Cryptography and Security arXiv

12.8K posts

Cryptography and Security arXiv banner
Cryptography and Security arXiv

Cryptography and Security arXiv

@FSFG

Cryptography and security including authentication, public key cryptosytems and proof-carrying code submissions to https://t.co/u83epOn868 (unofficial).

Beigetreten Kasฤฑm 2010
1 Folgt470 Follower
Cryptography and Security arXiv
Shape and Substance: Dual-Layer Side-Channel Attacks on Local Vision-Language Models Eyal Hadad, Mordechai Guri arxiv.org/abs/2603.25403 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ฐ๐™ธ ๐šŒ๐šœ.๐™ป๐™ถ]
Cryptography and Security arXiv tweet media
English
0
0
1
4
Cryptography and Security arXiv
Unveiling the Resilience of LLM-Enhanced Search Engines against Black-Hat SEO Manipulation Pei Chen, Geng Hong, Xinyi Wu, Mengying Wu, Zixuan Zhu, Mingxuan Liu, Baojun Liu, Mi Zhang, Min Yang arxiv.org/abs/2603.25500 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ธ๐š]
Cryptography and Security arXiv tweet media
Indonesia
0
0
0
6
Cryptography and Security arXiv
ClawKeeper: Comprehensive Safety Protection for OpenClaw Agents Through Skills, Plugins, and Watchers Songyang Liu, Chaozhuo Li, Chenxu Wang, Jinyu Hou, Zejian Chen, Litian Zhang, Zheng Liu, Qiwei Ye, Yiming Hei, Xi Zhang, โ€ฆ arxiv.org/abs/2603.24414 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ฐ๐™ธ]
Cryptography and Security arXiv tweet media
Filipino
0
0
0
18
Cryptography and Security arXiv
IPsec based on Quantum Key Distribution: Adapting non-3GPP access to 5G Networks to the Quantum Era Asier Atutxa, Ane Sanz, Eire Salegi, Gaizka Gonzรกlez, Jasone Astorga, Eduardo Jacob arxiv.org/abs/2603.24426 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ฝ๐™ธ]
Cryptography and Security arXiv tweet media
Catalร 
0
0
0
16
Cryptography and Security arXiv
Analysing the Safety Pitfalls of Steering Vectors Yuxiao Li, Alina Fastowski, Efstratios Zaradoukas, Bardh Prenkaj, Gjergji Kasneci arxiv.org/abs/2603.24543 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ฒ๐™ป]
Cryptography and Security arXiv tweet media
Suomi
0
0
0
16
Cryptography and Security arXiv
Infrastructure for Valuable, Tradable, and Verifiable Agent Memory Mengyuan Li, Lei Gao, Haoxuan Xu, Jiate Li, Potung Yu, Lingke Cheng, Yue Zhao, Murali Annavaram arxiv.org/abs/2603.24564 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ฒ๐šˆ]
Cryptography and Security arXiv tweet media
Romรขnฤƒ
0
0
0
13
Cryptography and Security arXiv
T-MAP: Red-Teaming LLM Agents with Trajectory-aware Evolutionary Search Hyomin Lee, Sangwoo Park, Yumin Choi, Sohyun An, Seanie Lee, Sung Ju Hwang arxiv.org/abs/2603.22341 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ฐ๐™ธ ๐šŒ๐šœ.๐™ฒ๐™ป]
Cryptography and Security arXiv tweet media
English
0
0
0
18
Cryptography and Security arXiv
Q-AGNN: Quantum-Enhanced Attentive Graph Neural Network for Intrusion Detection Devashish Chaudhary, Sutharshan Rajasegarar, Shiva Raj Pokhrel arxiv.org/abs/2603.22365 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ฐ๐™ธ ๐šŒ๐šœ.๐™ป๐™ถ]
Cryptography and Security arXiv tweet media
English
0
0
0
17
Cryptography and Security arXiv
mmFHE: mmWave Sensing with End-to-End Fully Homomorphic Encryption Tanvir Ahmed, Yixuan Gao, Adnan Armouti, Rajalakshmi Nandakumar arxiv.org/abs/2603.22437 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ป๐™ถ ๐šŽ๐šŽ๐šœ๐šœ.๐š‚๐™ฟ]
Cryptography and Security arXiv tweet media
English
0
0
0
22
Cryptography and Security arXiv
Architecture-Derived CBOMs for Cryptographic Migration: A Security-Aware Architecture Tradeoff Method Eduard Hirsch, Kristina Raab arxiv.org/abs/2603.22442 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐š‚๐™ด]
Cryptography and Security arXiv tweet media
English
0
0
0
23
Cryptography and Security arXiv
Model Context Protocol Threat Modeling and Analyzing Vulnerabilities to Prompt Injection with Tool Poisoning Charoes Huang, Xin Huang, Ngoc Phu Tran, Amin Milani Fard arxiv.org/abs/2603.22489 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐š‚๐™ด]
Cryptography and Security arXiv tweet media
English
0
0
1
16
Cryptography and Security arXiv
STRIATUM-CTF: A Protocol-Driven Agentic Framework for General-Purpose CTF Solving James Hugglestone, Samuel Jacob Chacko, Dawson Stoller, Ryan Schmidt, Xiuwen Liu arxiv.org/abs/2603.22577 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ฐ๐™ธ ๐šŒ๐šœ.๐™ผ๐™ฐ]
Cryptography and Security arXiv tweet media
English
0
0
0
19
Cryptography and Security arXiv
Semi-Automated Threat Modeling of Cloud-Based Systems Through Extracting Software Architecture from Configuration and Network Flow Nicholas Pecka, Lotfi Ben Othmane, Bharat Bhargava, Renee Bryce arxiv.org/abs/2603.22603 [๐šŒ๐šœ.๐™ฒ๐š]
Cryptography and Security arXiv tweet media
English
0
0
0
15
Cryptography and Security arXiv
BioShield: A Context-Aware Firewall for Securing Bio-LLMs Protiva Das, Sovon Chakraborty, Sidhant Narula, Lucas Potter, Xavier-Lewis Palmer, Pratip Rana, Daniel Takabi, Mohammad Ghasemigol arxiv.org/abs/2603.22612 [๐šŒ๐šœ.๐™ฒ๐š ๐šŒ๐šœ.๐™ท๐™ฒ]
Cryptography and Security arXiv tweet media
English
0
0
0
11