Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR
arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for recent submissions

  • Fri, 1 Aug 2025
  • Thu, 31 Jul 2025
  • Wed, 30 Jul 2025
  • Tue, 29 Jul 2025
  • Mon, 28 Jul 2025

See today's new changes

Total of 120 entries : 1-50 51-100 101-120
Showing up to 50 entries per page: fewer | more | all

Fri, 1 Aug 2025 (showing 7 of 7 entries )

[1] arXiv:2507.23641 [pdf, html, other]
Title: Polynomial Lattices for the BIKE Cryptosystem
Michael Schaller
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:2507.23611 [pdf, html, other]
Title: LLM-Based Identification of Infostealer Infection Vectors from Screenshots: The Case of Aurora
Estelle Ruellan, Eric Clay, Nicholas Ascoli
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[3] arXiv:2507.23453 [pdf, html, other]
Title: Counterfactual Evaluation for Blind Attack Detection in LLM-based Evaluation Systems
Lijia Liu, Takumi Kondo, Kyohei Atarashi, Koh Takeuchi, Jiyi Li, Shigeru Saito, Hisashi Kashima
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[4] arXiv:2507.23229 [pdf, html, other]
Title: Fine-Grained Privacy Extraction from Retrieval-Augmented Generation Systems via Knowledge Asymmetry Exploitation
Yufei Chen, Yao Wang, Haibin Zhang, Tao Gu
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2507.23608 (cross-list from cs.CV) [pdf, html, other]
Title: Medical Image De-Identification Benchmark Challenge
Linmin Pei, Granger Sutton, Michael Rutherford, Ulrike Wagner, Tracy Nolan, Kirk Smith, Phillip Farmer, Peter Gu, Ambar Rana, Kailing Chen, Thomas Ferleman, Brian Park, Ye Wu, Jordan Kojouharov, Gargi Singh, Jon Lemon, Tyler Willis, Milos Vukadinovic, Grant Duffy, Bryan He, David Ouyang, Marco Pereanez, Daniel Samber, Derek A. Smith, Christopher Cannistraci, Zahi Fayad, David S. Mendelson, Michele Bufano, Elmar Kotter, Hamideh Haghiri, Rajesh Baidya, Stefan Dvoretskii, Klaus H. Maier-Hein, Marco Nolden, Christopher Ablett, Silvia Siggillino, Sandeep Kaushik, Hongzhu Jiang, Sihan Xie, Zhiyu Wan, Alex Michie, Simon J Doran, Angeline Aurelia Waly, Felix A. Nathaniel Liang, Humam Arshad Mustagfirin, Michelle Grace Felicia, Kuo Po Chih, Rahul Krish, Ghulam Rasool, Nidhal Bouaynaya, Nikolas Koutsoubis, Kyle Naddeo, Kartik Pandit, Tony O'Sullivan, Raj Krish, Qinyan Pan, Scott Gustafson, Benjamin Kopchick, Laura Opsahl-Ong, Andrea Olvera-Morales, Jonathan Pinney, Kathryn Johnson, Theresa Do, Juergen Klenk, Maria Diaz, Arti Singh, Rong Chai, David A. Clunie, Fred Prior, Keyvan Farahani
Comments: 19 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[6] arXiv:2507.23432 (cross-list from cs.DS) [pdf, html, other]
Title: Scalable contribution bounding to achieve privacy
Vincent Cohen-Addad, Alessandro Epasto, Jason Lee, Morteza Zadimoghaddam
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[7] arXiv:2507.23002 (cross-list from cs.GR) [pdf, html, other]
Title: Noise-Coded Illumination for Forensic and Photometric Video Analysis
Peter F. Michael, Zekun Hao, Serge Belongie, Abe Davis
Comments: ACM Transactions on Graphics (2025), presented at SIGGRAPH 2025
Journal-ref: ACM Trans. Graph. 44, 5, Article 165 (October 2025), 16 pages
Subjects: Graphics (cs.GR); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)

Thu, 31 Jul 2025 (showing 26 of 26 entries )

