2025-08-12 11:32:13
Obfuscated Quantum and Post-Quantum Cryptography
Anju Rani, Xiaoyu Ai, Aman Gupta, Ravi Singh Adhikari, Robert Malaney
https://arxiv.org/abs/2508.07635 https://
Obfuscated Quantum and Post-Quantum Cryptography
Anju Rani, Xiaoyu Ai, Aman Gupta, Ravi Singh Adhikari, Robert Malaney
https://arxiv.org/abs/2508.07635 https://
from my link log —
Ascon lightweight cryptography.
https://ascon.isec.tugraz.at/
saved 2025-08-13 https://dotat.at/:/0C8XF.html
Had a lovely evening while playing an experimental board game on post-quantum #cryptography with people from Tampere University, the OpenSSL Foundation and Cybernetica.
A fitting end for the 2025 #OpenSSL Conference.
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Robustness of Locally Differentially Private Graph Analysis Against Poisoning
Jacob Imola, Amrita Roy Chowdhury, Kamalika Chaudhuri
Deep holes of a class of twisted Reed-Solomon codes
Haojie Gu, Nan Wang, Jun Zhang
https://arxiv.org/abs/2509.08526 https://arxiv.org/pdf/2509.08526…
I think the best summary until now about Post-quantum cryptography is from Peter Gutmann in the cryptography mailing-list.
Given that after 20 years and hundreds of millions of dollars spent researchers have yet to demonstrate a single legitimate cryptanalysis result using a quantum physics experiment, it's a bit like arguing over which brand of unicorn repellent is the most cromulent.
The current state of things in terms of pure vs. hybrid systems seems to be:
- …
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Hammer and Anvil: A Principled Defense Against Backdoors in Federated Learning
Lucas Fenaux, Zheng Wang, Jacob Yan, Nathan Chung, Florian Kerschbaum
Analyzing the capabilities of HLS and RTL tools in the design of an FPGA Montgomery Multiplier
Rares Ifrim, Decebal Popescu
https://arxiv.org/abs/2509.08067 https://
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images
Yiting Qu, Xinyue Shen, Yixin Wu, Michael Backes, Savvas Zannettou, Yang Zhang
Less is More: On Copy Complexity in Quantum Cryptography
Prabhanjan Ananth, Eli Goldin
https://arxiv.org/abs/2510.04992 https://arxiv.org/pdf/2510.04992
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Adtech and Real-Time Bidding under European Data Protection Law
Michael Veale, Frederik Zuiderveen Borgesius
SiPearl unveils Athena1, Europe's first high-performance CPU with up to 80 cores designed for civilian and military use, slated for commercial launch in H2 2027 (Anton Shilov/Tom's Hardware)
https://www.…
Also yesterday at #OpenSSLCon25: Alex Gaynor of #Python #Cryptography saying their own X.509 parser written in Rust is six times faster than
»DID Method for Natural Persons«
Does anyone know about this and are there any post-quantum cryptography approaches available? How widespread is it, and is it already being used extensively? If so, where and by whom in what areas?
I thank you in advance for your answers and the retoot :BoostOK:
🧑💻 https://
AI-Driven Post-Quantum Cryptography for Cyber-Resilient V2X Communication in Transportation Cyber-Physical Systems
Akid Abrar, Sagar Dasgupta, Mizanur Rahman, Ahmad Alsharif
https://arxiv.org/abs/2510.08496
❄️ NSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?
#cryptography
[2025-09-11 Thu (UTC), 24 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
An Improved Quantum Algorithm for 3-Tuple Lattice Sieving
Lynn Engelberts, Yanlin Chen, Amin Shiraz Gilani, Maya-Iggy van Hoof, Stacey Jeffery, Ronald de Wolf
https://arxiv.org/abs/2510.08473
from my link log —
Dennis Ritchie’s story of dabbling in the cryptographic world.
https://web.archive.org/web/20250121041734/https://www.bell-labs.com/usr/dmr/www/crypt.html
saved 2025-11-04
[2025-09-12 Fri (UTC), 20 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
[2025-08-12 Tue (UTC), 19 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
«The raging mob of peasants is told to put away their torches and pitchforks, and to be reasonable, and to let the adults in the room get on with governance. As the saying goes, "The purpose of a system is what it does", and this system seems to overwhelmingly favour Google at the expense of all those unruly peasants»
Shouldn't we trust Google and other pertinent questions - lolnope
https://cryptography.dog/blog/shouldnt-we-trust-google/
On Cryptography and Distribution Verification, with Applications to Quantum Advantage
Bruno Cavalar, Eli Goldin, Matthew Gray, Taiga Hiroka, Tomoyuki Morimae
https://arxiv.org/abs/2510.05028
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- Obfuscated Quantum and Post-Quantum Cryptography
Anju Rani, Xiaoyu Ai, Aman Gupta, Ravi Singh Adhikari, Robert Malaney
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Computing $\varphi(N)$ for an RSA module with a single quantum query
Luis V\'ictor Dieulefait, Jorge Urr\'oz
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- What is Quantum Computer Security?
Sanjay Deshpande, Jakub Szefer
https://
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
David Egea, Barproda Halder, Sanghamitra Dutta
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Model-Based Calculation Method of Mining Fairness in Blockchain
Akira Sakurai, Kazuyuki Shudo
Crosslisted article(s) found for cs.AR. https://arxiv.org/list/cs.AR/new
[1/1]:
- Error Detection Schemes for Barrett Reduction of CT-BU on FPGA in Post Quantum Cryptography
Paresh Baidya, Rourab Paul, Vikas Srivastava, Sumit Kumar Debnath
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- A Quantitative Security Analysis of S-boxes in the NIST Lightweight Cryptography Finalists
Mahnoor Naseer, Sundas Tariq, Naveed Riaz, Naveed Ahmed, Shah Fahd, Mureed Hussain, Sajid Ali Khan
from my link log —
Kerberoasting: bad cryptography in Microsoft Windows Active Directory.
https://blog.cryptographyengineering.com/2025/09/10/kerberoasting/
saved 2025-09-10
[2025-10-10 Fri (UTC), 21 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
Cheat-Penalised Quantum Weak Coin-Flipping
Atul Singh Arora, Carl A. Miller, Mauro E. S. Morales, Jamie Sikora
https://arxiv.org/abs/2510.03218 https://arx…
[2025-09-10 Wed (UTC), 21 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
Hybrid Schemes of NIST Post-Quantum Cryptography Standard Algorithms and Quantum Key Distribution for Key Exchange and Digital Signature
Abel C. H. Chen
https://arxiv.org/abs/2510.02379
A Monoid Ring Approach to Color Visual Cryptography
Maximilian Reif, Jens Zumbr\"agel
https://arxiv.org/abs/2510.00763 https://arxiv.org/pdf/2510.0076…
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust
Merve G\"ulmez, Thomas Nyman, Christoph Baumann, Jan Tobias M\"uhlberg
Absence of quantum Darwinism as a resource in secure quantum communication and computation
Bishal Kumar Das, Sourav Manna, Vaibhav Madhok
https://arxiv.org/abs/2510.03225 https:…
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Leveraging Large Language Models for Cybersecurity Risk Assessment -- A Case from Forestry Cyber-...
Fikret Mert G\"ultekin, Oscar Lilja, Ranim Khojah, Rebekka Wohlrab, Marvin Damschen, Mazen Mohamad
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- On Rate-Optimal Partitioning Classification from Observable and from Privatised Data
Bal\'azs Csan\'ad Cs\'aji, L\'aszl\'o Gy\"orfi, Ambrus Tam\'as, Harro Walk
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- Systematic Assessment of Tabular Data Synthesis
Yuntao Du, Ninghui Li
https://
