955 | -- | 956 | Pascale Charpin, Philippe Langevin. Obituary of Jacques Wolfmann (1932-2018) |
957 | -- | 970 | Alice M. W. Hui, Muhammad Adib Surani, Sanming Zhou. The vertex-isoperimetric number of the incidence and non-incidence graphs of unitals |
971 | -- | 986 | Yuqing Zhu 0003, Jincheng Zhuang, Hairong Yi, Chang Lv, Dongdai Lin. A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity |
987 | -- | 993 | Mariusz Meszka, Magdalena Tyniec. Orthogonal one-factorizations of complete multipartite graphs |
995 | -- | 1003 | Alexander M. Romanov. On non-full-rank perfect codes over finite fields |
1005 | -- | 1033 | Junji Shikata, Yohei Watanabe 0001. Identity-based encryption with hierarchical key-insulation in the standard model |
1035 | -- | 1058 | Yanbin Li, Meiqin Wang. Cryptanalysis of MORUS |
1059 | -- | 1068 | Shoko Chisaki, Yui Kimura, Nobuko Miyamoto. A recursive construction for difference systems of sets |
1069 | -- | 1086 | Giacomo Micheli, Violetta Weger. Cryptanalysis of the CLR-cryptosystem |
1087 | -- | 1108 | Ziling Heng, Cunsheng Ding. A construction of q-ary linear codes with irreducible cyclic codes |
1109 | -- | 1136 | Darcy Best, Trent G. Marbach, Rebecca J. Stones, Ian M. Wanless. Covers and partial transversals of Latin squares |
1137 | -- | 1160 | Zuling Chang, Martianus Frederic Ezerman, San Ling, Huaxiong Wang. On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials |
1161 | -- | 1182 | Huiqin Xie, Li Yang. Using Bernstein-Vazirani algorithm to attack block ciphers |
1183 | -- | 1197 | Vladimir Edemskiy, Chunlei Li, Xiangyong Zeng, Tor Helleseth. n |