[8] arXiv:2507.22772 [pdf, html, other]
Title: Empirical Evaluation of Concept Drift in ML-Based Android Malware Detection
Ahmed Sabbah, Radi Jarrar, Samer Zein, David Mohaisen
Comments: 18 pages, 12 tables, 14 figures, paper under review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[9] arXiv:2507.22674 [pdf, html, other]
Title: Cryptanalysis of LC-MUME: A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices
Ramprasad Sarkar
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:2507.22617 [pdf, html, other]
Title: Hate in Plain Sight: On the Risks of Moderating AI-Generated Hateful Illusions
Yiting Qu, Ziqing Yang, Yihan Ma, Michael Backes, Savvas Zannettou, Yang Zhang
Comments: Accepted at ICCV 2025
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[11] arXiv:2507.22611 [pdf, html, other]
Title: DoS Attacks and Defense Technologies in Blockchain Systems: A Hierarchical Analysis
Chunyi Zhang, Fengjiao Dou, Xiaoqi Li
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:2507.22447 [pdf, other]
Title: Breaking Obfuscation: Cluster-Aware Graph with LLM-Aided Recovery for Malicious JavaScript Detection
Zhihong Liang, Xin Wang, Zhenhuang Hu, Liangliang Song, Lin Chen, Jingjing Guo, Yanbin Wang, Ye Tian
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[13] arXiv:2507.22371 [pdf, html, other]
Title: SAEL: Leveraging Large Language Models with Adaptive Mixture-of-Experts for Smart Contract Vulnerability Detection
Lei Yu, Shiqi Cheng, Zhirong Huang, Jingyuan Zhang, Chenjie Shen, Junyi Lu, Li Yang, Fengjun Zhang, Jiajia Ma
Comments: Accepted to ICSME 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[14] arXiv:2507.22347 [pdf, html, other]
Title: Benchmarking Fraud Detectors on Private Graph Data
Alexander Goldberg, Giulia Fanti, Nihar Shah, Zhiwei Steven Wu
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:2507.22306 [pdf, html, other]
Title: SleepWalk: Exploiting Context Switching and Residual Power for Physical Side-Channel Attacks
Sahan Sanjaya, Aruna Jayasena, Prabhat Mishra
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:2507.22304 [pdf, html, other]
Title: Invisible Injections: Exploiting Vision-Language Models Through Steganographic Prompt Embedding
Chetan Pathade
Comments: 14 Pages
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:2507.22239 [pdf, html, other]
Title: Large Language Model-Based Framework for Explainable Cyberattack Detection in Automatic Generation Control Systems
Muhammad Sharshar, Ahmad Mohammad Saber, Davor Svetinovic, Amr M. Youssef, Deepa Kundur, Ehab F. El-Saadany
Comments: Accepted Publication
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Systems and Control (eess.SY)
[18] arXiv:2507.22231 [pdf, html, other]
Title: Understanding Concept Drift with Deprecated Permissions in Android Malware Detection
Ahmed Sabbah, Radi Jarrar, Samer Zein, David Mohaisen
Comments: 13 pages, 9 figures, 5 tables, under review
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[19] arXiv:2507.22177 [pdf, html, other]
Title: POLARIS: Explainable Artificial Intelligence for Mitigating Power Side-Channel Leakage
Tanzim Mahfuz, Sudipta Paria, Tasneem Suha, Swarup Bhunia, Prabuddha Chakraborty
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:2507.22171 [pdf, other]
Title: Enhancing Jailbreak Attacks on LLMs via Persona Prompts
Zheng Zhang, Peilin Zhao, Deheng Ye, Hao Wang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[21] arXiv:2507.22165 [pdf, html, other]
Title: Programmable Data Planes for Network Security
Gursimran Singh, H.B. Acharya, Minseok Kwon
Comments: 17th International Conference on Networks & Communications (NeTCoM 2025)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[22] arXiv:2507.22160 [pdf, html, other]