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Enhancing Gradient Variance and Differential Privacy in Quantum Federated Learning
Duc-Thien Phan, Minh-Duong Nguyen, Quoc-Viet Pham, Huilong Pi
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- On Cryptography and Distribution Verification, with Applications to Quantum Advantage
Bruno Cavalar, Eli Goldin, Matthew Gray, Taiga Hiroka, Tomoyuki Morimae
Constructing a Photonic Implementation of Quantum Key Distribution
Alec L. Riso, Karthik Thyagarajan, Connor Whiting, Katherine Jimenez, Mark Hannum
https://arxiv.org/abs/2509.04389
Embedded Off-Switches for AI Compute
James Petrie
https://arxiv.org/abs/2509.07637 https://arxiv.org/pdf/2509.07637…
Comparison of Fully Homomorphic Encryption and Garbled Circuit Techniques in Privacy-Preserving Machine Learning Inference
Kalyan Cheerla (University of North Texas), Lotfi Ben Othmane (University of North Texas), Kirill Morozov (University of North Texas)
https://arxiv.org/abs/2510.07457
Evaluating Security Properties in the Execution of Quantum Circuits
Paolo Bernardi, Antonio Brogi, Gian-Luigi Ferrari, Giuseppe Bisicchia
https://arxiv.org/abs/2509.03306 https:…
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps
Bilash Saha, Md Raihan Mia, Sharaban Tahora, Abdul Barek, Hossain Shahriar
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- SCART: Simulation of Cyber Attacks for Real-Time
Eliron Rahimi, Kfir Girstein, Roman Malits, Avi Mendelson
…
Multi-Copy Security in Unclonable Cryptography
Alper \c{C}akan, Vipul Goyal, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
https://arxiv.org/abs/2510.12626 https://
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- FinP: Fairness-in-Privacy in Federated Learning by Addressing Disparities in Privacy Risk
Tianyu Zhao, Mahmoud Srewa, Salma Elmalaki
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- VeriGuard: Enhancing LLM Agent Safety via Verified Code Generation
Miculicich, Parmar, Palangi, Dvijotham, Montanari, Pfister, Le
[2025-10-09 Thu (UTC), 22 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
CSI-IBBS: Identity-Based Blind Signature using CSIDH
Soumya Bhoumik, Sarbari Mitra, Rohit Raj Sharma, Kuldeep Namdeo
https://arxiv.org/abs/2509.06127 https://
Nonlocal Games Through Communication Complexity and Quantum Cryptography
Pierre Botteron
https://arxiv.org/abs/2510.09457 https://arxiv.org/pdf/2510.09457
Introduction to Number Theoretic Transform
Banhirup Sengupta, Peenal Gupta, Souvik Sengupta
https://arxiv.org/abs/2509.05884 https://arxiv.org/pdf/2509.058…
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- Adversarial training with restricted data manipulation
David Benfield, Stefano Coniglio, Phan Tu Vuong, Alain Zemkoho
[2025-10-08 Wed (UTC), 27 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- A Quantitative Security Analysis of S-boxes in the NIST Lightweight Cryptography Finalists
Mahnoor Naseer, Sundas Tariq, Naveed Riaz, Naveed Ahmed, Mureed Hussain
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders
Han, Sun, Ding, Fang, Qian, Li, Chen, Zhang
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- LLAMAFUZZ: Large Language Model Enhanced Greybox Fuzzing
Hongxiang Zhang, Yuyang Rong, Yifeng He, Hao Chen
…
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- A High-Capacity and Secure Disambiguation Algorithm for Neural Linguistic Steganography
Yapei Feng, Feng Jiang, Shanhao Wu, Hua Zhong
A Gentle Introduction to Blind signatures: From RSA to Lattice-based Cryptography
Aditya Bhardwaj, P\'eter Kutas
https://arxiv.org/abs/2509.02189 https://
Designing a Layered Framework to Secure Data via Improved Multi Stage Lightweight Cryptography in IoT Cloud Systems
Hojjat Farshadinia, Ali Barati, Hamid Barati
https://arxiv.org/abs/2509.01717
Are Enterprises Ready for Quantum-Safe Cybersecurity?
Tran Duc Le, Phuc Hao Do, Truong Duy Dinh, Van Dai Pham
https://arxiv.org/abs/2509.01731 https://arxi…
Enhancing TreePIR for a Single-Server Setting via Resampling
Elian Morel
https://arxiv.org/abs/2510.04882 https://arxiv.org/pdf/2510.04882
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- Performance and Storage Analysis of CRYSTALS Kyber as a Post Quantum Replacement for RSA and ECC
Nicolas Rodriguez-Alvarez, Fernando Rodriguez-Merino
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure (Full Version)
Adi Kaufman, Moshik Hershcovitch, Adam Morrison
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- A Fluid Antenna Enabled Physical Layer Key Generation for Next-G Wireless Networks
Jiacheng Guo, Ning Gao, Yiping Zuo, Hao Xu, Shi Jin, Kai Kit Wong
[2025-10-06 Mon (UTC), 36 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
Selmer-Inspired Elliptic Curve Generation
Awnon Bhowmik
https://arxiv.org/abs/2510.02383 https://arxiv.org/pdf/2510.02383
A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries
Nadeem Ahmed, Lei Zhang, Aryya Gangopadhyay
https://arxiv.org/abs/2508.16078 https://
Evolving k-Threshold Visual Cryptography Schemes
Xiaoli Zhuo, Xuehu Yan, Lintao Liu, Wei Yan
https://arxiv.org/abs/2508.15917 https://arxiv.org/pdf/2508.15…
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Privacy-Aware Sequential Learning
Yuxin Liu, M. Amin Rahimian
https://
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- Synthetic Census Data Generation via Multidimensional Multiset Sum
Cynthia Dwork, Kristjan Greenewald, Manish Raghavan
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- A Backdoor-based Explainable AI Benchmark for High Fidelity Evaluation of Attributions
Peiyu Yang, Naveed Akhtar, Jiantong Jiang, Ajmal Mian
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Private Learning of Littlestone Classes, Revisited
Xin Lyu
https://
Optimizing Scalar Selection in Elliptic Curve Cryptography Using Differential Evolution for Enhanced Security
Takreem Haider
https://arxiv.org/abs/2508.13520 https://
[2025-09-04 Thu (UTC), 13 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- Safety is Not Only About Refusal: Reasoning-Enhanced Fine-tuning for Interpretable LLM Safety
Yuyou Zhang, Miao Li, William Han, Yihang Yao, Zhepeng Cen, Ding Zhao
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- Watermark under Fire: A Robustness Evaluation of LLM Watermarking
Jiacheng Liang, Zian Wang, Lauren Hong, Shouling Ji, Ting Wang
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Polynomial Contrastive Learning for Privacy-Preserving Representation Learning on Graphs
Daksh Pandey
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- ZKProphet: Understanding Performance of Zero-Knowledge Proofs on GPUs
Tarunesh Verma, Yichao Yuan, Nishil Talati, Todd Austin
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/2]:
- Evil Vizier: Vulnerabilities of LLM-Integrated XR Systems
Yicheng Zhang, Zijian Huang, Sophie Chen, Erfan Shayegani, Jiasi Chen, Nael Abu-Ghazaleh
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/2]:
- Digital Privacy Under Attack: Challenges and Enablers
Baobao Song, Shiva Raj Pokhrel, Mengyue Deng, Qiujun Lan, Robin Doss, Gang Li
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- CLUE-MARK: Watermarking Diffusion Models using CLWE
Kareem Shehata, Aashish Kolluri, Prateek Saxena
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Evaluating Differentially Private Generation of Domain-Specific Text
Sun, Schlegel, Nandakumar, Zahid, Wu, Del-Pinto, Nenadic, Lam, Zhang, Bharath
Automatic Generation of a Cryptography Misuse Taxonomy Using Large Language Models
Yang Zhang, Wenyi Ouyang, Yi Zhang, Liang Cheng, Chen Wu, Wenxin Hu
https://arxiv.org/abs/2509.10814
[2025-10-03 Fri (UTC), 19 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
[2025-09-03 Wed (UTC), 58 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
Post-Quantum Cryptography and Quantum-Safe Security: A Comprehensive Survey
Gaurab Chhetri, Shriyank Somvanshi, Pavan Hebli, Shamyo Brotee, Subasish Das
https://arxiv.org/abs/2510.10436
NoMod: A Non-modular Attack on Module Learning With Errors
Cristian Bassotto, Ermes Franch, Marina Kr\v{c}ek, Stjepan Picek
https://arxiv.org/abs/2510.02162 https://
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Divide, Conquer and Verify: Improving Symbolic Execution Performance
Christopher Scherb, Luc Bryan Heitz, Hermann Grieder, Olivier Mattmann
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- PIR-RAG: A System for Private Information Retrieval in Retrieval-Augmented Generation
Baiqiang Wang, Qian Lou, Mengxin Zheng, Dongfang Zhao
A Comparative Performance Evaluation of Kyber, sntrup761, and FrodoKEM for Post-Quantum Cryptography
Samet \"Unsal
https://arxiv.org/abs/2508.10023 https://
[2025-10-02 Thu (UTC), 17 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
[2025-09-02 Tue (UTC), no new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Maven-Hijack: Software Supply Chain Attack Exploiting Packaging Order
Frank Reyes, Federico Bono, Aman Sharma, Benoit Baudry, Martin Monperrus
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- Governable AI: Provable Safety Under Extreme Threat Models
Donglin Wang, Weiyun Liang, Chunyuan Chen, Jing Xu, Yulong Fu