We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 111

[ total of 143 entries: 1-50 | 12-61 | 62-111 | 112-143 ]
[ showing 50 entries per page: fewer | more | all ]

Thu, 4 Dec 2025 (continued, showing last 3 of 34 entries)

[112]  arXiv:2512.03536 (cross-list from cs.NI) [pdf, ps, other]
Title: Mobility Induced Sensitivity of UAV based Nodes to Jamming in Private 5G Airfield Networks An Experimental Study
Comments: 4 pages, 4 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Robotics (cs.RO)
[113]  arXiv:2512.03310 (cross-list from cs.CL) [pdf, ps, other]
Title: Randomized Masked Finetuning: An Efficient Way to Mitigate Memorization of PIIs in LLMs
Comments: To be submitted for ICML 2026
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[114]  arXiv:2512.03079 (cross-list from cs.CL) [pdf, ps, other]
Title: Watermarks for Embeddings-as-a-Service Large Language Models
Authors: Anudeex Shetty
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Wed, 3 Dec 2025

[115]  arXiv:2512.02918 [pdf, ps, other]
Title: Belobog: Move Language Fuzzing Framework For Real-World Smart Contracts
Comments: Slight revision and under review
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[116]  arXiv:2512.02822 [pdf, ps, other]
Title: Decryption Through Polynomial Ambiguity: Noise-Enhanced High-Memory Convolutional Codes for Post-Quantum Cryptography
Authors: Meir Ariel
Comments: 23 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2510.15515
Journal-ref: International Journal on Cryptography and Information Security (IJCIS), Vol. 15, No.1/2/3/4, December 2025
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:2512.02654 [pdf, ps, other]
Title: Cybersecurity AI: The World's Top AI Agent for Security Capture-the-Flag (CTF)
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2512.02625 [pdf, ps, other]
Title: CryptoQA: A Large-scale Question-answering Dataset for AI-assisted Cryptography
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[119]  arXiv:2512.02603 [pdf, ps, other]
Title: Semigroup action based on skew polynomial evaluation with applications to Cryptography
Comments: Submitted to the International Journal of Computer Mathematics: Computer Systems Theory in March 2025
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[120]  arXiv:2512.02600 [pdf, ps, other]
Title: S3C2 SICP Summit 2025-06: Vulnerability Response Summit
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2512.02598 [pdf, ps, other]
Title: Equilibrium SAT based PQC: New aegis against quantum computing
Authors: Keum-Bae Cho
Comments: 8 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2512.02534 [pdf, ps, other]
Title: Detection of Crowdsourcing Cryptocurrency Laundering via Multi-Task Collaboration
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2512.02418 [pdf, ps, other]
Title: Leveraging Large Language Models to Bridge On-chain and Off-chain Transparency in Stablecoins
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[124]  arXiv:2512.02414 [pdf, ps, other]
Title: Characterizing Cyber Attacks against Space Infrastructures with Missing Data: Framework and Case Study
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2512.02399 [pdf, ps, other]
Title: AtomGraph: Tackling Atomicity Violation in Smart Contracts using Multimodal GCNs
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2512.02321 [pdf, ps, other]
Title: LeechHijack: Covert Computational Resource Exploitation in Intelligent Agent Systems
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[127]  arXiv:2512.02318 [pdf, ps, other]
Title: COGNITION: From Evaluation to Defense against Multimodal LLM CAPTCHA Solvers
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[128]  arXiv:2512.02301 [pdf, ps, other]
Title: Quantum Vanguard: Server Optimized Privacy Fortified Federated Intelligence for Future Vehicles
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2512.02287 [pdf, ps, other]
Title: HOT Protocol
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2512.02270 [pdf, ps, other]
Title: Property-Guided Cyber-Physical Reduction and Surrogation for Safety Analysis in Robotic Vehicles
Comments: Accepted at EAI SmartSP 2025 (EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles), Springer LNICST. The code repository is available here: this https URL
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[131]  arXiv:2512.02259 [pdf, ps, other]
Title: CVE Breadcrumbs: Tracking Vulnerabilities Through Versioned Apache Libraries
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[132]  arXiv:2512.02243 [pdf, ps, other]
Title: PhishSnap: Image-Based Phishing Detection Using Perceptual Hashing
Comments: IEE Standard Formatting, 3 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[133]  arXiv:2512.02157 [pdf, ps, other]
Title: Factor(T,U): Factored Cognition Strengthens Monitoring of Untrusted AI
Comments: 7 pages body; 19 pages total; 8 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[134]  arXiv:2512.02087 [pdf, ps, other]
Title: A survey about Hidden Subgroup Problem from a mathematical and cryptographic perspective
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:2512.02082 [pdf, ps, other]
Title: Deterministic Random Bit Generators Based on Ascon for Embedded Systems
Authors: Abel C. H. Chen
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:2512.02069 [pdf, ps, other]
Title: Large Language Model based Smart Contract Auditing with LLMBugScanner
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[137]  arXiv:2512.02062 [pdf, ps, other]
Title: Superpixel Attack: Enhancing Black-box Adversarial Attack with Image-driven Division Areas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[138]  arXiv:2512.02973 (cross-list from cs.CV) [pdf, ps, other]
Title: Contextual Image Attack: How Visual Context Exposes Multimodal Safety Vulnerabilities
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[139]  arXiv:2512.02410 (cross-list from cs.MA) [pdf, ps, other]
Title: Decentralized Multi-Agent System with Trust-Aware Communication
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR)
[140]  arXiv:2512.02306 (cross-list from cs.AI) [pdf, ps, other]
Title: OmniGuard: Unified Omni-Modal Guardrails with Deliberate Reasoning
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[141]  arXiv:2512.02276 (cross-list from cs.NI) [pdf, ps, other]
Title: Adversarial Robustness of Traffic Classification under Resource Constraints: Input Structure Matters
Comments: Accepted at the 2025 IEEE International Symposium on Networks, Computers and Communications (ISNCC)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[142]  arXiv:2512.02047 (cross-list from cs.CY) [pdf, ps, other]
Title: Copyright in AI Pre-Training Data Filtering: Regulatory Landscape and Mitigation Strategies
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[143]  arXiv:2512.02046 (cross-list from cs.CY) [pdf, ps, other]
Title: Global AI Governance Overview: Understanding Regulatory Requirements Across Global Jurisdictions
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[ total of 143 entries: 1-50 | 12-61 | 62-111 | 112-143 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)