Title: Strategic Deflection: Defending LLMs from Logit Manipulation
Yassine Rachidy, Jihad Rbaiti, Youssef Hmamouche, Faissal Sehbaoui, Amal El Fallah Seghrouchni
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[23] arXiv:2507.22133 [pdf, html, other]
Title: Prompt Optimization and Evaluation for LLM Automated Red Teaming
Michael Freenor, Lauren Alvarez, Milton Leal, Lily Smith, Joel Garrett, Yelyzaveta Husieva, Madeline Woodruff, Ryan Miller, Erich Kummerfeld, Rafael Medeiros, Sander Schulhoff
Comments: 9 pages, 5 Figures, and 1 Appendix item
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[24] arXiv:2507.22535 (cross-list from quant-ph) [pdf, other]
Title: Scalable and (quantum-accessible) adaptive pseudorandom quantum states and pseudorandom function-like quantum state generators
Rishabh Batra, Zhili Chen, Rahul Jain, YaoNan Zhang
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[25] arXiv:2507.22309 (cross-list from cs.CE) [pdf, html, other]
Title: Cycles Protocol: A Peer-to-Peer Electronic Clearing System
Ethan Buchman, Paolo Dini, Shoaib Ahmed, Andrew Miller, Tomaž Fleischman
Comments: 28 pages, 15 figures
Subjects: Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR); Theoretical Economics (econ.TH)
[26] arXiv:2507.22265 (cross-list from cs.CC) [pdf, html, other]
Title: Cell-Probe Lower Bounds via Semi-Random CSP Refutation: Simplified and the Odd-Locality Case
Venkatesan Guruswami, Xin Lyu, Weiqiang Yuan
Comments: Comments welcome
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[27] arXiv:2507.22226 (cross-list from eess.SY) [pdf, html, other]
Title: Optimal Planning for Enhancing the Resilience of Modern Distribution Systems Against Cyberattacks
Armita Khashayardoost, Ahmad Mohammad Saber, Deepa Kundur
Comments: Accepted Publication
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[28] arXiv:2507.22153 (cross-list from cs.HC) [pdf, html, other]
Title: Towards Privacy-preserving Photorealistic Self-avatars in Mixed Reality
Ethan Wilson, Vincent Bindschaedler, Sophie Jörg, Sean Sheikholeslam, Kevin Butler, Eakta Jain
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[29] arXiv:2507.22140 (cross-list from quant-ph) [pdf, html, other]
Title: Evaluation of Noise and Crosstalk in Neutral Atom Quantum Computers
Pranet Sharma, Yizhuo Tan, Konstantinos-Nikolaos Papadopoulos, Jakub Szefer
Comments: 4 pages, 4 figures, IEEE QCE 2025, Q-CORE Workshop
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[30] arXiv:2507.22077 (cross-list from cs.MA) [pdf, other]
Title: From Cloud-Native to Trust-Native: A Protocol for Verifiable Multi-Agent Systems
Muyang Li
Comments: 14 pages, 2 figures. Vision paper and protocol blueprint. No prior submission or publication
Subjects: Multiagent Systems (cs.MA); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[31] arXiv:2507.22066 (cross-list from cs.SE) [pdf, html, other]
Title: CodableLLM: Automating Decompiled and Source Code Mapping for LLM Dataset Generation
Dylan Manuel, Paul Rad
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[32] arXiv:2507.22065 (cross-list from cs.SE) [pdf, html, other]
Title: Fuzzing: Randomness? Reasoning! Efficient Directed Fuzzing via Large Language Models
Xiaotao Feng, Xiaogang Zhu, Kun Hu, Jincheng Wang, Yingjie Cao, Guang Gong, Jianfeng Pan
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[33] arXiv:2507.18365 (cross-list from cs.IR) [pdf, other]
Title: RecPS: Privacy Risk Scoring for Recommender Systems
Jiajie He, Yuechun Gu, Keke Chen
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 30 Jul 2025 (showing first 17 of 46 entries )

[34] arXiv:2507.22037 [pdf, html, other]
Title: Secure Tug-of-War (SecTOW): Iterative Defense-Attack Training with Reinforcement Learning for Multimodal Model Security
Muzhi Dai, Shixuan Liu, Zhiyuan Zhao, Junyu Gao, Hao Sun, Xuelong Li
Comments: 10 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[35] arXiv:2507.21904 [pdf, html, other]
Title: Privacy-Preserving Anonymization of System and Network Event Logs Using Salt-Based Hashing and Temporal Noise
Shreyas Bargale, Akshit Vakati Venkata, Jaimandeep Singh, Chester Rebeiro
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:2507.21817 [pdf, other]
Title: Out of Distribution, Out of Luck: How Well Can LLMs Trained on Vulnerability Datasets Detect Top 25 CWE Weaknesses?
Yikun Li, Ngoc Tan Bui, Ting Zhang, Martin Weyssow, Chengran Yang, Xin Zhou, Jinfeng Jiang, Junkai Chen, Huihui Huang, Huu Hung Nguyen, Chiok Yew Ho, Jie Tan, Ruiyin Li, Yide Yin, Han Wei Ang, Frank Liauw, Eng Lieh Ouh, Lwin Khin Shar, David Lo
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[37] arXiv:2507.21731 [pdf, html, other]
Title: Modelling Arbitrary Computations in the Symbolic Model using an Equational Theory for Bounded Binary Circuits
Michiel Marcus, Frank Westers, Anne Nijsten
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:2507.21640 [pdf, html, other]
Title: GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection
Hyeong Seon Kim, Huy Kang Kim
Comments: Comments:12 pages, 3 figures, 3 tables; accepted to the 26th World Conference on Information Security Applications (WISA 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[39] arXiv:2507.21591 [pdf, html, other]
Title: Hierarchical Graph Neural Network for Compressed Speech Steganalysis
Mustapha Hemis, Hamza Kheddar, Mohamed Chahine Ghanem, Bachir Boudraa
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[40] arXiv:2507.21540 [pdf, html, other]
Title: PRISM: Programmatic Reasoning with Image Sequence Manipulation for LVLM Jailbreaking
Quanchen Zou, Zonghao Ying, Moyang Chen, Wenzhuo Xu, Yisong Xiao, Yakai Li, Deyue Zhang, Dongdong Yang, Zhao Liu, Xiangzheng Zhang
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[41] arXiv:2507.21538 [pdf, other]
Title: Can We End the Cat-and-Mouse Game? Simulating Self-Evolving Phishing Attacks with LLMs and Genetic Algorithms
Seiji Sato, Tetsushi Ohki, Masakatsu Nishigaki
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:2507.21483 [pdf, html, other]
Title: NCCR: to Evaluate the Robustness of Neural Networks and Adversarial Examples
Pu Shi
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[43] arXiv:2507.21412 [pdf, html, other]
Title: Cascading and Proxy Membership Inference Attacks
Yuntao Du, Jiacheng Li, Yuetian Chen, Kaiyuan Zhang, Zhizhen Yuan, Hanshen Xiao, Bruno Ribeiro, Ninghui Li
Comments: Our code is available at: this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[44] arXiv:2507.21398 [pdf, html, other]
Title: Digital identity management system with blockchain:An implementation with Ethereum and Ganache
André Davi Lopes, Tais Mello, Wesley dos Reis Bezerra
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:2507.21387 [pdf, other]
Title: Radio Adversarial Attacks on EMG-based Gesture Recognition Networks
Hongyi Xie
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:2507.21258 [pdf, html, other]
Title: Verification Cost Asymmetry in Cognitive Warfare: A Complexity-Theoretic Framework
Joshua Luberisse
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Computers and Society (cs.CY); Computer Science and Game Theory (cs.GT)
[47] arXiv:2507.21195 [pdf, html, other]
Title: MaXsive: High-Capacity and Robust Training-Free Generative Image Watermarking in Diffusion Models
Po-Yuan Mao, Cheng-Chang Tsai, Chun-Shien Lu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multimedia (cs.MM)
[48] arXiv:2507.21193 [pdf, other]
Title: Interpretable Anomaly-Based DDoS Detection in AI-RAN with XAI and LLMs
Sotiris Chatzimiltis, Mohammad Shojafar, Mahdi Boloursaz Mashhadi, Rahim Tafazolli
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[49] arXiv:2507.21182 [pdf, html, other]
Title: SDD: Self-Degraded Defense against Malicious Fine-tuning
Zixuan Chen, Weikai Lu, Xin Lin, Ziqian Zeng
Comments: Accepted by ACL2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[50] arXiv:2507.21181 [pdf, html, other]
Title: Mitigation of Social Media Platforms Impact on the Users
Smita Khapre, Sudhanshu Semwal
Comments: WSCG 2025 33. International Conference on Computer Graphics, Visualization and Computer Vision 2025
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Graphics (cs.GR)
Total of 120 entries : 1-50 51-100 101-120
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • Click here to contact arXiv Contact
  • Click here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack