arXiv cs.CR Cryptography and Security
@cscr-bot.bsky.social
35 followers 1 following 14K posts
Unofficial bot by @vele.bsky.social w/ http://github.com/so-okada/bXiv https://arxiv.org/list/cs.CR/new List https://bsky.app/profile/vele.bsky.social/lists/3lim7ccweqo2j ModList https://bsky.app/profile/vele.bsky.social/lists/3lim3qnexsw2g
Posts Media Videos Starter Packs
Reposted by arXiv cs.CR Cryptography and Security
quantph-bot.bsky.social
Andrew Huang, Yael Tauman Kalai: Compiling Any $\mathsf{MIP}^{*}$ into a (Succinct) Classical Interactive Argument https://arxiv.org/abs/2510.08495 https://arxiv.org/pdf/2510.08495 https://arxiv.org/html/2510.08495
Reposted by arXiv cs.CR Cryptography and Security
quantph-bot.bsky.social
Lynn Engelberts, Yanlin Chen, Amin Shiraz Gilani, Maya-Iggy van Hoof, Stacey Jeffery, Ronald de Wolf: An Improved Quantum Algorithm for 3-Tuple Lattice Sieving https://arxiv.org/abs/2510.08473 https://arxiv.org/pdf/2510.08473 https://arxiv.org/html/2510.08473
Reposted by arXiv cs.CR Cryptography and Security
quantph-bot.bsky.social
Gregory D. Kahanamoku-Meyer, Seyoon Ragavan, Katherine Van Kirk: Parallel Spooky Pebbling Makes Regev Factoring More Practical https://arxiv.org/abs/2510.08432 https://arxiv.org/pdf/2510.08432 https://arxiv.org/html/2510.08432
Reposted by arXiv cs.CR Cryptography and Security
cscl-bot.bsky.social
XuHao Hu, Peng Wang, Xiaoya Lu, Dongrui Liu, Xuanjing Huang, Jing Shao: LLMs Learn to Deceive Unintentionally: Emergent Misalignment in Dishonesty from Misaligned Samples to Biased Human-AI I... https://arxiv.org/abs/2510.08211 https://arxiv.org/pdf/2510.08211 https://arxiv.org/html/2510.08211
Reposted by arXiv cs.CR Cryptography and Security
quantph-bot.bsky.social
Fuyuki Kitagawa, Jiahui Liu, Shota Yamada, Takashi Yamakawa: A Unified Approach to Quantum Key Leasing with a Classical Lessor https://arxiv.org/abs/2510.08079 https://arxiv.org/pdf/2510.08079 https://arxiv.org/html/2510.08079
Reposted by arXiv cs.CR Cryptography and Security
cslg-bot.bsky.social
Stanis{\l}aw Pawlak, Jan Dubi\'nski, Daniel Marczak, Bart{\l}omiej Twardowski: Backdoor Vectors: a Task Arithmetic View on Backdoor Attacks and Defenses https://arxiv.org/abs/2510.08016 https://arxiv.org/pdf/2510.08016 https://arxiv.org/html/2510.08016
Reposted by arXiv cs.CR Cryptography and Security
cslg-bot.bsky.social
Kazuki Egashira, Robin Staab, Thibaud Gloaguen, Mark Vero, Martin Vechev: Fewer Weights, More Problems: A Practical Attack on LLM Pruning https://arxiv.org/abs/2510.07985 https://arxiv.org/pdf/2510.07985 https://arxiv.org/html/2510.07985
Reposted by arXiv cs.CR Cryptography and Security
cslg-bot.bsky.social
Weisen Jiang, Sinno Jialin Pan: MetaDefense: Defending Finetuning-based Jailbreak Attack Before and During Generation https://arxiv.org/abs/2510.07835 https://arxiv.org/pdf/2510.07835 https://arxiv.org/html/2510.07835
Reposted by arXiv cs.CR Cryptography and Security
quantph-bot.bsky.social
Robin Kothari, Ryan O'Donnell, Kewen Wu: No exponential quantum speedup for $\mathrm{SIS}^\infty$ anymore https://arxiv.org/abs/2510.07515 https://arxiv.org/pdf/2510.07515 https://arxiv.org/html/2510.07515
Reposted by arXiv cs.CR Cryptography and Security
cscr-bot.bsky.social
Akid Abrar, Sagar Dasgupta, Mizanur Rahman, Ahmad Alsharif: AI-Driven Post-Quantum Cryptography for Cyber-Resilient V2X Communication in Transportation Cyber-Physical Systems https://arxiv.org/abs/2510.08496 https://arxiv.org/pdf/2510.08496 https://arxiv.org/html/2510.08496
cscr-bot.bsky.social
Jinsong Mao, Benjamin E. Ujcich, Shiqing Ma: Rethinking Provenance Completeness with a Learning-Based Linux Scheduler https://arxiv.org/abs/2510.08479 https://arxiv.org/pdf/2510.08479 https://arxiv.org/html/2510.08479
cscr-bot.bsky.social
Kaustabh Barman, Fabian Piper, Sanjeet Raj Pandey, Axel Kuepper: ExPrESSO: Zero-Knowledge backed Extensive Privacy Preserving Single Sign-on https://arxiv.org/abs/2510.08355 https://arxiv.org/pdf/2510.08355 https://arxiv.org/html/2510.08355
cscr-bot.bsky.social
Mika\"ela Ngambo\'e, Jean-Simon Marrocco, Jean-Yves Ouattara, Jos\'e M. Fernandez, Gabriela Nicolescu: New Machine Learning Approaches for Intrusion Detection in ADS-B https://arxiv.org/abs/2510.08333 https://arxiv.org/pdf/2510.08333 https://arxiv.org/html/2510.08333
cscr-bot.bsky.social
C\'edrick Austa, Jan Tobias M\"uhlberg, Jean-Michel Dricot: Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors https://arxiv.org/abs/2510.08272 https://arxiv.org/pdf/2510.08272 https://arxiv.org/html/2510.08272
cscr-bot.bsky.social
Daniel Pressens\'e, Elisavet Kozyri: TracE2E: Easily Deployable Middleware for Decentralized Data Traceability https://arxiv.org/abs/2510.08225 https://arxiv.org/pdf/2510.08225 https://arxiv.org/html/2510.08225
cscr-bot.bsky.social
Abdeljaber, Hossain, Ahmad, Alsanad, Haque, Jha, Nazeer: A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection: Redefining Security Paradigms in Connected Systems https://arxiv.org/abs/2510.08084 https://arxiv.org/pdf/2510.08084 https://arxiv.org/html/2510.08084
cscr-bot.bsky.social
Xiangtao Meng, Tianshuo Cong, Li Wang, Wenyu Chen, Zheng Li, Shanqing Guo, Xiaoyun Wang: From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses https://arxiv.org/abs/2510.07968 https://arxiv.org/pdf/2510.07968 https://arxiv.org/html/2510.07968
cscr-bot.bsky.social
Georgios Diamantopoulos, Nikos Tziritas, Rami Bahsoon, Georgios Theodoropoulos: Decentralised Blockchain Management Through Digital Twins https://arxiv.org/abs/2510.07901 https://arxiv.org/pdf/2510.07901 https://arxiv.org/html/2510.07901
cscr-bot.bsky.social
Renhua Ding, Xiao Yang, Zhengwei Fang, Jun Luo, Kun He, Jun Zhu: Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents https://arxiv.org/abs/2510.07809 https://arxiv.org/pdf/2510.07809 https://arxiv.org/html/2510.07809
cscr-bot.bsky.social
Man Hu, Xinyi Wu, Zuofeng Suo, Jinbo Feng, Linghui Meng, Yanhao Jia, Anh Tuan Luu, Shuai Zhao: Rethinking Reasoning: A Survey on Reasoning-based Backdoors in LLMs https://arxiv.org/abs/2510.07697 https://arxiv.org/pdf/2510.07697 https://arxiv.org/html/2510.07697