectrograms
Comments: 19pages,4figures
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2512.20303 [pdf, ps, other]
Title: From the Two-Capacitor Paradox to Electromagnetic Side-Channel Mitigation in Digital Circuits
Comments: This article got accepted in the IEEE MAPCON 2025 conference for the publication
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2512.20243 [pdf, ps, other]
Title: Post-Quantum Cryptography in the 5G Core
Comments: 11 pages, 7 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[131]  arXiv:2512.20234 [pdf, ps, other]
Title: Achieving Flexible and Secure Authentication with Strong Privacy in Decentralized Networks
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2512.20176 [pdf, ps, other]
Title: Optimistic TEE-Rollups: A Hybrid Architecture for Scalable and Verifiable Generative AI Inference on Blockchain
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2512.20168 [pdf, ps, other]
Title: Odysseus: Jailbreaking Commercial Multimodal LLM-integrated Systems via Dual Steganography
Comments: This paper is accepted by Network and Distributed System Security Symposium (NDSS) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[134]  arXiv:2512.20062 [pdf, ps, other]
Title: On the Effectiveness of Instruction-Tuning Local LLMs for Identifying Software Vulnerabilities
Comments: The 9th International Conference on Mobile Internet Security (MobiSec 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[135]  arXiv:2512.20004 [pdf, ps, other]
Title: IoT-based Android Malware Detection Using Graph Neural Network With Adversarial Defense
Comments: 13 pages
Journal-ref: IEEE Internet of Things Journal, IEEE, ISSN 2327-4662 (2022)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[136]  arXiv:2512.19997 [pdf, ps, other]
Title: BacAlarm: Mining and Simulating Composite API Traffic to Prevent Broken Access Control Violations
Comments: The full version of this work consists of 15 pages and has been submitted to IEEE Transactions on Software Engineering (TSE)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[137]  arXiv:2512.19968 [pdf, ps, other]
Title: Fast Deterministically Safe Proof-of-Work Consensus
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2512.19951 [pdf, ps, other]
Title: Efficient Mod Approximation and Its Applications to CKKS Ciphertexts
Authors: Yufei Zhou
Subjects: Cryptography and Security (cs.CR)
[139]  arXiv:2512.19945 [pdf, ps, other]
Title: Energy-Efficient Multi-LLM Reasoning for Binary-Free Zero-Day Detection in IoT Firmware
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2512.20077 (cross-list from quant-ph) [pdf, ps, other]
Title: Fault Injection Attacks on Machine Learning-based Quantum Computer Readout Error Correction
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[141]  arXiv:2512.19935 (cross-list from cs.LG) [pdf, ps, other]
Title: Conditional Adversarial Fragility in Financial Machine Learning under Macroeconomic Stress
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[142]  arXiv:2512.19730 (cross-list from cs.LG) [pdf, ps, other]
Title: ArcGen: Generalizing Neural Backdoor Detection Across Diverse Architectures
Comments: 16 pages, 8 figures. This article was accepted by IEEE Transactions on Information Forensics and Security. DOI: 10.1109/TIFS.2025.3610254
Journal-ref: in IEEE Transactions on Information Forensics and Security, vol. 20, pp. 10082-10097, 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[143]  arXiv:2512.19711 (cross-list from cs.CV) [pdf, ps, other]
Title: PHANTOM: PHysical ANamorphic Threats Obstructing Connected Vehicle Mobility
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 143 entries: 1-250 | 121-143 ]
[ showing up to 250 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2601, contact, help  (Access key information)