AI Code Contributions: A Security Risk?

A new study reveals that while AI is increasingly used to generate code fixes, a significant number of these contributions introduce or fail to address critical security vulnerabilities.

A new study reveals that while AI is increasingly used to generate code fixes, a significant number of these contributions introduce or fail to address critical security vulnerabilities.
New research demonstrates that rigorously applying masking techniques at each stage of a Number Theoretic Transform pipeline is critical for preventing side-channel attacks in post-quantum cryptography hardware.
This research delves into the analytical behavior of q-deformed metallic numbers, a generalization of the familiar Fibonacci sequence.

New research reveals that diffusion-based language models demonstrate superior resilience to performance loss when compressed using quantization techniques, opening doors for efficient code generation on limited hardware.

New research reveals that shrinking large language models isn’t always a straightforward trade-off, exposing two fundamentally different ways these systems can break down.
![A testbed spanning Galicia and the Basque Country demonstrates a hybrid quantum-classical key distribution network, utilizing physically secured [latex]QKD[/latex] links-propagating keys via [latex]ETSI\,020[/latex] with [latex]QKD[/latex] and post-quantum cryptography-alongside [latex]ETSI\,020[/latex] interfaces secured solely with post-quantum cryptography, while vendor key management systems distribute [latex]QKD[/latex] keys via [latex]ETSI\,014[/latex] calls to key management transfer station nodes.](https://arxiv.org/html/2604.20376v1/x1.png)
A new approach to key distribution leverages hybrid quantum and post-quantum cryptography to connect geographically separated quantum key distribution systems.
New research reveals the surprising atomic architecture within Gd-based metallic glasses, linking their unusual properties to a dynamic interplay of short-range order and interstitial atoms.

A new study reveals that current information retrieval systems struggle significantly when faced with queries that blend multiple languages, exposing a critical weakness in real-world multilingual search.
![At weak coupling, the calculated light-matter entanglement entropy closely matches a quasi-linear prediction [latex] (42) [/latex] for the Su-Schrieffer-Heeger ground state with [latex] t_{1} = 1 [/latex] and [latex] t_{2} = 0 [/latex], though deviations emerge at stronger coupling as additional dipole sectors become distinguishable.](https://arxiv.org/html/2604.18670v1/x3.png)
New research reveals how strong light-matter interactions can give rise to unexpected entanglement patterns and emergent symmetries in quantum systems.
An analysis of the Signalgate leak reveals that even technically sound encryption can fail when confronted with complex socio-technical realities and inadequate threat modeling.