373 | -- | 384 | Masaaki Harada. On a 5-design related to a putative extremal doubly even self-dual code of length a multiple of 24 |
385 | -- | 408 | Guo-qiang Liu, Chen-Hui Jin. Differential cryptanalysis of PRESENT-like cipher |
409 | -- | 430 | Bangteng Xu. Bentness and nonlinearity of functions on finite groups |
431 | -- | 449 | Orr Dunkelman, Nathan Keller, Adi Shamir. Almost universal forgery attacks on AES-based MAC's |
451 | -- | 468 | Susan G. Barwick, Wen-Ai Jackson. 3) |
469 | -- | 504 | Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama. Strongly secure authenticated key exchange from factoring, codes, and lattices |
505 | -- | 517 | Tung Le, Jamshid Moori. On the automorphisms of designs constructed from finite simple groups |
519 | -- | 535 | Steven T. Dougherty, Jon-Lark Kim, Yoonjin Lee. Codes over rings and Hermitian lattices |
537 | -- | 549 | Oktay Olmez. Plateaued functions and one-and-half difference sets |
551 | -- | 569 | Anthony B. Evans, David Fear, Rebecca J. Stones. Diagonally cyclic equitable rectangles |
571 | -- | 587 | Claude Carlet, Deng Tang. Enhanced Boolean functions suitable for the filter model of pseudo-random generator |
589 | -- | 600 | Hengjia Wei, Hui Zhang 0004, Gennian Ge. Completely reducible super-simple designs with block size five and index two |
601 | -- | 627 | Orr Dunkelman, Nathan Keller. Practical-time attacks against reduced variants of MISTY1 |