Cryptography and Security Papers
@FSFG
Cryptography and security including authentication, public key cryptosytems and proof-carrying code submissions to http://arxiv.org (not affiliated with arXiv)
PrompTrend: Continuous Community-Driven Vulnerability Discovery and Assessment for Large Language Models. arxiv.org/abs/2507.19185
PurpCode: Reasoning for Safer Code Generation. arxiv.org/abs/2507.19060
Virtual local area network over HTTP for launching an insider attack. arxiv.org/abs/2507.19055
How to Copy-Protect Malleable-Puncturable Cryptographic Functionalities Under Arbitrary Challenge Distributions. arxiv.org/abs/2507.19032
Resolving Indirect Calls in Binary Code via Cross-Reference Augmented Graph Neural Networks. arxiv.org/abs/2507.18801
Bridging Cloud Convenience and Protocol Transparency: A Hybrid Architecture for Ethereum Node Operations on Amazon Managed Blockchain. arxiv.org/abs/2507.18774
Scout: Leveraging Large Language Models for Rapid Digital Evidence Discovery. arxiv.org/abs/2507.18478
Conformidade com os Requisitos Legais de Privacidade de Dados: Um Estudo sobre T\'ecnicas de Anonimiza\c{c}\~ao. arxiv.org/abs/2507.18360
LoRA-Leak: Membership Inference Attacks Against LoRA Fine-tuned Language Models. arxiv.org/abs/2507.18302
Auto-SGCR: Automated Generation of Smart Grid Cyber Range Using IEC 61850 Standard Models. arxiv.org/abs/2507.18249
Information Security Based on LLM Approaches: A Review. arxiv.org/abs/2507.18215
An Improved ChaCha Algorithm Based on Quantum Random Number. arxiv.org/abs/2507.18157
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python. arxiv.org/abs/2507.18075
RECALLED: An Unbounded Resource Consumption Attack on Large Vision-Language Models. arxiv.org/abs/2507.18053
NWaaS: Nonintrusive Watermarking as a Service for X-to-Image DNN. arxiv.org/abs/2507.18036
Removing Box-Free Watermarks for Image-to-Image Models via Query-Based Reverse Engineering. arxiv.org/abs/2507.18034
MeAJOR Corpus: A Multi-Source Dataset for Phishing Email Detection. arxiv.org/abs/2507.17978
TimelyHLS: LLM-Based Timing-Aware and Architecture-Specific FPGA HLS Optimization. arxiv.org/abs/2507.17962
Formal Verification of the Safegcd Implementation. arxiv.org/abs/2507.17956
Learning to Locate: GNN-Powered Vulnerability Path Discovery in Open Source Code. arxiv.org/abs/2507.17888