Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for July 2025

Total of 616 entries : 1-25 26-50 51-75 76-100 101-125 126-150 ... 601-616
Showing up to 25 entries per page: fewer | more | all
[51] arXiv:2507.02959 [pdf, html, other]
Title: A Novel Active Learning Approach to Label One Million Unknown Malware Variants
Ahmed Bensaoud, Jugal Kalita
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[52] arXiv:2507.02968 [pdf, html, other]
Title: Unveiling Privacy Policy Complexity: An Exploratory Study Using Graph Mining, Machine Learning, and Natural Language Processing
Vijayalakshmi Ramasamy, Seth Barrett, Gokila Dorai, Jessica Zumbach
Comments: 7 Pages; 1 Algorithm; 1 Table; 2 Figures; Accepted by AIRC 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[53] arXiv:2507.02969 [pdf, html, other]
Title: Reinforcement Learning for Automated Cybersecurity Penetration Testing
Daniel López-Montero, José L. Álvarez-Aldana, Alicia Morales-Martínez, Marta Gil-López, Juan M. Auñón García
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[54] arXiv:2507.02971 [pdf, html, other]
Title: Aim High, Stay Private: Differentially Private Synthetic Data Enables Public Release of Behavioral Health Information with High Utility
Mohsen Ghasemizade, Juniper Lovato, Christopher M. Danforth, Peter Sheridan Dodds, Laura S. P. Bloomfield, Matthew Price, Team LEMURS, Joseph P. Near
Comments: 14 pages, 8 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[55] arXiv:2507.02976 [pdf, html, other]
Title: Are AI-Generated Fixes Secure? Analyzing LLM and Agent Patches on SWE-bench
Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[56] arXiv:2507.03000 [pdf, html, other]
Title: Deterministic Cryptographic Seed Generation via Cyclic Modular Inversion over $\mathbb{Z}/3^p\mathbb{Z}$
Michael A. Idowu
Comments: 29 pages, 13 figures, 13 tables. Includes entropy analysis, symbolic residue formulation, empirical validation, and benchmarking against NIST-recommended DRBG frameworks
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[57] arXiv:2507.03014 [pdf, html, other]
Title: Intrinsic Fingerprint of LLMs: Continue Training is NOT All You Need to Steal A Model!
Do-hyeon Yoon, Minsoo Chun, Thomas Allen, Hans Müller, Min Wang, Rajesh Sharma
Comments: This paper flags a potential case of model plagiarism, copyright violation, and information fabrication in arXiv:2505.21411
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[58] arXiv:2507.03021 [pdf, html, other]
Title: A Multi-Resolution Dynamic Game Framework for Cross-Echelon Decision-Making in Cyber Warfare
Ya-Ting Yang, Quanyan Zhu
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[59] arXiv:2507.03051 [pdf, html, other]
Title: Improving LLM Reasoning for Vulnerability Detection via Group Relative Policy Optimization
Marco Simoni, Aleksandar Fontana, Giulio Rossolini, Andrea Saracino
Comments: Under Review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[60] arXiv:2507.03064 [pdf, html, other]
Title: LLM-Driven Auto Configuration for Transient IoT Device Collaboration
Hetvi Shastri, Walid A. Hanafy, Li Wu, David Irwin, Mani Srivastava, Prashant Shenoy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[61] arXiv:2507.03136 [pdf, html, other]
Title: Holographic Projection and Cyber Attack Surface: A Physical Analogy for Digital Security
Ricardo Queiroz de Araujo Fernandes, Anderson Santos, Daniel Maier de Carvalho, André Luiz Bandeira Molina
Comments: The paper was produced to base a presentation in the V Jornadas STIC capitulo Panamá
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[62] arXiv:2507.03236 [pdf, html, other]
Title: On Jailbreaking Quantized Language Models Through Fault Injection Attacks
Noureldin Zahran, Ahmad Tahmasivand, Ihsen Alouani, Khaled Khasawneh, Mohammed E. Fouda
Comments: This work has been published in GLSVLSI 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[63] arXiv:2507.03258 [pdf, html, other]
Title: Novel Blockchain-based Protocols for Electronic Voting and Auctions
Zhaorun Lin
Comments: My thesis for MPhil at HKUST
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[64] arXiv:2507.03278 [pdf, html, other]
Title: Securing Transformer-based AI Execution via Unified TEEs and Crypto-protected Accelerators
Jiaqi Xue, Yifei Zhao, Mengxin Zheng, Fan Yao, Yan Solihin, Qian Lou
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[65] arXiv:2507.03323 [pdf, html, other]
Title: A Note on Single-Cut Full-Open Protocols
Kazumasa Shinagawa, Koji Nuida
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:2507.03344 [pdf, other]
Title: Securing Mixed Rust with Hardware Capabilities
Jason Zhijingcheng Yu, Fangqi Han, Kaustab Choudhury, Trevor E. Carlson, Prateek Saxena
Comments: To appear at CCS '25
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[67] arXiv:2507.03361 [pdf, html, other]
Title: Scalable Differentially Private Sketches under Continual Observation
Rayne Holland
Comments: 24 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:2507.03387 [pdf, html, other]
Title: Breaking the Bulkhead: Demystifying Cross-Namespace Reference Vulnerabilities in Kubernetes Operators
Andong Chen, Zhaoxuan Jin, Ziyi Guo, Yan Chen
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:2507.03450 [pdf, html, other]
Title: Evaluating the Evaluators: Trust in Adversarial Robustness Tests
Antonio Emanuele Cinà, Maura Pintor, Luca Demetrio, Ambra Demontis, Battista Biggio, Fabio Roli
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[70] arXiv:2507.03607 [pdf, html, other]
Title: VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification
Cédric Bonhomme, Alexandre Dulaunoy
Comments: This paper is a preprint for the 25V4C-TC: 2025 Vulnerability Forecasting Technical Colloquia. Darwin College Cambridge, UK, September 25-26, 2025
Subjects: Cryptography and Security (cs.CR)
[71] arXiv:2507.03619 [pdf, html, other]
Title: Blackbox Dataset Inference for LLM
Ruikai Zhou, Kang Yang, Xun Chen, Wendy Hui Wang, Guanhong Tao, Jun Xu
Subjects: Cryptography and Security (cs.CR)
[72] arXiv:2507.03636 [pdf, html, other]
Title: SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts
Xiaodong Wu, Xiangman Li, Qi Li, Jianbing Ni, Rongxing Lu
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[73] arXiv:2507.03646 [pdf, html, other]
Title: When There Is No Decoder: Removing Watermarks from Stable Diffusion Models in a No-box Setting
Xiaodong Wu, Tianyi Tang, Xiangman Li, Jianbing Ni, Yong Yu
Comments: arXiv admin note: text overlap with arXiv:2408.02035
Subjects: Cryptography and Security (cs.CR)
[74] arXiv:2507.03694 [pdf, html, other]
Title: Willchain: Decentralized, Privacy-Preserving, Self-Executing, Digital Wills
Jovonni L. PHarr
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE); Emerging Technologies (cs.ET)
[75] arXiv:2507.03773 [pdf, other]
Title: RVISmith: Fuzzing Compilers for RVV Intrinsics
Yibo He, Cunjian Huang, Xianmiao Qu, Hongdeng Chen, Wei Yang, Tao Xie
Comments: To appear in ACM CCS 2025
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Programming Languages (cs.PL); Software Engineering (cs.SE)
Total of 616 entries : 1-25 26-50 51-75 76-100 101-125 126-150 ... 601-616
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack