Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2025

Total of 731 entries : 1-50 151-200 201-250 251-300 301-350 351-400 401-450 451-500 ... 701-731
Showing up to 50 entries per page: fewer | more | all
[301] arXiv:2506.12846 [pdf, html, other]
Title: VFEFL: Privacy-Preserving Federated Learning against Malicious Clients via Verifiable Functional Encryption
Nina Cai, Jinguang Han, Weizhi Meng
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[302] arXiv:2506.12880 [pdf, html, other]
Title: Universal Jailbreak Suffixes Are Strong Attention Hijackers
Matan Ben-Tov, Mor Geva, Mahmood Sharif
Subjects: Cryptography and Security (cs.CR)
[303] arXiv:2506.12883 [pdf, html, other]
Title: Cut Tracing with E-Graphs for Boolean FHE Circuit Synthesis
Julien de Castelnau, Mingfei Yu, Giovanni De Micheli
Comments: 7 pages, 5 figures, presented to EGRAPHS25 workshop, not in conference proceedings
Subjects: Cryptography and Security (cs.CR)
[304] arXiv:2506.12995 [pdf, html, other]
Title: Open Source, Open Threats? Investigating Security Challenges in Open-Source Software
Seyed Ali Akhavani, Behzad Ousat, Amin Kharraz
Subjects: Cryptography and Security (cs.CR)
[305] arXiv:2506.13009 [pdf, html, other]
Title: Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective
Nima Naderloui, Shenao Yan, Binghui Wang, Jie Fu, Wendy Hui Wang, Weiran Liu, Yuan Hong
Comments: To appear in USENIX Security '25
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[306] arXiv:2506.13024 [pdf, html, other]
Title: Position: Certified Robustness Does Not (Yet) Imply Model Security
Andrew C. Cullen, Paul Montague, Sarah M. Erfani, Benjamin I.P. Rubinstein
Comments: 9 pages, ICML, 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[307] arXiv:2506.13052 [pdf, html, other]
Title: Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions
Steven Su, Erik Rye, Dave Levin, Robert Beverly
Subjects: Cryptography and Security (cs.CR)
[308] arXiv:2506.13090 [pdf, html, other]
Title: Detecting Hard-Coded Credentials in Software Repositories via LLMs
Chidera Biringa, Gokhan Kul
Comments: Accepted to the ACM Digital Threats: Research and Practice (DTRAP)
Subjects: Cryptography and Security (cs.CR)
[309] arXiv:2506.13161 [pdf, html, other]
Title: Using LLMs for Security Advisory Investigations: How Far Are We?
Bayu Fedra Abdullah, Yusuf Sulistyo Nugroho, Brittany Reid, Raula Gaikovina Kula, Kazumasa Shimari, Kenichi Matsumoto
Comments: 6 pages, 6 figures, 8 tables, conference paper
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[310] arXiv:2506.13170 [pdf, html, other]
Title: Dual Protection Ring: User Profiling Via Differential Privacy and Service Dissemination Through Private Information Retrieval
Imdad Ullah, Najm Hassan, Tariq Ahamed Ahangar, Zawar Hussain Shah, Mehregan Mahdavi, Andrew Levula
Subjects: Cryptography and Security (cs.CR)
[311] arXiv:2506.13205 [pdf, html, other]
Title: Poison Once, Control Anywhere: Clean-Text Visual Backdoors in VLM-based Mobile Agents
Xuan Wang, Siyuan Liang, Zhe Liu, Yi Yu, Aishan Liu, Yuliang Lu, Xitong Gao, Ee-Chien Chang
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[312] arXiv:2506.13246 [pdf, html, other]
Title: On Immutable Memory Systems for Artificial Agents: A Blockchain-Indexed Automata-Theoretic Framework Using ECDH-Keyed Merkle Chains
Craig Steven Wright
Comments: 47 pages, includes formal automata specifications, cryptographic constructions, and epistemic architecture schema
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[313] arXiv:2506.13261 [pdf, html, other]
