Cryptography and Security Papers Profile
Cryptography and Security Papers

@FSFG

Followers
289
Following
1
Media
0
Statuses
10K

Cryptography and security including authentication, public key cryptosytems and proof-carrying code submissions to https://t.co/jPDNjU6jMd (not affiliated with arXiv)

Joined November 2010
Don't wanna be here? Send us removal request.
@FSFG
Cryptography and Security Papers
1 hour
Shuffling for Semantic Secrecy.
0
0
0
@FSFG
Cryptography and Security Papers
1 hour
FedP3E: Privacy-Preserving Prototype Exchange for Non-IID IoT Malware Detection in Cross-Silo Federated Learning.
0
0
0
@FSFG
Cryptography and Security Papers
2 hours
Semi-fragile watermarking of remote sensing images using DWT, vector quantization and automatic tiling.
0
0
0
@FSFG
Cryptography and Security Papers
8 hours
Disa: Accurate Learning-based Static Disassembly with Attentions.
0
0
0
@FSFG
Cryptography and Security Papers
8 hours
Automated Attack Testflow Extraction from Cyber Threat Report using BERT for Contextual Analysis.
0
0
0
@FSFG
Cryptography and Security Papers
8 hours
WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch.
0
0
1
@FSFG
Cryptography and Security Papers
12 hours
Subgraph Counting under Edge Local Differential Privacy Based on Noisy Adjacency Matrix.
0
0
0
@FSFG
Cryptography and Security Papers
12 hours
A Survey on Artificial Noise for Physical Layer Security: Opportunities, Technologies, Guidelines, Advances, and Trends.
0
0
0
@FSFG
Cryptography and Security Papers
13 hours
Vectorised Hashing Based on Bernstein-Rabin-Winograd Polynomials over Prime Order Fields.
0
0
0
@FSFG
Cryptography and Security Papers
17 hours
HEMA: A Hands-on Exploration Platform for MEMS Sensor Attacks.
0
0
0
@FSFG
Cryptography and Security Papers
17 hours
Never Trust the Manufacturer, Never Trust the Client: A Novel Method for Streaming STL Files for Secure Additive.
0
0
0
@FSFG
Cryptography and Security Papers
17 hours
An Architecture for Privacy-Preserving Telemetry Scheme.
0
0
0
@FSFG
Cryptography and Security Papers
22 hours
Q-Detection: A Quantum-Classical Hybrid Poisoning Attack Detection Method.
0
0
0
@FSFG
Cryptography and Security Papers
22 hours
Evaluating the Critical Risks of Amazon's Nova Premier under the Frontier Model Safety Framework.
0
0
2
@FSFG
Cryptography and Security Papers
22 hours
Attacker's Noise Can Manipulate Your Audio-based LLM in the Real World.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
Wallets as Universal Access Devices.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
Emergent misalignment as prompt sensitivity: A research note.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
False Alarms, Real Damage: Adversarial Attacks Using LLM-based Models on Text-based Cyber Threat Intelligence Systems.
1
0
0
@FSFG
Cryptography and Security Papers
1 day
We Urgently Need Privilege Management in MCP: A Measurement of API Usage in MCP Ecosystems.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
A Comparative Study and Implementation of Key Derivation Functions Standardized by NIST and IEEE.
0
0
0