Cryptography and Security Papers Profile
Cryptography and Security Papers

@FSFG

Followers
290
Following
1
Media
0
Statuses
10K

Cryptography and security including authentication, public key cryptosytems and proof-carrying code submissions to https://t.co/jPDNjU6jMd (not affiliated with arXiv)

Joined November 2010
Don't wanna be here? Send us removal request.
@FSFG
Cryptography and Security Papers
8 hours
EinHops: Einsum Notation for Expressive Homomorphic Operations on RNS-CKKS Tensors.
0
0
0
@FSFG
Cryptography and Security Papers
8 hours
KeyDroid: A Large-Scale Analysis of Secure Key Storage in Android Apps.
0
0
0
@FSFG
Cryptography and Security Papers
8 hours
The Trust Fabric: Decentralized Interoperability and Economic Coordination for the Agentic Web.
0
0
0
@FSFG
Cryptography and Security Papers
12 hours
Mitigating Watermark Stealing Attacks in Generative Models via Multi-Key Watermarking.
0
0
0
@FSFG
Cryptography and Security Papers
12 hours
Rainbow Artifacts from Electromagnetic Signal Injection Attacks on Image Sensors.
0
0
0
@FSFG
Cryptography and Security Papers
13 hours
RADAR: a Radio-based Analytics for Dynamic Association and Recognition of pseudonyms in VANETs.
0
0
0
@FSFG
Cryptography and Security Papers
17 hours
May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks.
0
0
0
@FSFG
Cryptography and Security Papers
17 hours
Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks.
0
0
0
@FSFG
Cryptography and Security Papers
17 hours
Phishing Detection in the Gen-AI Era: Quantized LLMs vs Classical Models.
0
0
0
@FSFG
Cryptography and Security Papers
22 hours
Shuffling for Semantic Secrecy.
0
0
0
@FSFG
Cryptography and Security Papers
22 hours
FedP3E: Privacy-Preserving Prototype Exchange for Non-IID IoT Malware Detection in Cross-Silo Federated Learning.
0
0
0
@FSFG
Cryptography and Security Papers
22 hours
Semi-fragile watermarking of remote sensing images using DWT, vector quantization and automatic tiling.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
Disa: Accurate Learning-based Static Disassembly with Attentions.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
Automated Attack Testflow Extraction from Cyber Threat Report using BERT for Contextual Analysis.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch.
0
0
1
@FSFG
Cryptography and Security Papers
1 day
Subgraph Counting under Edge Local Differential Privacy Based on Noisy Adjacency Matrix.
0
0
1
@FSFG
Cryptography and Security Papers
1 day
A Survey on Artificial Noise for Physical Layer Security: Opportunities, Technologies, Guidelines, Advances, and Trends.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
Vectorised Hashing Based on Bernstein-Rabin-Winograd Polynomials over Prime Order Fields.
0
0
0
@FSFG
Cryptography and Security Papers
2 days
HEMA: A Hands-on Exploration Platform for MEMS Sensor Attacks.
0
0
0
@FSFG
Cryptography and Security Papers
2 days
Never Trust the Manufacturer, Never Trust the Client: A Novel Method for Streaming STL Files for Secure Additive.
0
0
0