本日紹介した論文の一覧
Cybersecurity of Quantum Key Distribution Implementations
http://arxiv.org/abs/2508.04669v1
Millions of inequivalent quadratic APN functions in eight variables
http://arxiv.org/abs/2508.04644v1
4-Swap: Achieving Grief-Free and Bribery-Safe Atomic Swaps Using Four
Transactions
http://arxiv.org/abs/2508.04641v1
Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing
Technologies
http://arxiv.org/abs/2508.04583v1
Attack Pattern Mining to Discover Hidden Threats to Industrial Control
Systems
http://arxiv.org/abs/2508.04561v1
Privacy Risk Predictions Based on Fundamental Understanding of Personal
Data and an Evolving Threat Landscape
http://arxiv.org/abs/2508.04542v1
Bases of Riemann-Roch spaces associated with arbitrary elliptic curve
divisors and their application in constructing various elliptic Codes
families
http://arxiv.org/abs/2508.04340v1
Per-element Secure Aggregation against Data Reconstruction Attacks in
Federated Learning
http://arxiv.org/abs/2508.04285v1
Prompt Injection Vulnerability of Consensus Generating Applications in
Digital Democracy
http://arxiv.org/abs/2508.04281v1
SelectiveShield: Lightweight Hybrid Defense Against Gradient Leakage in
Federated Learning
http://arxiv.org/abs/2508.04265v1
DP-DocLDM: Differentially Private Document Image Generation using Latent
Diffusion Models
http://arxiv.org/abs/2508.04208v1
Eliciting and Analyzing Emergent Misalignment in State-of-the-Art Large
Language Models
http://arxiv.org/abs/2508.04196v1
BadTime: An Effective Backdoor Attack on Multivariate Long-Term Time
Series Forecasting
http://arxiv.org/abs/2508.04189v1
Secure Development of a Hooking-Based Deception Framework Against
Keylogging Techniques
http://arxiv.org/abs/2508.04178v1
Evaluating Selective Encryption Against Gradient Inversion Attacks
http://arxiv.org/abs/2508.04155v1
SenseCrypt: Sensitivity-guided Selective Homomorphic Encryption for
Joint Federated Learning in Cross-Device Scenarios
http://arxiv.org/abs/2508.04100v1
Isolate Trigger: Detecting and Eradicating Evade-Adaptive Backdoors
http://arxiv.org/abs/2508.04094v1
Identity Theft in AI Conference Peer Review
http://arxiv.org/abs/2508.04024v1
Advanced DAG-Based Ranking (ADR) Protocol for Blockchain Scalability
http://arxiv.org/abs/2508.04000v1
Reputation-based partition scheme for IoT security
http://arxiv.org/abs/2508.03981v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>