Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR
arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2025

Total of 104 entries : 1-50 51-100 101-104
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:2510.00151 [pdf, html, other]
Title: Stealing AI Model Weights Through Covert Communication Channels
Valentin Barbaza, Alan Rodrigo Diaz-Rizo, Hassan Aboushady, Spyridon Raptis, Haralampos-G. Stratigopoulos
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[2] arXiv:2510.00164 [pdf, html, other]
Title: Calyx: Privacy-Preserving Multi-Token Optimistic-Rollup Protocol
Dominik Apel, Zeta Avarikioti, Matteo Maffei, Yuheng Wang
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:2510.00181 [pdf, html, other]
Title: CHAI: Command Hijacking against embodied AI
Luis Burbano, Diego Ortiz, Qi Sun, Siwei Yang, Haoqin Tu, Cihang Xie, Yinzhi Cao, Alvaro A Cardenas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[4] arXiv:2510.00240 [pdf, html, other]
Title: SecureBERT 2.0: Advanced Language Model for Cybersecurity Intelligence
Ehsan Aghaei, Sarthak Jain, Prashanth Arun, Arjun Sambamoorthy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[5] arXiv:2510.00317 [pdf, html, other]
Title: MAVUL: Multi-Agent Vulnerability Detection via Contextual Reasoning and Interactive Refinement
Youpeng Li, Kartik Joshi, Xinda Wang, Eric Wong
Comments: Accepted by The 7th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[6] arXiv:2510.00322 [pdf, html, other]
Title: Privately Estimating Black-Box Statistics
Günter F. Steinke, Thomas Steinke
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[7] arXiv:2510.00350 [pdf, html, other]
Title: Security and Privacy Analysis of Tile's Location Tracking Protocol
Akshaya Kumar, Anna Raymaker, Michael Specter
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:2510.00451 [pdf, html, other]
Title: A Call to Action for a Secure-by-Design Generative AI Paradigm
Dalal Alharthi, Ivan Roberto Kawaminami Garcia
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[9] arXiv:2510.00452 [pdf, html, other]
Title: Cloud Investigation Automation Framework (CIAF): An AI-Driven Approach to Cloud Forensics
Dalal Alharthi, Ivan Roberto Kawaminami Garcia
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[10] arXiv:2510.00490 [pdf, html, other]
Title: Has the Two-Decade-Old Prophecy Come True? Artificial Bad Intelligence Triggered by Merely a Single-Bit Flip in Large Language Models
Yu Yan, Siqi Lu, Yang Gao, Zhaoxuan Li, Ziming Zhao, Qingjun Yuan, Yongjuan Wang
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2510.00529 [pdf, html, other]
Title: Memory-Augmented Log Analysis with Phi-4-mini: Enhancing Threat Detection in Structured Security Logs
Anbi Guo, Mahfuza Farooque
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:2510.00554 [pdf, html, other]
Title: Sentry: Authenticating Machine Learning Artifacts on the Fly
Andrew Gan, Zahra Ghodsi
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:2510.00572 [pdf, html, other]
Title: IntrusionX: A Hybrid Convolutional-LSTM Deep Learning Framework with Squirrel Search Optimization for Network Intrusion Detection
Ahsan Farabi, Muhaiminul Rashid Shad, Israt Khandaker
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[14] arXiv:2510.00763 [pdf, html, other]
Title: A Monoid Ring Approach to Color Visual Cryptography
Maximilian Reif, Jens Zumbrägel
Comments: 5 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:2510.00799 [pdf, html, other]
Title: Fast, Secure, and High-Capacity Image Watermarking with Autoencoded Text Vectors
Gautier Evennou, Vivien Chappelier, Ewa Kijak
Comments: Preprint
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[16] arXiv:2510.01097 [pdf, html, other]
Title: Universally Composable Termination Analysis of Tendermint
Zhixin Dong, Xian Xu, Yuhang Zeng, Mingchao Wan, Chunmiao Li
Comments: 35 pages including references, 16 figures, 2 tables. Submitted to ACNS 2026
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:2510.01173 [pdf, other]
Title: EditTrack: Detecting and Attributing AI-assisted Image Editing
Zhengyuan Jiang, Yuyang Zhang, Moyang Guo, Neil Zhenqiang Gong
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[18] arXiv:2510.01223 [pdf, html, other]
Title: Jailbreaking LLMs via Semantically Relevant Nested Scenarios with Targeted Toxic Knowledge
Hui Dou, Ning Xu, Yiwen Zhang, Kaibin Wang
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[19] arXiv:2510.01342 [pdf, html, other]
Title: Fine-Tuning Jailbreaks under Highly Constrained Black-Box Settings: A Three-Pronged Approach
Xiangfang Li, Yu Wang, Bo Li
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:2510.01350 [pdf, other]
Title: Integrated Security Mechanisms for Weight Protection in Memristive Crossbar Arrays
Muhammad Faheemur Rahman, Wayne Burleson
Comments: 2 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET); Neural and Evolutionary Computing (cs.NE); Systems and Control (eess.SY)
[21] arXiv:2510.01354 [pdf, other]
Title: WAInjectBench: Benchmarking Prompt Injection Detections for Web Agents
Yinuo Liu, Ruohan Xu, Xilong Wang, Yuqi Jia, Neil Zhenqiang Gong
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[22] arXiv:2510.01359 [pdf, other]
Title: Breaking the Code: Security Assessment of AI Code Agents Through Systematic Jailbreaking Attacks
Shoumik Saha, Jifan Chen, Sam Mayers, Sanjay Krishna Gouda, Zijian Wang, Varun Kumar
Comments: 28 pages, 21 figures, 9 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[23] arXiv:2510.01393 [pdf, html, other]
Title: E-FuzzEdge: Optimizing Embedded Device Security with Scalable In-Place Fuzzing
Davide Rusconi, Osama Yousef, Mirco Picca, Flavio Toffalini, Andrea Lanzi
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:2510.01445 [pdf, other]
Title: Securing IoT Devices in Smart Cities: A Review of Proposed Solutions
Andrés F. Betancur-López
Comments: 14 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:2510.01552 [pdf, html, other]
Title: POLAR: Automating Cyber Threat Prioritization through LLM-Powered Assessment
Luoxi Tang, Yuqiao Meng, Ankita Patra, Weicheng Ma, Muchao Ye, Zhaohan Xi
Comments: 25 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[26] arXiv:2510.01645 [pdf, html, other]
Title: Position: Privacy Is Not Just Memorization!
Niloofar Mireshghallah, Tianshi Li
Comments: 27 pages, 6 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[27] arXiv:2510.01676 [pdf, html, other]
Title: Evaluating the Robustness of a Production Malware Detection System to Transferable Adversarial Attacks
Milad Nasr, Yanick Fratantonio, Luca Invernizzi, Ange Albertini, Loua Farah, Alex Petit-Bianco, Andreas Terzis, Kurt Thomas, Elie Bursztein, Nicholas Carlini
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[28] arXiv:2510.01699 [pdf, html, other]
Title: Towards Imperceptible Adversarial Defense: A Gradient-Driven Shield against Facial Manipulations
Yue Li, Linying Xue, Dongdong Lin, Qiushi Li, Hui Tian, Hongxia Wang
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:2510.01720 [pdf, html, other]
Title: Constructions of Efficiently Implementable Boolean Functions with Provable Nonlinearity/Resiliency/Algebraic Immunity Trade-Offs
Palash Sarkar
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:2510.01780 [pdf, html, other]
Title: Secure Multi-Modal Data Fusion in Federated Digital Health Systems via MCP
Aueaphum Aueawatthanaphisut
Comments: 6 pages, 8 figures, 7 equations, 1 algorithm
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[31] arXiv:2510.01967 [pdf, other]
Title: ZK-WAGON: Imperceptible Watermark for Image Generation Models using ZK-SNARKs
Aadarsh Anantha Ramakrishnan, Shubham Agarwal, Selvanayagam S, Kunwar Singh
Comments: Accepted at AI-ML Systems 2025, Bangalore, India, this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[32] arXiv:2510.02158 [pdf, html, other]
Title: Mirage Fools the Ear, Mute Hides the Truth: Precise Targeted Adversarial Attacks on Polyphonic Sound Event Detection Systems
Junjie Su, Weifei Jin, Yuxin Cao, Derui Wang, Kai Ye, Jie Hao
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD)
[33] arXiv:2510.02162 [pdf, html, other]
Title: NoMod: A Non-modular Attack on Module Learning With Errors
Cristian Bassotto, Ermes Franch, Marina Krček, Stjepan Picek
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[34] arXiv:2510.02184 [pdf, other]
Title: Testing Stability and Robustness in Three Cryptographic Chaotic Systems
N. A. Anagnostopoulos, K. Konstantinidis, A. N. Miliou, S. G. Stavrinides
Comments: Published as "N. A. Anagnostopoulos, K. Konstantinidis, A. N. Miliou & S. G. Stavrinides, "Testing Stability and Robustness in Three Cryptographic Chaotic Systems", Proceedings of the 3rd International Interdisciplinary Symposium on Chaos and Complex Systems (CCS 2010), Journal of Concrete And Applicable Mathematics (JCAAM), vol. 9, iss. 3, pp. 247-261, Eudoxus Press, 2011"; no longer available
Subjects: Cryptography and Security (cs.CR); Chaotic Dynamics (nlin.CD)
[35] arXiv:2510.02196 [pdf, html, other]
Title: Authentication Security of PRF GNSS Ranging
Jason Anderson
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[36] arXiv:2510.02280 [pdf, other]
Title: An efficient quantum algorithm for computing $S$-units and its applications
Jean-Francois Biasse, Fang Song
Comments: Long version of a paper from SODA 2016
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[37] arXiv:2510.02317 [pdf, html, other]
Title: Hybrid Horizons: Policy for Post-Quantum Security
Anais Jaikissoon
Comments: 18 pages, 3 figures, 1 image
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:2510.02319 [pdf, html, other]
Title: Modeling the Attack: Detecting AI-Generated Text by Quantifying Adversarial Perturbations
Lekkala Sai Teja, Annepaka Yadagiri, Sangam Sai Anish, Siva Gopala Krishna Nuthakki, Partha Pakray
Comments: 8 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[39] arXiv:2510.02325 [pdf, html, other]
Title: Agentic-AI Healthcare: Multilingual, Privacy-First Framework with MCP Agents
Mohammed A. Shehab
Comments: 6 pages, 1 figure. Submitted as a system/vision paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[40] arXiv:2510.02342 [pdf, html, other]
Title: CATMark: A Context-Aware Thresholding Framework for Robust Cross-Task Watermarking in Large Language Models
Yu Zhang, Shuliang Liu, Xu Yang, Xuming Hu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[41] arXiv:2510.02349 [pdf, html, other]
Title: An Investigation into the Performance of Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection
Hamed Fard, Tobias Schalau, Gerhard Wunder
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[42] arXiv:2510.02356 [pdf, html, other]
Title: Measuring Physical-World Privacy Awareness of Large Language Models: An Evaluation Benchmark
Xinjie Shen, Mufei Li, Pan Li
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[43] arXiv:2510.02357 [pdf, other]
Title: Privacy in the Age of AI: A Taxonomy of Data Risks
Grace Billiris, Asif Gill, Madhushi Bandara
Comments: 12 pages, 2 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[44] arXiv:2510.02365 [pdf, html, other]
Title: Bootstrapping as a Morphism: An Arithmetic Geometry Approach to Asymptotically Faster Homomorphic Encryption
Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG); Number Theory (math.NT)
[45] arXiv:2510.02371 [pdf, html, other]
Title: Federated Spatiotemporal Graph Learning for Passive Attack Detection in Smart Grids
Bochra Al Agha, Razane Tajeddine
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[46] arXiv:2510.02373 [pdf, html, other]
Title: A-MemGuard: A Proactive Defense Framework for LLM-Based Agent Memory
Qianshan Wei, Tengchao Yang, Yaochen Wang, Xinfeng Li, Lijun Li, Zhenfei Yin, Yi Zhan, Thorsten Holz, Zhiqiang Lin, XiaoFeng Wang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[47] arXiv:2510.02374 [pdf, html, other]
Title: A Hybrid CAPTCHA Combining Generative AI with Keystroke Dynamics for Enhanced Bot Detection
Ayda Aghaei Nia
Comments: 6 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[48] arXiv:2510.02376 [pdf, html, other]
Title: Scaling Homomorphic Applications in Deployment
Ryan Marinelli, Angelica Chowdhury
Comments: 5 pages, 6 figures, 1 pseudo code
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[49] arXiv:2510.02378 [pdf, html, other]
Title: Apply Bayes Theorem to Optimize IVR Authentication Process
Jingrong Xie, Yumin Li
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST); Applications (stat.AP)
[50] arXiv:2510.02379 [pdf, other]
Title: Hybrid Schemes of NIST Post-Quantum Cryptography Standard Algorithms and Quantum Key Distribution for Key Exchange and Digital Signature
Abel C. H. Chen
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF); Quantum Physics (quant-ph)
Total of 104 entries : 1-50 51-100 101-104
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack