Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for recent submissions

  • Fri, 4 Jul 2025
  • Thu, 3 Jul 2025
  • Wed, 2 Jul 2025
  • Tue, 1 Jul 2025
  • Mon, 30 Jun 2025

See today's new changes

Total of 139 entries : 1-25 26-50 51-75 76-100 ... 126-139
Showing up to 25 entries per page: fewer | more | all

Fri, 4 Jul 2025 (showing first 25 of 26 entries )

[1] arXiv:2507.02770 [pdf, html, other]
Title: NVIDIA GPU Confidential Computing Demystified
Zhongshu Gu, Enriquillo Valdez, Salman Ahmed, Julian James Stephen, Michael Le, Hani Jamjoom, Shixuan Zhao, Zhiqiang Lin
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:2507.02737 [pdf, html, other]
Title: Early Signs of Steganographic Capabilities in Frontier LLMs
Artur Zolkowski, Kei Nishimura-Gasparian, Robert McCarthy, Roland S. Zimmermann, David Lindner
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[3] arXiv:2507.02735 [pdf, html, other]
Title: Meta SecAlign: A Secure Foundation LLM Against Prompt Injection Attacks
Sizhe Chen, Arman Zharmagambetov, David Wagner, Chuan Guo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[4] arXiv:2507.02727 [pdf, html, other]
Title: Quantifying Classifier Utility under Local Differential Privacy
Ye Zheng, Yidan Hu
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2507.02699 [pdf, html, other]
Title: Control at Stake: Evaluating the Security Landscape of LLM-Driven Email Agents
Jiangrong Wu, Yuhong Nan, Jianliang Wu, Zitong Yao, Zibin Zheng
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:2507.02635 [pdf, html, other]
Title: SAT-BO: Verification Rule Learning and Optimization for FraudTransaction Detection
Mao Luo, Zhi Wang, Yiwen Huang, Qingyun Zhang, Zhouxing Su, Zhipeng Lv, Wen Hu, Jianguo Li
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[7] arXiv:2507.02607 [pdf, html, other]
Title: Alleviating Attack Data Scarcity: SCANIA's Experience Towards Enhancing In-Vehicle Cyber Security Measures
Frida Sundfeldt, Bianca Widstam, Mahshid Helali Moghadam, Kuo-Yun Liang, Anders Vesterberg
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[8] arXiv:2507.02536 [pdf, html, other]
Title: Real-Time Monitoring and Transparency in Pizza Production Using IoT and Blockchain
Azmat Ullah, Maria Ilaria Lunesu, Lodovica Marchesi, Roberto Tonelli
Comments: 2 pages
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[9] arXiv:2507.02489 [pdf, other]
Title: A 10-bit S-box generated by Feistel construction from cellular automata
Thomas Prévost (I3S), Bruno Martin (I3S)
Journal-ref: AUTOMATA 2025, Jun 2025, Lille, France
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:2507.02478 [pdf, html, other]
Title: Effectively Identifying Wi-Fi Devices through State Transitions
Melissa Safari, Abhishek K. Mishra, Mathieu Cunche
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2507.02424 [pdf, html, other]
Title: CyberRAG: An agentic RAG cyber attack classification and reporting tool
Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[12] arXiv:2507.02390 [pdf, html, other]
Title: Evaluating Language Models For Threat Detection in IoT Security Logs
Jorge J. Tejero-Fernández, Alfonso Sánchez-Macián
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[13] arXiv:2507.02332 [pdf, other]
Title: PII Jailbreaking in LLMs via Activation Steering Reveals Personal Information Leakage
Krishna Kanth Nakka, Xue Jiang, Xuebing Zhou
Comments: Preprint
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:2507.02309 [pdf, html, other]
Title: Rethinking Broken Object Level Authorization Attacks Under Zero Trust Principle
Anbin Wu (1), Zhiyong Feng (1), Ruitao Feng (2) ((1) The College of Intelligence and Computing, Tianjin University, (2) The Southern Cross University)
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:2507.02281 [pdf, html, other]
Title: Linearly Homomorphic Ring Signature Scheme over Lattices
Heng Guo, Kun Tian, Fengxia Liu, Zhiyong Zheng
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:2507.02206 [pdf, html, other]
Title: EIM-TRNG: Obfuscating Deep Neural Network Weights with Encoding-in-Memory True Random Number Generator via RowHammer
Ranyang Zhou, Abeer Matar A. Almalky, Gamana Aragonda, Sabbir Ahmed, Filip Roth Trønnes-Christensen, Adnan Siraj Rakin, Shaahin Angizi
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[17] arXiv:2507.02181 [pdf, html, other]
Title: Extended c-differential distinguishers of full 9 and reduced-round Kuznyechik cipher
Pantelimon Stanica, Ranit Dutta, Bimal Mandal
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[18] arXiv:2507.02177 [pdf, html, other]
Title: ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space
Yan Long, Jiancong Cui, Yuqing Yang, Tobias Alam, Zhiqiang Lin, Kevin Fu
Journal-ref: WiSec 2025: 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:2507.02125 [pdf, other]
Title: Can Artificial Intelligence solve the blockchain oracle problem? Unpacking the Challenges and Possibilities
Giulio Caldarelli
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[20] arXiv:2507.02057 [pdf, html, other]
Title: MGC: A Compiler Framework Exploiting Compositional Blindness in Aligned LLMs for Malware Generation
Lu Yan, Zhuo Zhang, Xiangzhe Xu, Shengwei An, Guangyu Shen, Zhou Xuan, Xuan Chen, Xiangyu Zhang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[21] arXiv:2507.02850 (cross-list from cs.CL) [pdf, html, other]
Title: LLM Hypnosis: Exploiting User Feedback for Unauthorized Knowledge Injection to All Users
Almog Hilel, Idan Shenfeld, Leshem Choshen, Jacob Andreas
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22] arXiv:2507.02844 (cross-list from cs.CV) [pdf, html, other]
Title: Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context Injection
Ziqi Miao, Yi Ding, Lijun Li, Jing Shao
Comments: 16 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[23] arXiv:2507.02622 (cross-list from quant-ph) [pdf, html, other]
Title: Access Control Threatened by Quantum Entanglement
Zhicheng Zhang, Mingsheng Ying
Comments: 23 pages, 10 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[24] arXiv:2507.02606 (cross-list from cs.SD) [pdf, html, other]
Title: De-AntiFake: Rethinking the Protective Perturbations Against Voice Cloning Attacks
Wei Fan, Kejiang Chen, Chang Liu, Weiming Zhang, Nenghai Yu
Comments: Accepted by ICML 2025
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[25] arXiv:2507.02414 (cross-list from cs.CV) [pdf, html, other]
Title: Privacy-preserving Preselection for Face Identification Based on Packing
Rundong Xin, Taotao Wang, Jin Wang, Chonghe Zhao, Jing Wang
Comments: This paper has been accepted for publication in SecureComm 2025
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
Total of 139 entries : 1-25 26-50 51-75 76-100 ... 126-139
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack