arxiv cs.CR
banner
arxiv-cs-cr.bsky.social
arxiv cs.CR
@arxiv-cs-cr.bsky.social
Computer Science -- Cryptography and Security (cs.CR)

source: export.arxiv.org/rss/cs.CR
maintainer: @tmaehara.bsky.social
Jiawei Liu, Zhuo Chen, Rui Zhu, Miaokun Chen, Yuyang Gong, Wei Lu, Xiaofeng Wang
RobustMask: Certified Robustness against Adversarial Neural Ranking Attack via Randomized Masking
https://arxiv.org/abs/2512.23307
December 30, 2025 at 6:10 AM
Johannes Lenzen, Mohamadreza Rostami, Lichao Wu, Ahmad-Reza Sadeghi
Fuzzilicon: A Post-Silicon Microcode-Guided x86 CPU Fuzzer
https://arxiv.org/abs/2512.23438
December 30, 2025 at 6:10 AM
Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan, Asadullah Abdullah Khan, Saad Said Alqahtani
Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation
https://arxiv.org/abs/2512.23480
December 30, 2025 at 6:09 AM
Eduardo Salazar
A Privacy Protocol Using Ephemeral Intermediaries and a Rank-Deficient Matrix Power Function (RDMPF)
https://arxiv.org/abs/2512.23535
December 30, 2025 at 6:09 AM
Toqeer Ali Syed, Mishal Ateeq Almutairi, Mahmoud Abdel Moaty
Toward Trustworthy Agentic AI: A Multimodal Framework for Preventing Prompt Injection Attacks
https://arxiv.org/abs/2512.23557
December 30, 2025 at 6:08 AM
Heba Osama, Omar Elebiary, Youssef Qassim, Mohamed Amgad, Ahmed Maghawry, Ahmed Saafan, Haitham Ghalwash
Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation
https://arxiv.org/abs/2512.23610
December 30, 2025 at 6:08 AM
Bin Wang, Jiazheng Quan, Xingrui Yu, Hansen Hu, Yuhao, Ivor Tsang
Reflection-Driven Control for Trustworthy Code Agents
https://arxiv.org/abs/2512.21354
December 29, 2025 at 7:23 AM
Natasha Fernandes, Annabelle McIver, Parastoo Sadeghi
Composition Theorems for f-Differential Privacy
https://arxiv.org/abs/2512.21358
December 29, 2025 at 7:22 AM
Behnam Farnaghinejad, Antonio Porsia, Annachiara Ruospo, Alessandro Savino, Stefano Di Carlo, Ernesto Sanchez
Power Side-Channel Analysis of the CVA6 RISC-V Core at the RTL Level Using VeriSide
https://arxiv.org/abs/2512.21362
December 29, 2025 at 7:22 AM
Mark Ballard, Guanqun Song, Ting Zhu
Satellite Cybersecurity Across Orbital Altitudes: Analyzing Ground-Based Threats to LEO, MEO, and GEO
https://arxiv.org/abs/2512.21367
December 29, 2025 at 7:21 AM
Arsalan Vahi
Key Length-Oriented Classification of Lightweight Cryptographic Algorithms for IoT Security
https://arxiv.org/abs/2512.21368
December 29, 2025 at 7:10 AM
Yifan Yao, Baojuan Wang, Jinhao Duan, Kaidi Xu, ChuanKai Guo, Zhibo Eric Sun, Yue Zhang
The Imitation Game: Using Large Language Models as Chatbots to Combat Chat-Based Cybercrimes
https://arxiv.org/abs/2512.21371
December 29, 2025 at 7:09 AM
Daniyal Ganiuly, Nurzhau Bolatbek, Assel Smaiyl
Security Risks Introduced by Weak Authentication in Smart Home IoT Systems
https://arxiv.org/abs/2512.21374
December 29, 2025 at 7:09 AM
Adwa Alangari, Ohoud Alharbi
A Systematic Review of Technical Defenses Against Software-Based Cheating in Online Multiplayer Games
https://arxiv.org/abs/2512.21377
December 29, 2025 at 7:08 AM
Tianwei Lan, Farid Na\"it-Abdesselam
LLM-Driven Feature-Level Adversarial Attacks on Android Malware Detectors
https://arxiv.org/abs/2512.21404
December 29, 2025 at 7:07 AM
Lichao Wu, Mohamadreza Rostami, Huimin Li, Nikhilesh Singh, Ahmad-Reza Sadeghi
GoldenFuzz: Generative Golden Reference Hardware Fuzzing
https://arxiv.org/abs/2512.21524
December 29, 2025 at 7:07 AM
Keshav Sinha, Sumitra, Richa Kumari, Akashdeep Bhardwaj, Shawon Rahman
Enhancing Distributed Authorization With Lagrange Interpolation And Attribute-Based Encryption
https://arxiv.org/abs/2512.21525
December 29, 2025 at 6:38 AM
Xiaoming Chen, Haoze Chen, Fei Xu, Meifeng Gao, Jianguo Xie, Cheng Ye, An Hua, Jiao Zhao, ...
Security Boundaries of Quantum Key Reuse: A Quantitative Evaluation Method for QKD Key Rotation Interval and Security Benefits Combined with Block Ciphers
https://arxiv.org/abs/2512.21561
December 29, 2025 at 6:37 AM
Aditya Mitra, Sibi Chakkaravarthy Sethuraman
Verifiable Passkey: The Decentralized Authentication Standard
https://arxiv.org/abs/2512.21663
December 29, 2025 at 6:37 AM
Tian Li, Bo Lin, Shangwen Wang, Yusong Tan
Exploring the Security Threats of Retriever Backdoors in Retrieval-Augmented Code Generation
https://arxiv.org/abs/2512.21681
December 29, 2025 at 6:36 AM
A V Uday Kiran Kandala
Raster Domain Text Steganography: A Unified Framework for Multimodal Secure Embedding
https://arxiv.org/abs/2512.21698
December 29, 2025 at 6:36 AM
Deepak, Rahul Balout, Anupam Golder, Suparna Kundu, Angshuman Karmakar, Debayan Das
Machine Learning Power Side-Channel Attack on SNOW-V
https://arxiv.org/abs/2512.21737
December 29, 2025 at 6:35 AM
Kurtis Chow, Omar Samiullah, Vinesh Sridhar, Hewen Zhang
Assessing the Effectiveness of Membership Inference on Generative Music
https://arxiv.org/abs/2512.21762
December 29, 2025 at 6:07 AM
Nimra Akram, Atif Ahmad, Sean B Maynard
Organizational Learning in Industry 4.0: Applying Crossan's 4I Framework with Double Loop Learning
https://arxiv.org/abs/2512.21813
December 29, 2025 at 6:06 AM
Xuanyu Chen, Yue Zheng, Junqing Zhang, Guanxiong Shen, Chip-Hong Chang
Securing Cross-Domain Internet of Drones: An RFF-PUF Allied Authenticated Key Exchange Protocol With Over-the-Air Enrollment
https://arxiv.org/abs/2512.21827
December 29, 2025 at 6:06 AM