Title: Building Automotive Security on Internet Standards: An Integration of DNSSEC, DANE, and DANCE to Authenticate and Authorize In-Car Services
Timo Salomon, Mehmet Mueller, Philipp Meyer, Thomas C. Schmidt
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[314] arXiv:2506.13323 [pdf, html, other]
Title: Tady: A Neural Disassembler without Structural Constraint Violations
Siliang Qin, Fengrui Yang, Hao Wang, Bolun Zhang, Zeyu Gao, Chao Zhang, Kai Chen
Comments: Usenix Security'25
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Software Engineering (cs.SE)
[315] arXiv:2506.13360 [pdf, html, other]
Title: The Rich Get Richer in Bitcoin Mining Induced by Blockchain Forks
Akira Sakurai, Kazuyuki Shudo
Subjects: Cryptography and Security (cs.CR)
[316] arXiv:2506.13418 [pdf, html, other]
Title: New characterization of full weight spectrum one-orbit cyclic subspace codes
Minjia Shi, Wenhao Song
Subjects: Cryptography and Security (cs.CR)
[317] arXiv:2506.13434 [pdf, html, other]
Title: From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs
Alsharif Abuadbba, Chris Hicks, Kristen Moore, Vasilios Mavroudis, Burak Hasircioglu, Diksha Goel, Piers Jennings
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR)
[318] arXiv:2506.13494 [pdf, html, other]
Title: Watermarking LLM-Generated Datasets in Downstream Tasks
Yugeng Liu, Tianshuo Cong, Michael Backes, Zheng Li, Yang Zhang
Subjects: Cryptography and Security (cs.CR)
[319] arXiv:2506.13563 [pdf, other]
Title: Unlearning-Enhanced Website Fingerprinting Attack: Against Backdoor Poisoning in Anonymous Networks
Yali Yuan, Kai Xu, Ruolin Ma, Yuchen Zhang
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[320] arXiv:2506.13612 [pdf, html, other]
Title: EBS-CFL: Efficient and Byzantine-robust Secure Clustered Federated Learning
Zhiqiang Li, Haiyong Bao, Menghong Guan, Hao Pan, Cheng Huang, Hong-Ning Dai
Comments: Accepted by AAAI 25
Journal-ref: Proceedings of the AAAI Conference on Artificial Intelligence, 39(17), 18593-18601, 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[321] arXiv:2506.13737 [pdf, html, other]
Title: ExtendAttack: Attacking Servers of LRMs via Extending Reasoning
Zhenhao Zhu, Yue Liu, Yingwei Ma, Hongcheng Gao, Nuo Chen, Yanpei Guo, Wenjie Qu, Huiying Xu, Xinzhong Zhu, Jiaheng Zhang
Subjects: Cryptography and Security (cs.CR)
[322] arXiv:2506.13746 [pdf, html, other]
Title: Evaluating Large Language Models for Phishing Detection, Self-Consistency, Faithfulness, and Explainability
Shova Kuikel, Aritran Piplai, Palvi Aggarwal
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[323] arXiv:2506.13895 [pdf, html, other]
Title: A Dual-Layer Image Encryption Framework Using Chaotic AES with Dynamic S-Boxes and Steganographic QR Codes
Md Rishadul Bayesh, Dabbrata Das, Md Ahadullah
Comments: 24 pages (including references), 14 figures. Submitted to a journal for publication
Subjects: Cryptography and Security (cs.CR)
[324] arXiv:2506.14057 [pdf, html, other]
Title: SoK: Advances and Open Problems in Web Tracking
Yash Vekaria (1), Yohan Beugin (2), Shaoor Munir (1), Gunes Acar (3), Nataliia Bielova (4), Steven Englehardt (5), Umar Iqbal (6), Alexandros Kapravelos (7), Pierre Laperdrix (8), Nick Nikiforakis (9), Jason Polakis (10), Franziska Roesner (11), Zubair Shafiq (1), Sebastian Zimmeck (12) ((1) University of California Davis, USA, (2) University of Wisconsin-Madison, USA, (3) Radboud University, Netherlands, (4) Inria Centre at Universite Cote d'Azur, France, (5) Independent Researcher, USA, (6) Washington University in St. Louis, USA, (7) North Carolina State University, USA, (8) Centre National de la Recherche Scientifique, France, (9) Stony Brook University, USA, (10) University of Illinois Chicago, USA, (11) University of Washington, USA, (12) Wesleyan University, USA)
Comments: Extended Version is available at: this https URL
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[325] arXiv:2506.14124 [pdf, other]
Title: From Permissioned to Proof-of-Stake Consensus
Jovan Komatovic, Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Ertem Nusret Tas
Subjects: Cryptography and Security (cs.CR)
[326] arXiv:2506.14323 [pdf, html, other]
Title: Vulnerability Disclosure or Notification? Best Practices for Reaching Stakeholders at Scale
Ting-Han Chen, Jeroen van der Ham-de Vos
Comments: 18 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[327] arXiv:2506.14337 [pdf, html, other]
Title: LLM-Powered Intent-Based Categorization of Phishing Emails
Even Eilertsen, Vasileios Mavroeidis, Gudmund Grov
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[328] arXiv:2506.14340 [pdf, html, other]
Title: Quantum Enhanced Entropy Pool for Cryptographic Applications and Proofs
Buniechukwu Njoku, Sonai Biswas, Milad Ghadimi, Mohammad Shojafar, Gabriele Gradoni, Riccardo Bassoli, Frank H. P. Fitzek
Comments: 6 pages, 6 figures, Conference: IEEE Future Networks World Forum 2024
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[329] arXiv:2506.14374 [pdf, other]
Title: Excessive Reasoning Attack on Reasoning LLMs
Wai Man Si, Mingjie Li, Michael Backes, Yang Zhang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[330] arXiv:2506.14393 [pdf, other]
Title: Consensus Power Inequality: A Comparative Study of Blockchain Networks
Kamil Tylinski, Abylay Satybaldy, Paolo Tasca
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[331] arXiv:2506.14466 [pdf, html, other]
Title: MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem
Xingan Gao, Xiaobing Sun, Sicong Cao, Kaifeng Huang, Di Wu, Xiaolei Liu, Xingwei Lin, Yang Xiang
Subjects: Cryptography and Security (cs.CR)
[332] arXiv:2506.14489 [pdf, html, other]
Title: ReDASH: Fast and efficient Scaling in Arithmetic Garbled Circuits for Secure Outsourced Inference
Felix Maurer, Jonas Sander, Thomas Eisenbarth
Subjects: Cryptography and Security (cs.CR)
[333] arXiv:2506.14566 [pdf, html, other]
Title: Anonymous Authentication using Attribute-based Encryption
Nouha Oualha
Subjects: Cryptography and Security (cs.CR)
[334] arXiv:2506.14576 [pdf, html, other]
Title: SoK: Privacy-Enhancing Technologies in Artificial Intelligence
Nouha Oualha
Subjects: Cryptography and Security (cs.CR)
[335] arXiv:2506.14582 [pdf, html, other]
Title: Busting the Paper Ballot: Voting Meets Adversarial Machine Learning
Kaleel Mahmood, Caleb Manicke, Ethan Rathbun, Aayushi Verma, Sohaib Ahmad, Nicholas Stamatakis, Laurent Michel, Benjamin Fuller
Comments: 18 Pages. Author version of article to appear at CCS 2025
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[336] arXiv:2506.14682 [pdf, html, other]
Title: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models
Ads Dawson, Rob Mulla, Nick Landers, Shane Caldwell
Comments: 43 pages, 13 figures, 16 tables
Subjects: Cryptography and Security (cs.CR)
[337] arXiv:2506.14697 [pdf, html, other]
Title: AGENTSAFE: Benchmarking the Safety of Embodied Agents on Hazardous Instructions
Aishan Liu, Zonghao Ying, Le Wang, Junjie Mu, Jinyang Guo, Jiakai Wang, Yuqing Ma, Siyuan Liang, Mingchuan Zhang, Xianglong Liu, Dacheng Tao
Comments: MAS@ICML 2025 camera ready
