Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR
arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for recent submissions

  • Mon, 6 Oct 2025
  • Fri, 3 Oct 2025
  • Thu, 2 Oct 2025
  • Wed, 1 Oct 2025
  • Tue, 30 Sep 2025

See today's new changes

Total of 201 entries : 1-50 51-100 101-150 151-200 ... 201-201
Showing up to 50 entries per page: fewer | more | all

Mon, 6 Oct 2025 (showing 46 of 46 entries )

[1] arXiv:2510.03219 [pdf, html, other]
Title: TPM-Based Continuous Remote Attestation and Integrity Verification for 5G VNFs on Kubernetes
Al Nahian Bin Emran, Rajendra Upadhyay, Rajendra Paudyal, Lisa Donnan, Duminda Wijesekera
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:2510.03035 [pdf, html, other]
Title: Protecting Persona Biometric Data: The Case of Facial Privacy
Lambert Hogenhout, Rinzin Wangmo
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3] arXiv:2510.02999 [pdf, html, other]
Title: Untargeted Jailbreak Attack
Xinzhe Huang, Wenjing Hu, Tianhang Zheng, Kedong Xiu, Xiaojun Jia, Di Wang, Zhan Qin, Kui Ren
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[4] arXiv:2510.02964 [pdf, html, other]
Title: External Data Extraction Attacks against Retrieval-Augmented Large Language Models
Yu He, Yifei Chen, Yiming Li, Shuo Shao, Leyi Qi, Boheng Li, Dacheng Tao, Zhan Qin
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2510.02960 [pdf, other]
Title: SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
Khaled Serag, Zhaozhou Tang, Sungwoo Kim, Vireshwar Kumar, Dave (Jing)Tian, Saman Zonouz, Raheem Beyah, Dongyan Xu, Z. Berkay Celik
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:2510.02947 [pdf, html, other]
Title: SoK: Preconfirmations
Aikaterini-Panagiota Stouka, Conor McMenamin, Demetris Kyriacou, Lin Oshitani, Quentin Botha
Comments: The latest version of this document is hosted on GitHub at: this https URL
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[7] arXiv:2510.02944 [pdf, html, other]
Title: Improved Search-to-Decision Reduction for Random Local Functions
Kel Zin Tan, Prashant Nalini Vasudevan
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:2510.02833 [pdf, html, other]
Title: Attack via Overfitting: 10-shot Benign Fine-tuning to Jailbreak LLMs
Zhixin Xie, Xurui Song, Jun Luo
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:2510.02707 [pdf, html, other]
Title: A Statistical Method for Attack-Agnostic Adversarial Attack Detection with Compressive Sensing Comparison
Chinthana Wimalasuriya, Spyros Tragoudas
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[10] arXiv:2510.02694 [pdf, html, other]
Title: MALF: A Multi-Agent LLM Framework for Intelligent Fuzzing of Industrial Control Protocols
Bowei Ning, Xuejun Zong, Kan He
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2510.02643 [pdf, html, other]
Title: Using Preformed Resistive Random Access Memory to Create a Strong Physically Unclonable Function
Jack Garrard, John F. Hardy II, Carlo daCunha, Mayank Bakshi
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:2510.02563 [pdf, html, other]
Title: Who's Wearing? Ear Canal Biometric Key Extraction for User Authentication on Wireless Earbuds
Chenpei Huang, Lingfeng Yao, Hui Zhong, Kyu In Lee, Lan Zhang, Xiaoyong Yuan, Tomoaki Ohtsuki, Miao Pan
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[13] arXiv:2510.02554 [pdf, html, other]
Title: ToolTweak: An Attack on Tool Selection in LLM-based Agents
Jonathan Sneh, Ruomei Yan, Jialin Yu, Philip Torr, Yarin Gal, Sunando Sengupta, Eric Sommerlade, Alasdair Paren, Adel Bibi
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[14] arXiv:2510.02519 [pdf, html, other]
Title: TLoRa: Implementing TLS Over LoRa for Secure HTTP Communication in IoT
Atonu Ghosh, Akhilesh Mohanasundaram, Srishivanth R F, Sudip Misra
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[15] arXiv:2510.02475 [pdf, html, other]
Title: Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
Weihang Li, Pete Crowley, Arya Tschand, Yu Wang, Miroslav Pajic, Daniel Sorin
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[16] arXiv:2510.02424 [pdf, html, other]
Title: Adaptive Deception Framework with Behavioral Analysis for Enhanced Cybersecurity Defense
Basil Abdullah AL-Zahrani
Comments: 5 pages, 5 tables, 1 figure
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17] arXiv:2510.02422 [pdf, html, other]
Title: Dynamic Target Attack
Kedong Xiu, Churui Zeng, Tianhang Zheng, Xinzhe Huang, Xiaojun Jia, Di Wang, Puning Zhao, Zhan Qin, Kui Ren
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[18] arXiv:2510.02395 [pdf, html, other]
Title: PolyLink: A Blockchain Based Decentralized Edge AI Platform for LLM Inference
Hongbo Liu, Jiannong Cao, Bo Yang, Dongbin Bai, Yinfeng Cao, Xiaoming Shen, Yinan Zhang, Jinwen Liang, Shan Jiang, Mingjin Zhang
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[19] arXiv:2510.02391 [pdf, other]
Title: LLM-Generated Samples for Android Malware Detection
Nik Rollinson, Nikolaos Polatidis
Comments: 24 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20] arXiv:2510.02386 [pdf, html, other]
Title: On The Fragility of Benchmark Contamination Detection in Reasoning Models
Han Wang, Haoyu Li, Brian Ko, Huan Zhang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[21] arXiv:2510.02384 [pdf, html, other]
Title: Secure and Robust Watermarking for AI-generated Images: A Comprehensive Survey
Jie Cao, Qi Li, Zelin Zhang, Jianbing Ni
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[22] arXiv:2510.02383 [pdf, html, other]
Title: Selmer-Inspired Elliptic Curve Generation
Awnon Bhowmik
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[23] arXiv:2510.02379 [pdf, other]
Title: Hybrid Schemes of NIST Post-Quantum Cryptography Standard Algorithms and Quantum Key Distribution for Key Exchange and Digital Signature
Abel C. H. Chen
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF); Quantum Physics (quant-ph)
[24] arXiv:2510.02378 [pdf, html, other]
Title: Apply Bayes Theorem to Optimize IVR Authentication Process
Jingrong Xie, Yumin Li
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST); Applications (stat.AP)
[25] arXiv:2510.02376 [pdf, html, other]
Title: Scaling Homomorphic Applications in Deployment
Ryan Marinelli, Angelica Chowdhury
Comments: 5 pages, 6 figures, 1 pseudo code
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[26] arXiv:2510.02374 [pdf, html, other]
Title: A Hybrid CAPTCHA Combining Generative AI with Keystroke Dynamics for Enhanced Bot Detection
Ayda Aghaei Nia
Comments: 6 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[27] arXiv:2510.02373 [pdf, html, other]
Title: A-MemGuard: A Proactive Defense Framework for LLM-Based Agent Memory
Qianshan Wei, Tengchao Yang, Yaochen Wang, Xinfeng Li, Lijun Li, Zhenfei Yin, Yi Zhan, Thorsten Holz, Zhiqiang Lin, XiaoFeng Wang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[28] arXiv:2510.02371 [pdf, html, other]
Title: Federated Spatiotemporal Graph Learning for Passive Attack Detection in Smart Grids
Bochra Al Agha, Razane Tajeddine
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[29] arXiv:2510.02365 [pdf, html, other]
Title: Bootstrapping as a Morphism: An Arithmetic Geometry Approach to Asymptotically Faster Homomorphic Encryption
Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG); Number Theory (math.NT)
[30] arXiv:2510.02357 [pdf, other]
Title: Privacy in the Age of AI: A Taxonomy of Data Risks
Grace Billiris, Asif Gill, Madhushi Bandara
Comments: 12 pages, 2 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[31] arXiv:2510.02356 [pdf, html, other]
Title: Measuring Physical-World Privacy Awareness of Large Language Models: An Evaluation Benchmark
Xinjie Shen, Mufei Li, Pan Li
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[32] arXiv:2510.02349 [pdf, html, other]
Title: An Investigation into the Performance of Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection
Hamed Fard, Tobias Schalau, Gerhard Wunder
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[33] arXiv:2510.02342 [pdf, html, other]
Title: CATMark: A Context-Aware Thresholding Framework for Robust Cross-Task Watermarking in Large Language Models
Yu Zhang, Shuliang Liu, Xu Yang, Xuming Hu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[34] arXiv:2510.02325 [pdf, html, other]
Title: Agentic-AI Healthcare: Multilingual, Privacy-First Framework with MCP Agents
Mohammed A. Shehab
Comments: 6 pages, 1 figure. Submitted as a system/vision paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[35] arXiv:2510.02319 [pdf, html, other]
Title: Modeling the Attack: Detecting AI-Generated Text by Quantifying Adversarial Perturbations
Lekkala Sai Teja, Annepaka Yadagiri, Sangam Sai Anish, Siva Gopala Krishna Nuthakki, Partha Pakray
Comments: 8 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[36] arXiv:2510.02317 [pdf, html, other]
Title: Hybrid Horizons: Policy for Post-Quantum Security
Anais Jaikissoon
Comments: 18 pages, 3 figures, 1 image
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:2510.03218 (cross-list from quant-ph) [pdf, other]
Title: Cheat-Penalised Quantum Weak Coin-Flipping
Atul Singh Arora, Carl A. Miller, Mauro E.S. Morales, Jamie Sikora
Comments: 61 pages, 11 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[38] arXiv:2510.02915 (cross-list from cs.SD) [pdf, html, other]
Title: WavInWav: Time-domain Speech Hiding via Invertible Neural Network
Wei Fan, Kejiang Chen, Xiangkun Wang, Weiming Zhang, Nenghai Yu
Comments: 13 pages, 5 figures, project page: this https URL
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[39] arXiv:2510.02902 (cross-list from cs.LG) [pdf, other]
Title: DMark: Order-Agnostic Watermarking for Diffusion Large Language Models
Linyu Wu, Linhao Zhong, Wenjie Qu, Yuexin Li, Yue Liu, Shengfang Zhai, Chunhua Shen, Jiaheng Zhang
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[40] arXiv:2510.02773 (cross-list from cs.SE) [pdf, html, other]
Title: Automated Repair of OpenID Connect Programs (Extended Version)
Tamjid Al Rahat, Yanju Chen, Yu Feng, Yuan Tian
Comments: This is an extended version. The original paper is accepted to ASE 2025
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[41] arXiv:2510.02717 (cross-list from cs.LG) [pdf, other]
Title: CST-AFNet: A dual attention-based deep learning framework for intrusion detection in IoT networks
Waqas Ishtiaq, Ashrafun Zannat, A.H.M. Shahariar Parvez, Md. Alamgir Hossain, Muntasir Hasan Kanchan, Muhammad Masud Tarek
Comments: 9 pages, 9 figures, 5 tables
Journal-ref: CST-AFNet: A dual attention-based deep learning framework for intrusion detection in IoT networks, Array, volume = 27, year = 2025
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[42] arXiv:2510.02711 (cross-list from cs.LG) [pdf, other]
Title: A Novel Unified Lightweight Temporal-Spatial Transformer Approach for Intrusion Detection in Drone Networks
Tarun Kumar Biswas, Ashrafun Zannat, Waqas Ishtiaq, Md. Alamgir Hossain
Comments: 21 pages, 18 figures, 5 tables
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[43] arXiv:2510.02503 (cross-list from eess.SY) [pdf, html, other]
Title: A Bilevel Optimization Framework for Adversarial Control of Gas Pipeline Operations
Tejaswini Sanjay Katale, Lu Gao, Yunpeng Zhang, Alaa Senouci
Journal-ref: Actuators 2025, 14(10), 480
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[44] arXiv:2510.02487 (cross-list from cs.NI) [pdf, html, other]
Title: Interplay between Security, Privacy and Trust in 6G-enabled Intelligent Transportation Systems
Ahmed Danladi Abdullahi, Erfan Bahrami, Tooska Dargahi, Mohammed Al-Khalidi, Mohammad Hammoudeh
Comments: Submitted to IEEE Open Journal of Intelligent Transportation Systems (32 pages, 5 figures, 7 tables)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[45] arXiv:2510.02389 (cross-list from cs.SE) [pdf, html, other]
Title: From Trace to Line: LLM Agent for Real-World OSS Vulnerability Localization
Haoran Xi, Minghao Shao, Brendan Dolan-Gavitt, Muhammad Shafique, Ramesh Karri
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[46] arXiv:2510.02332 (cross-list from cs.CL) [pdf, html, other]
Title: A High-Capacity and Secure Disambiguation Algorithm for Neural Linguistic Steganography
Yapei Feng, Feng Jiang, Shanhao Wu, Hua Zhong
Comments: 13 pages,7 figures
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Fri, 3 Oct 2025 (showing first 4 of 29 entries )

[47] arXiv:2510.02280 [pdf, other]
Title: An efficient quantum algorithm for computing $S$-units and its applications
Jean-Francois Biasse, Fang Song
Comments: Long version of a paper from SODA 2016
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[48] arXiv:2510.02196 [pdf, html, other]
Title: Authentication Security of PRF GNSS Ranging
Jason Anderson
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[49] arXiv:2510.02184 [pdf, other]
Title: Testing Stability and Robustness in Three Cryptographic Chaotic Systems
N. A. Anagnostopoulos, K. Konstantinidis, A. N. Miliou, S. G. Stavrinides
Comments: Published as "N. A. Anagnostopoulos, K. Konstantinidis, A. N. Miliou & S. G. Stavrinides, "Testing Stability and Robustness in Three Cryptographic Chaotic Systems", Proceedings of the 3rd International Interdisciplinary Symposium on Chaos and Complex Systems (CCS 2010), Journal of Concrete And Applicable Mathematics (JCAAM), vol. 9, iss. 3, pp. 247-261, Eudoxus Press, 2011"; no longer available
Subjects: Cryptography and Security (cs.CR); Chaotic Dynamics (nlin.CD)
[50] arXiv:2510.02162 [pdf, html, other]
Title: NoMod: A Non-modular Attack on Module Learning With Errors
Cristian Bassotto, Ermes Franch, Marina KrĨek, Stjepan Picek
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Total of 201 entries : 1-50 51-100 101-150 151-200 ... 201-201
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack