Hidden in Plain Sight: Securing Text with Diffusion Models

Researchers have developed a new method for concealing messages within text that is both demonstrably secure and remarkably resistant to detection.

Researchers have developed a new method for concealing messages within text that is both demonstrably secure and remarkably resistant to detection.

A new co-design framework dramatically improves the performance of small language models on resource-constrained devices.
![The study demonstrates that shaping and optimization-based modulation schemes, specifically with a parameter setting of [latex]M=16[/latex], allow for nuanced control over a system’s behavior, suggesting that complex outcomes can be achieved by carefully calibrating these fundamental parameters.](https://arxiv.org/html/2601.15004v1/Figure_02_Constellations_Part2.png)
Optimizing modulation schemes for power consumption, alongside traditional metrics, is becoming increasingly critical for the future of wireless networks.
![A procedure designed to minimize breaks in data comparison-initially requiring 12 breaks-can be optimized through targeted merging of substrings, progressively reducing the break count to 6 by accepting a corresponding increase in omitted bits, with the most efficient merges achieved by prioritizing the shortest substrings-such as [latex]c_3[/latex], [latex]c_5[/latex], and [latex]c_2[/latex]-to balance computational cost and data loss.](https://arxiv.org/html/2601.14623v1/x4.png)
A new coding scheme offers robust data recovery even when information is broken into arbitrary pieces and some are irretrievably lost.
A new implementation combines post-quantum cryptography with established symmetric encryption to deliver secure communication in the age of quantum computing.
![Distinct schedules for measuring the [latex]ZZZZZZZZ[/latex] syndrome within a quantum circuit exhibit differing logical error rates, as demonstrated by the timing of Pauli checks between data and ancilla qubits across surface code patches.](https://arxiv.org/html/2601.12509v1/x1.png)
A new framework uses Monte Carlo Tree Search to dramatically improve the efficiency of syndrome measurement circuits, a critical step in protecting quantum information.
New research characterizes the quantum complexity class QMA through interactive quantum proofs, offering insights into the limits of efficient computation.
A new framework leverages code-based cryptography to enable secure aggregation of data, even in the face of quantum computing threats.

A new framework assesses the resilience of common communication protocols – MQTT, HTTP, and HTTPS – against the looming threat of quantum computing.

A new framework assesses the real-world resilience of post-quantum cryptography on constrained devices, moving beyond simple performance tests.