| 1757 | -- | 1786 | Junqing Gong, Haifeng Qian. Simple and efficient FE for quadratic functions |
| 1787 | -- | 1837 | Varsha Chauhan, Anuradha Sharma, Sandeep Sharma, Monika Yadav. Hamming weight distributions of multi-twisted codes over finite fields |
| 1839 | -- | 1852 | Shoko Chisaki, Ryoh Fuji-Hara, Nobuko Miyamoto. A construction for circulant type dropout designs |
| 1853 | -- | 1873 | Giovanni Zini, Ferdinando Zullo. Scattered subspaces and related codes |
| 1875 | -- | 1905 | Ling Song 0001, Yi Tu, Danping Shi, Lei Hu. Security analysis of Subterranean 2.0 |
| 1907 | -- | 1926 | Sebati Ghosh, Palash Sarkar 0001. Breaking tweakable enciphering schemes using Simon's algorithm |
| 1927 | -- | 1963 | Atsushi Takayasu. Tag-based ABE in prime-order groups via pair encoding |
| 1965 | -- | 1992 | Atsushi Takayasu. Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity |
| 1993 | -- | 2007 | Ziling Heng, Dexiang Li, Jiao Du, Fuling Chen. A family of projective two-weight linear codes |
| 2009 | -- | 2030 | Xiaoqiang Wang 0001, Dabin Zheng, Yan Zhang. Binary linear codes with few weights from Boolean functions |
| 2031 | -- | 0 | Ruikai Chen, Sihem Mesnager, Chang-An Zhao. Correction to: Good polynomials for optimal LRC of low locality |