Towards Enhanced Quantum Resistance for RSA via Constrained Rényi Entropy Optimization: A Theoretical Framework for Backward-Compatible Cryptography

This paper proposes the Constrained Rényi Entropy Optimization (CREO) framework, a backward-compatible mathematical approach that enhances RSA's resistance to Shor's algorithm by constraining prime proximity to increase the quantum resource requirements for factorization, thereby offering a transitional security upgrade without necessitating infrastructure replacement.

Ruopengyu Xu, Chenglian LiuFri, 13 Ma⚛️ quant-ph

WebWeaver: Breaking Topology Confidentiality in LLM Multi-Agent Systems with Stealthy Context-Based Inference

The paper introduces WebWeaver, a stealthy attack framework that infers the complete communication topology of LLM-based multi-agent systems by compromising only a single arbitrary agent and leveraging context-based diffusion mechanisms, thereby overcoming the limitations of prior methods that rely on impractical assumptions or easily defeated jailbreaks.

Zixun Xiong, Gaoyi Wu, Lingfeng Yao, Miao Pan, Xiaojiang Du, Hao WangFri, 13 Ma🤖 cs.AI

Security-by-Design for LLM-Based Code Generation: Leveraging Internal Representations for Concept-Driven Steering Mechanisms

This paper proposes Secure Concept Steering for CodeLLMs (SCS-Code), a novel mechanism that leverages the internal representations of security concepts within Large Language Models to actively steer token generation toward secure and functional code, thereby outperforming existing state-of-the-art methods in addressing security vulnerabilities.

Maximilian Wendlinger, Daniel Kowatsch, Konstantin Böttinger, Philip SperlFri, 13 Ma🤖 cs.LG

KEPo: Knowledge Evolution Poison on Graph-based Retrieval-Augmented Generation

This paper introduces KEPo, a novel poisoning attack method specifically designed to exploit the graph-based retrieval mechanism of GraphRAG systems by fabricating toxic knowledge evolution paths that manipulate the knowledge graph structure to force Large Language Models into generating harmful responses, thereby achieving state-of-the-art attack success rates where conventional RAG attacks fail.

Qizhi Chen, Chao Qi, Yihong Huang, Muquan Li, Rongzheng Wang, Dongyang Zhang, Ke Qin, Shuang LiangFri, 13 Ma🤖 cs.LG