Beyond Bots: Proving Humanity in the Age of AI
A new security primitive, the Human Challenge Oracle, aims to thwart automated attacks by demanding ongoing, real-time human effort for verification.
A new security primitive, the Human Challenge Oracle, aims to thwart automated attacks by demanding ongoing, real-time human effort for verification.

A new analysis reveals that while advanced reasoning skills are important, they don’t fully protect large language models from sophisticated adversarial attacks.
A new algorithm efficiently unlocks the full potential of Hyperderivative Reed-Solomon codes for robust data transmission.

A novel optimization approach leverages the power of quantum-inspired computing to build more robust and cost-effective supply chain networks.
![A variational quantum circuit, structured to a depth of two and utilizing three qubits, encodes problem Hamiltonians with [latex]R_z[/latex] gates for phase separation within the Quantum Approximate Optimization Algorithm, while [latex]R_x[/latex] gates function as mixing operations.](https://arxiv.org/html/2601.03278v1/Circuit.png)
Researchers are exploring the potential of quantum computing to enhance Markowitz portfolio theory and tackle complex investment constraints.
A new analysis reveals how key parameters in the LINEture digital signature scheme can be optimized to bolster security and efficiency in the age of quantum computing.

A new framework uses knowledge graphs and artificial intelligence to assess and strengthen enterprise cybersecurity in the face of looming quantum computing advancements.
Researchers have refined calculations of how heavy quarks participate in deep-inelastic scattering, offering improved predictions for high-energy physics experiments.

Researchers have developed a new technique to embed robust watermarks into code generated by artificial intelligence, ensuring both functionality and security.
![Figure 1: Illustration of a multi-agent particle system with interactions governed by a potential field. Particles repel each other with a force proportional to [latex]1/r[/latex], preventing overlap and maintaining a minimal distance.](https://arxiv.org/html/2601.02949v1/figures/architecture_v1.jpg)
This review examines the growing need for interoperability between blockchains and how emerging frameworks are striving to overcome the limitations of isolated networks.