383 | -- | 390 | Michael Braun. q-Analogs of t-wise balanced designs from Borel subgroups |
391 | -- | 408 | Longjiang Qu, Yin Tan, Chao Li, Guang Gong. 2k |
409 | -- | 424 | Natalia Silberstein, Anna Gál. Optimal combinatorial batch codes based on block designs |
425 | -- | 440 | Christina Delfs, Steven D. Galbraith. p |
441 | -- | 461 | Özgür Dagdelen, David Galindo, Pascal Véron, Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel. Extended security arguments for signature schemes |
463 | -- | 471 | Sho Suda. A two-fold cover of strongly regular graphs with spreads and association schemes of class five |
473 | -- | 491 | Adonus L. Madison, Junhua Wu. Conics arising from external points and their binary codes |
493 | -- | 526 | Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang. Generic constructions of integrated PKE and PEKS |
527 | -- | 531 | Antonio Cossidente, Francesco Pavese. On subspace codes |
533 | -- | 545 | Di Wu, Wenfeng Qi, Huajin Chen. On the spectral immunity of periodic sequences restricted to binary annihilators |
547 | -- | 581 | Praveen Gauravaram, Nasour Bagheri, Lars R. Knudsen. Building indifferentiable compression functions from the PGV compression functions |