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[338] arXiv:2506.14913 [pdf, html, other]
Title: Winter Soldier: Backdooring Language Models at Pre-Training with Indirect Data Poisoning
Wassim Bouaziz, Mathurin Videau, Nicolas Usunier, El-Mahdi El-Mhamdi
Comments: 18 pages, 12 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[339] arXiv:2506.14944 [pdf, html, other]
Title: Fair Data Exchange at Near-Plaintext Efficiency
Majid Khabbazian
Comments: Revision notes. This version significantly reduces communication overhead and proof-generation/verification time compared to the previous draft, bringing fair data exchange to near-plaintext speed and size
Subjects: Cryptography and Security (cs.CR)
[340] arXiv:2506.14964 [pdf, html, other]
Title: Narrowing the Gap between TEEs Threat Model and Deployment Strategies
Filip Rezabek, Jonathan Passerat-Palmbach, Moe Mahhouk, Frieder Erdmann, Andrew Miller
Subjects: Cryptography and Security (cs.CR)
[341] arXiv:2506.15018 [pdf, html, other]
Title: Private Continual Counting of Unbounded Streams
Ben Jacobsen, Kassem Fawaz
Comments: 12 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[342] arXiv:2506.15028 [pdf, other]
Title: Systems-Theoretic and Data-Driven Security Analysis in ML-enabled Medical Devices
Gargi Mitra, Mohammadreza Hallajiyan, Inji Kim, Athish Pranav Dharmalingam, Mohammed Elnawawy, Shahrear Iqbal, Karthik Pattabiraman, Homa Alemzadeh
Comments: 32 pages, 6 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
[343] arXiv:2506.15034 [pdf, other]
Title: MECHA: Multithreaded and Efficient Cryptographic Hardware Access
Pratama Derry, Laksmono Agus Mahardika Ari, Iqbal Muhammad, Howon Kim
Comments: 4 Page
Subjects: Cryptography and Security (cs.CR)
[344] arXiv:2506.15043 [pdf, other]
Title: Advanced Prediction of Hypersonic Missile Trajectories with CNN-LSTM-GRU Architectures
Amir Hossein Baradaran
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[345] arXiv:2506.15070 [pdf, html, other]
Title: Toward a Lightweight, Scalable, and Parallel Secure Encryption Engine
Rasha Karakchi, Rye Stahle-Smith, Nishant Chinnasami, Tiffany Yu
Comments: This is submitted to the ACM/IEEE Symposium on Edge Computing (SEC 2025)
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[346] arXiv:2506.15075 [pdf, html, other]
Title: CWGAN-GP Augmented CAE for Jamming Detection in 5G-NR in Non-IID Datasets
Samhita Kuili, Mohammadreza Amini, Burak Kantarci
Comments: 6 pages, 5 figures, Accepted to IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2025
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[347] arXiv:2506.15093 [pdf, other]
Title: Flexible Hardware-Enabled Guarantees for AI Compute
James Petrie, Onni Aarne, Nora Ammann, David Dalrymple
Subjects: Cryptography and Security (cs.CR)
[348] arXiv:2506.15100 [pdf, other]
Title: International Security Applications of Flexible Hardware-Enabled Guarantees
Onni Aarne, James Petrie
Subjects: Cryptography and Security (cs.CR)
[349] arXiv:2506.15102 [pdf, html, other]
Title: EVA-S2PMLP: Secure and Scalable Two-Party MLP via Spatial Transformation
Shizhao Peng, Shoumo Li, Tianle Tao
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[350] arXiv:2506.15112 [pdf, html, other]
Title: PDLRecover: Privacy-preserving Decentralized Model Recovery with Machine Unlearning
Xiangman Li, Xiaodong Wu, Jianbing Ni, Mohamed Mahmoud, Maazen Alsabaan
Subjects: Cryptography and Security (cs.CR)
Total of 731 entries : 1-50 151-200 201-250 251-300 301-350 351-400 401-450 451-500 ... 701-731
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack