We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 14

[ total of 133 entries: 1-5 | 5-9 | 10-14 | 15-19 | 20-24 | 25-29 | 30-34 | ... | 130-133 ]
[ showing 5 entries per page: fewer | more | all ]

Thu, 11 Dec 2025 (continued, showing 5 of 22 entries)

[15]  arXiv:2512.09882 (cross-list from cs.AI) [pdf, ps, other]
Title: Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[16]  arXiv:2512.09862 (cross-list from quant-ph) [pdf, ps, other]
Title: True Random Number Generators on IQM Spark
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[17]  arXiv:2512.09742 (cross-list from cs.CL) [pdf, ps, other]
Title: Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs
Comments: 70 pages, 47 figures
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2512.09699 (cross-list from quant-ph) [pdf, ps, other]
Title: Device Independent Quantum Secret Sharing Using Multiparty Pseudo-telepathy Game
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[19]  arXiv:2512.09311 (cross-list from cs.CV) [pdf, ps, other]
Title: Transformer-Driven Multimodal Fusion for Explainable Suspiciousness Estimation in Visual Surveillance
Comments: 12 pages, 10 figures, IEEE Transaction on Image Processing
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[ total of 133 entries: 1-5 | 5-9 | 10-14 | 15-19 | 20-24 | 25-29 | 30-34 | ... | 130-133 ]
[ showing 5 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)