Tootfinder

Opt-in global Mastodon full text search. Join the index!

@arXiv_quantph_bot@mastoxiv.page
2025-08-12 11:32:13

Obfuscated Quantum and Post-Quantum Cryptography
Anju Rani, Xiaoyu Ai, Aman Gupta, Ravi Singh Adhikari, Robert Malaney
arxiv.org/abs/2508.07635

@fanf@mendeddrum.org
2025-09-09 17:42:03

from my link log —
Ascon lightweight cryptography.
ascon.isec.tugraz.at/
saved 2025-08-13 dotat.at/:/0C8XF.html

@neverpanic@chaos.social
2025-10-09 21:13:05

Had a lovely evening while playing an experimental board game on post-quantum #cryptography with people from Tampere University, the OpenSSL Foundation and Cybernetica.
A fitting end for the 2025 #OpenSSL Conference.

A macro shot of a small laminated game board. There are four figurines on it in various positions. The last three potions are named "hybrid mode (optional)", "real-life implementation", and "worldwide usage".
The back of one of the player cards. Its orange, there's a short text explaining isogeny-based (post-quantum) cryptography.
Stacks of tokens with hearts (representing influence), coins (money) and stars (research).
@arXiv_csCR_bot@mastoxiv.page
2025-09-11 11:51:56

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Robustness of Locally Differentially Private Graph Analysis Against Poisoning
Jacob Imola, Amrita Roy Chowdhury, Kamalika Chaudhuri

@arXiv_csIT_bot@mastoxiv.page
2025-09-11 08:20:33

Deep holes of a class of twisted Reed-Solomon codes
Haojie Gu, Nan Wang, Jun Zhang
arxiv.org/abs/2509.08526 arxiv.org/pdf/2509.08526

@adulau@infosec.exchange
2025-11-03 05:46:21

I think the best summary until now about Post-quantum cryptography is from Peter Gutmann in the cryptography mailing-list.

Given that after 20 years and hundreds of millions of dollars spent researchers have yet to demonstrate a single legitimate cryptanalysis result using a quantum physics experiment, it's a bit like arguing over which brand of unicorn repellent is the most cromulent.

The current state of things in terms of pure vs. hybrid systems seems to be:

- …
iang via cryptography <cryptography at metzdowd.com> quotes:

>The problem in a nutshell. Surveillance agency NSA and its partner GCHQ are
>trying to have standards—development organizations endorse weakening ECC+PQ
>down to just PQ.

Given that after 20 years and hundreds of millions of dollars spent
researchers have yet to demonstrate a single legitimate cryptanalysis result
using a quantum physics experiment, it's a bit like arguing over which brand
of unicorn repellent is the most cromulent…
@arXiv_csCR_bot@mastoxiv.page
2025-09-11 10:48:02

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Hammer and Anvil: A Principled Defense Against Backdoors in Federated Learning
Lucas Fenaux, Zheng Wang, Jacob Yan, Nathan Chung, Florian Kerschbaum

@arXiv_csAR_bot@mastoxiv.page
2025-09-11 07:31:42

Analyzing the capabilities of HLS and RTL tools in the design of an FPGA Montgomery Multiplier
Rares Ifrim, Decebal Popescu
arxiv.org/abs/2509.08067

@arXiv_csCR_bot@mastoxiv.page
2025-09-12 12:00:38

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images
Yiting Qu, Xinyue Shen, Yixin Wu, Michael Backes, Savvas Zannettou, Yang Zhang

@arXiv_quantph_bot@mastoxiv.page
2025-10-07 12:04:32

Less is More: On Copy Complexity in Quantum Cryptography
Prabhanjan Ananth, Eli Goldin
arxiv.org/abs/2510.04992 arxiv.org/pdf/2510.04992

@arXiv_csCR_bot@mastoxiv.page
2025-09-12 10:20:25

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Adtech and Real-Time Bidding under European Data Protection Law
Michael Veale, Frederik Zuiderveen Borgesius

@Techmeme@techhub.social
2025-10-05 20:35:44

SiPearl unveils Athena1, Europe's first high-performance CPU with up to 80 cores designed for civilian and military use, slated for commercial launch in H2 2027 (Anton Shilov/Tom's Hardware)

@neverpanic@chaos.social
2025-10-08 06:15:12

Also yesterday at #OpenSSLCon25: Alex Gaynor of #Python #Cryptography saying their own X.509 parser written in Rust is six times faster than

@kubikpixel@chaos.social
2025-09-05 13:12:42

»DID Method for Natural Persons«
Does anyone know about this and are there any post-quantum cryptography approaches available? How widespread is it, and is it already being used extensively? If so, where and by whom in what areas?
I thank you in advance for your answers and the retoot :BoostOK:
🧑‍💻

@ErikJonker@mastodon.social
2025-11-04 19:29:32

About how AI tools can be useful.
#ai #coding

@arXiv_csCR_bot@mastoxiv.page
2025-10-10 09:58:19

AI-Driven Post-Quantum Cryptography for Cyber-Resilient V2X Communication in Transportation Cyber-Physical Systems
Akid Abrar, Sagar Dasgupta, Mizanur Rahman, Ahmad Alsharif
arxiv.org/abs/2510.08496

@UP8@mastodon.social
2025-10-24 11:41:23

❄️ NSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?
#cryptography

@arXiv_csCR_bot@mastoxiv.page
2025-09-11 07:35:23

[2025-09-11 Thu (UTC), 24 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_quantph_bot@mastoxiv.page
2025-10-10 11:17:39

An Improved Quantum Algorithm for 3-Tuple Lattice Sieving
Lynn Engelberts, Yanlin Chen, Amin Shiraz Gilani, Maya-Iggy van Hoof, Stacey Jeffery, Ronald de Wolf
arxiv.org/abs/2510.08473

@fanf@mendeddrum.org
2025-11-06 12:42:03

from my link log —
Dennis Ritchie’s story of dabbling in the cryptographic world.
web.archive.org/web/2025012104
saved 2025-11-04

@arXiv_csCR_bot@mastoxiv.page
2025-09-12 07:33:19

[2025-09-12 Fri (UTC), 20 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_csCR_bot@mastoxiv.page
2025-08-12 07:32:03

[2025-08-12 Tue (UTC), 19 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@gedankenstuecke@scholar.social
2025-09-16 02:54:29

«The raging mob of peasants is told to put away their torches and pitchforks, and to be reasonable, and to let the adults in the room get on with governance. As the saying goes, "The purpose of a system is what it does", and this system seems to overwhelmingly favour Google at the expense of all those unruly peasants»
Shouldn't we trust Google and other pertinent questions - lolnope
cryptography.dog/blog/shouldnt

@arXiv_quantph_bot@mastoxiv.page
2025-10-07 12:07:32

On Cryptography and Distribution Verification, with Applications to Quantum Advantage
Bruno Cavalar, Eli Goldin, Matthew Gray, Taiga Hiroka, Tomoyuki Morimae
arxiv.org/abs/2510.05028

@arXiv_csCR_bot@mastoxiv.page
2025-10-09 13:47:26

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- Obfuscated Quantum and Post-Quantum Cryptography
Anju Rani, Xiaoyu Ai, Aman Gupta, Ravi Singh Adhikari, Robert Malaney

@arXiv_csCR_bot@mastoxiv.page
2025-10-10 14:55:14

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Computing $\varphi(N)$ for an RSA module with a single quantum query
Luis V\'ictor Dieulefait, Jorge Urr\'oz

@arXiv_csCR_bot@mastoxiv.page
2025-10-10 12:52:36

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- What is Quantum Computer Security?
Sanjay Deshpande, Jakub Szefer

@arXiv_csCR_bot@mastoxiv.page
2025-09-10 11:11:20

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
David Egea, Barproda Halder, Sanghamitra Dutta

@arXiv_csCR_bot@mastoxiv.page
2025-09-10 13:00:46

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Model-Based Calculation Method of Mining Fairness in Blockchain
Akira Sakurai, Kazuyuki Shudo

@arXiv_csAR_bot@mastoxiv.page
2025-09-05 10:30:18

Crosslisted article(s) found for cs.AR. arxiv.org/list/cs.AR/new
[1/1]:
- Error Detection Schemes for Barrett Reduction of CT-BU on FPGA in Post Quantum Cryptography
Paresh Baidya, Rourab Paul, Vikas Srivastava, Sumit Kumar Debnath

@arXiv_csCR_bot@mastoxiv.page
2025-10-08 13:39:22

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- A Quantitative Security Analysis of S-boxes in the NIST Lightweight Cryptography Finalists
Mahnoor Naseer, Sundas Tariq, Naveed Riaz, Naveed Ahmed, Shah Fahd, Mureed Hussain, Sajid Ali Khan

@fanf@mendeddrum.org
2025-09-25 17:42:04

from my link log —
Kerberoasting: bad cryptography in Microsoft Windows Active Directory.
blog.cryptographyengineering.c
saved 2025-09-10

@arXiv_csCR_bot@mastoxiv.page
2025-10-10 07:42:19

[2025-10-10 Fri (UTC), 21 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_quantph_bot@mastoxiv.page
2025-10-06 10:06:09

Cheat-Penalised Quantum Weak Coin-Flipping
Atul Singh Arora, Carl A. Miller, Mauro E. S. Morales, Jamie Sikora
arxiv.org/abs/2510.03218 arx…

@arXiv_csCR_bot@mastoxiv.page
2025-09-10 07:31:41

[2025-09-10 Wed (UTC), 21 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_csCR_bot@mastoxiv.page
2025-10-06 09:15:59

Hybrid Schemes of NIST Post-Quantum Cryptography Standard Algorithms and Quantum Key Distribution for Key Exchange and Digital Signature
Abel C. H. Chen
arxiv.org/abs/2510.02379

@arXiv_csCR_bot@mastoxiv.page
2025-10-02 10:07:31

A Monoid Ring Approach to Color Visual Cryptography
Maximilian Reif, Jens Zumbr\"agel
arxiv.org/abs/2510.00763 arxiv.org/pdf/2510.0076…

@arXiv_csCR_bot@mastoxiv.page
2025-10-09 13:47:03

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust
Merve G\"ulmez, Thomas Nyman, Christoph Baumann, Jan Tobias M\"uhlberg

@arXiv_quantph_bot@mastoxiv.page
2025-10-06 10:06:19

Absence of quantum Darwinism as a resource in secure quantum communication and computation
Bishal Kumar Das, Sourav Manna, Vaibhav Madhok
arxiv.org/abs/2510.03225

@arXiv_csCR_bot@mastoxiv.page
2025-10-09 11:48:10

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Leveraging Large Language Models for Cybersecurity Risk Assessment -- A Case from Forestry Cyber-...
Fikret Mert G\"ultekin, Oscar Lilja, Ranim Khojah, Rebekka Wohlrab, Marvin Damschen, Mazen Mohamad

@arXiv_csCR_bot@mastoxiv.page
2025-09-09 15:46:06

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- On Rate-Optimal Partitioning Classification from Observable and from Privatised Data
Bal\'azs Csan\'ad Cs\'aji, L\'aszl\'o Gy\"orfi, Ambrus Tam\'as, Harro Walk

@arXiv_csCR_bot@mastoxiv.page
2025-09-09 15:45:21

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- Systematic Assessment of Tabular Data Synthesis
Yuntao Du, Ninghui Li

@arXiv_csCR_bot@mastoxiv.page
2025-09-09 13:52:53

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Enhancing Gradient Variance and Differential Privacy in Quantum Federated Learning
Duc-Thien Phan, Minh-Duong Nguyen, Quoc-Viet Pham, Huilong Pi

@arXiv_csCR_bot@mastoxiv.page
2025-10-07 15:08:40

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- On Cryptography and Distribution Verification, with Applications to Quantum Advantage
Bruno Cavalar, Eli Goldin, Matthew Gray, Taiga Hiroka, Tomoyuki Morimae

@arXiv_quantph_bot@mastoxiv.page
2025-09-05 10:14:51

Constructing a Photonic Implementation of Quantum Key Distribution
Alec L. Riso, Karthik Thyagarajan, Connor Whiting, Katherine Jimenez, Mark Hannum
arxiv.org/abs/2509.04389

@arXiv_csCR_bot@mastoxiv.page
2025-09-10 09:45:11

Embedded Off-Switches for AI Compute
James Petrie
arxiv.org/abs/2509.07637 arxiv.org/pdf/2509.07637

@arXiv_csCR_bot@mastoxiv.page
2025-10-10 08:34:39

Comparison of Fully Homomorphic Encryption and Garbled Circuit Techniques in Privacy-Preserving Machine Learning Inference
Kalyan Cheerla (University of North Texas), Lotfi Ben Othmane (University of North Texas), Kirill Morozov (University of North Texas)
arxiv.org/abs/2510.07457

@arXiv_quantph_bot@mastoxiv.page
2025-09-04 10:21:51

Evaluating Security Properties in the Execution of Quantum Circuits
Paolo Bernardi, Antonio Brogi, Gian-Luigi Ferrari, Giuseppe Bisicchia
arxiv.org/abs/2509.03306

@arXiv_csCR_bot@mastoxiv.page
2025-10-07 18:46:02

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps
Bilash Saha, Md Raihan Mia, Sharaban Tahora, Abdul Barek, Hossain Shahriar

@arXiv_csCR_bot@mastoxiv.page
2025-10-07 18:45:40

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- SCART: Simulation of Cyber Attacks for Real-Time
Eliron Rahimi, Kfir Girstein, Roman Malits, Avi Mendelson

@arXiv_quantph_bot@mastoxiv.page
2025-10-15 10:27:31

Multi-Copy Security in Unclonable Cryptography
Alper \c{C}akan, Vipul Goyal, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
arxiv.org/abs/2510.12626

@arXiv_csCR_bot@mastoxiv.page
2025-10-08 13:39:41

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- FinP: Fairness-in-Privacy in Federated Learning by Addressing Disparities in Privacy Risk
Tianyu Zhao, Mahmoud Srewa, Salma Elmalaki

@arXiv_csCR_bot@mastoxiv.page
2025-10-08 12:07:24

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- VeriGuard: Enhancing LLM Agent Safety via Verified Code Generation
Miculicich, Parmar, Palangi, Dvijotham, Montanari, Pfister, Le

@arXiv_csCR_bot@mastoxiv.page
2025-10-09 07:32:01

[2025-10-09 Thu (UTC), 22 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_csCR_bot@mastoxiv.page
2025-09-09 11:52:02

CSI-IBBS: Identity-Based Blind Signature using CSIDH
Soumya Bhoumik, Sarbari Mitra, Rohit Raj Sharma, Kuldeep Namdeo
arxiv.org/abs/2509.06127

@arXiv_quantph_bot@mastoxiv.page
2025-10-13 10:06:50

Nonlocal Games Through Communication Complexity and Quantum Cryptography
Pierre Botteron
arxiv.org/abs/2510.09457 arxiv.org/pdf/2510.09457

@arXiv_csCR_bot@mastoxiv.page
2025-09-09 11:40:52

Introduction to Number Theoretic Transform
Banhirup Sengupta, Peenal Gupta, Souvik Sengupta
arxiv.org/abs/2509.05884 arxiv.org/pdf/2509.058…

@arXiv_csCR_bot@mastoxiv.page
2025-10-07 15:08:16

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- Adversarial training with restricted data manipulation
David Benfield, Stefano Coniglio, Phan Tu Vuong, Alain Zemkoho

@arXiv_csCR_bot@mastoxiv.page
2025-10-08 07:38:49

[2025-10-08 Wed (UTC), 27 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_csCR_bot@mastoxiv.page
2025-10-03 13:16:49

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- A Quantitative Security Analysis of S-boxes in the NIST Lightweight Cryptography Finalists
Mahnoor Naseer, Sundas Tariq, Naveed Riaz, Naveed Ahmed, Mureed Hussain

@arXiv_csCR_bot@mastoxiv.page
2025-10-06 12:27:41

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders
Han, Sun, Ding, Fang, Qian, Li, Chen, Zhang

@arXiv_csCR_bot@mastoxiv.page
2025-10-06 12:27:21

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- LLAMAFUZZ: Large Language Model Enhanced Greybox Fuzzing
Hongxiang Zhang, Yuyang Rong, Yifeng He, Hao Chen

@arXiv_csCR_bot@mastoxiv.page
2025-10-06 11:05:46

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- A High-Capacity and Secure Disambiguation Algorithm for Neural Linguistic Steganography
Yapei Feng, Feng Jiang, Shanhao Wu, Hua Zhong

@arXiv_csCR_bot@mastoxiv.page
2025-09-03 14:00:53

A Gentle Introduction to Blind signatures: From RSA to Lattice-based Cryptography
Aditya Bhardwaj, P\'eter Kutas
arxiv.org/abs/2509.02189

@arXiv_csCR_bot@mastoxiv.page
2025-09-03 13:42:43

Designing a Layered Framework to Secure Data via Improved Multi Stage Lightweight Cryptography in IoT Cloud Systems
Hojjat Farshadinia, Ali Barati, Hamid Barati
arxiv.org/abs/2509.01717

@arXiv_csCR_bot@mastoxiv.page
2025-09-03 13:46:03

Are Enterprises Ready for Quantum-Safe Cybersecurity?
Tran Duc Le, Phuc Hao Do, Truong Duy Dinh, Van Dai Pham
arxiv.org/abs/2509.01731 arxi…

@arXiv_csCR_bot@mastoxiv.page
2025-10-07 11:07:12

Enhancing TreePIR for a Single-Server Setting via Resampling
Elian Morel
arxiv.org/abs/2510.04882 arxiv.org/pdf/2510.04882

@arXiv_csCR_bot@mastoxiv.page
2025-09-03 20:16:54

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- Performance and Storage Analysis of CRYSTALS Kyber as a Post Quantum Replacement for RSA and ECC
Nicolas Rodriguez-Alvarez, Fernando Rodriguez-Merino

@arXiv_csCR_bot@mastoxiv.page
2025-09-03 20:16:01

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure (Full Version)
Adi Kaufman, Moshik Hershcovitch, Adam Morrison

@arXiv_csCR_bot@mastoxiv.page
2025-09-03 17:18:50

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- A Fluid Antenna Enabled Physical Layer Key Generation for Next-G Wireless Networks
Jiacheng Guo, Ning Gao, Yiping Zuo, Hao Xu, Shi Jin, Kai Kit Wong

@arXiv_csCR_bot@mastoxiv.page
2025-10-06 07:31:29

[2025-10-06 Mon (UTC), 36 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_csCR_bot@mastoxiv.page
2025-10-06 09:19:09

Selmer-Inspired Elliptic Curve Generation
Awnon Bhowmik
arxiv.org/abs/2510.02383 arxiv.org/pdf/2510.02383

@arXiv_csCR_bot@mastoxiv.page
2025-08-25 08:52:20

A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries
Nadeem Ahmed, Lei Zhang, Aryya Gangopadhyay
arxiv.org/abs/2508.16078

@arXiv_csCR_bot@mastoxiv.page
2025-08-25 08:41:50

Evolving k-Threshold Visual Cryptography Schemes
Xiaoli Zhuo, Xuehu Yan, Lintao Liu, Wei Yan
arxiv.org/abs/2508.15917 arxiv.org/pdf/2508.15…

@arXiv_csCR_bot@mastoxiv.page
2025-10-03 11:41:42

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Privacy-Aware Sequential Learning
Yuxin Liu, M. Amin Rahimian

@arXiv_csCR_bot@mastoxiv.page
2025-10-02 14:07:44

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- Synthetic Census Data Generation via Multidimensional Multiset Sum
Cynthia Dwork, Kristjan Greenewald, Manish Raghavan

@arXiv_csCR_bot@mastoxiv.page
2025-10-02 14:07:21

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- A Backdoor-based Explainable AI Benchmark for High Fidelity Evaluation of Attributions
Peiyu Yang, Naveed Akhtar, Jiantong Jiang, Ajmal Mian

@arXiv_csCR_bot@mastoxiv.page
2025-10-02 12:11:07

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Private Learning of Littlestone Classes, Revisited
Xin Lyu

@arXiv_csCR_bot@mastoxiv.page
2025-08-20 09:25:30

Optimizing Scalar Selection in Elliptic Curve Cryptography Using Differential Evolution for Enhanced Security
Takreem Haider
arxiv.org/abs/2508.13520

@arXiv_csCR_bot@mastoxiv.page
2025-09-04 07:31:31

[2025-09-04 Thu (UTC), 13 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_csCR_bot@mastoxiv.page
2025-10-01 15:51:44

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- Safety is Not Only About Refusal: Reasoning-Enhanced Fine-tuning for Interpretable LLM Safety
Yuyou Zhang, Miao Li, William Han, Yihang Yao, Zhepeng Cen, Ding Zhao

@arXiv_csCR_bot@mastoxiv.page
2025-10-01 15:51:26

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- Watermark under Fire: A Robustness Evaluation of LLM Watermarking
Jiacheng Liang, Zian Wang, Lauren Hong, Shouling Ji, Ting Wang

@arXiv_csCR_bot@mastoxiv.page
2025-10-01 13:20:27

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Polynomial Contrastive Learning for Privacy-Preserving Representation Learning on Graphs
Daksh Pandey

@arXiv_csCR_bot@mastoxiv.page
2025-09-30 17:01:04

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- ZKProphet: Understanding Performance of Zero-Knowledge Proofs on GPUs
Tarunesh Verma, Yichao Yuan, Nishil Talati, Todd Austin

@arXiv_csCR_bot@mastoxiv.page
2025-09-30 21:28:24

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[2/2]:
- Evil Vizier: Vulnerabilities of LLM-Integrated XR Systems
Yicheng Zhang, Zijian Huang, Sophie Chen, Erfan Shayegani, Jiasi Chen, Nael Abu-Ghazaleh

@arXiv_csCR_bot@mastoxiv.page
2025-09-30 21:27:55

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/2]:
- Digital Privacy Under Attack: Challenges and Enablers
Baobao Song, Shiva Raj Pokhrel, Mengyue Deng, Qiujun Lan, Robin Doss, Gang Li

@arXiv_csCR_bot@mastoxiv.page
2025-09-01 11:11:41

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- CLUE-MARK: Watermarking Diffusion Models using CLWE
Kareem Shehata, Aashish Kolluri, Prateek Saxena

@arXiv_csCR_bot@mastoxiv.page
2025-09-01 10:15:28

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Evaluating Differentially Private Generation of Domain-Specific Text
Sun, Schlegel, Nandakumar, Zahid, Wu, Del-Pinto, Nenadic, Lam, Zhang, Bharath

@arXiv_csCR_bot@mastoxiv.page
2025-09-16 11:29:26

Automatic Generation of a Cryptography Misuse Taxonomy Using Large Language Models
Yang Zhang, Wenyi Ouyang, Yi Zhang, Liang Cheng, Chen Wu, Wenxin Hu
arxiv.org/abs/2509.10814

@arXiv_csCR_bot@mastoxiv.page
2025-10-03 07:31:51

[2025-10-03 Fri (UTC), 19 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_csCR_bot@mastoxiv.page
2025-09-03 07:43:51

[2025-09-03 Wed (UTC), 58 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_csCR_bot@mastoxiv.page
2025-10-14 11:52:38

Post-Quantum Cryptography and Quantum-Safe Security: A Comprehensive Survey
Gaurab Chhetri, Shriyank Somvanshi, Pavan Hebli, Shamyo Brotee, Subasish Das
arxiv.org/abs/2510.10436

@arXiv_csCR_bot@mastoxiv.page
2025-10-03 09:49:11

NoMod: A Non-modular Attack on Module Learning With Errors
Cristian Bassotto, Ermes Franch, Marina Kr\v{c}ek, Stjepan Picek
arxiv.org/abs/2510.02162

@arXiv_csCR_bot@mastoxiv.page
2025-09-29 14:56:36

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Divide, Conquer and Verify: Improving Symbolic Execution Performance
Christopher Scherb, Luc Bryan Heitz, Hermann Grieder, Olivier Mattmann

@arXiv_csCR_bot@mastoxiv.page
2025-09-29 11:57:16

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- PIR-RAG: A System for Private Information Retrieval in Retrieval-Augmented Generation
Baiqiang Wang, Qian Lou, Mengxin Zheng, Dongfang Zhao

@arXiv_csCR_bot@mastoxiv.page
2025-08-15 08:11:52

A Comparative Performance Evaluation of Kyber, sntrup761, and FrodoKEM for Post-Quantum Cryptography
Samet \"Unsal
arxiv.org/abs/2508.10023

@arXiv_csCR_bot@mastoxiv.page
2025-10-02 07:35:31

[2025-10-02 Thu (UTC), 17 new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_csCR_bot@mastoxiv.page
2025-09-02 07:41:13

[2025-09-02 Tue (UTC), no new articles found for cs.CR Cryptography and Security]
toXiv_bot_toot

@arXiv_csCR_bot@mastoxiv.page
2025-08-29 12:02:37

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Maven-Hijack: Software Supply Chain Attack Exploiting Packaging Order
Frank Reyes, Federico Bono, Aman Sharma, Benoit Baudry, Martin Monperrus

@arXiv_csCR_bot@mastoxiv.page
2025-08-29 10:43:59

Crosslisted article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- Governable AI: Provable Safety Under Extreme Threat Models
Donglin Wang, Weiyun Liang, Chunyuan Chen, Jing Xu, Yulong Fu