| 2627 | -- | 2647 | Wei Lu 0022, Xia Wu, Yufei Wang, Xiwang Cao. A general construction of regular complete permutation polynomials |
| 2649 | -- | 2663 | Isabel Byrne, Natalie Dodson, Ryan Lynch, Eric Pabón-Cancel, Fernando Piñero-González. Improving the minimum distance bound of Trace Goppa codes |
| 2665 | -- | 2676 | Hao Chen. New MDS entanglement-assisted quantum codes from MDS Hermitian self-orthogonal codes |
| 2677 | -- | 2686 | Yan Liu, Jianguo Lei. More results on large sets of Kirkman triple systems |
| 2687 | -- | 2704 | Zhongya Zhang, Wenling Wu, Han Sui, Bolin Wang. Post-quantum security on the Lai-Massey scheme |
| 2705 | -- | 2721 | Jaap-Henk Hoepman. Two faces of blindness |
| 2723 | -- | 2735 | Bagher Bagherpour. A bivariate polynomial-based cryptographic hard problem and its applications |
| 2737 | -- | 2754 | Yan Zhu. Optimal and extremal graphical designs on regular graphs associated with classical parameters |
| 2755 | -- | 2768 | Xiantong Tan, Haode Yan. Differential spectrum of a class of APN power functions |
| 2769 | -- | 2778 | Erzhong Xue, Zilong Wang 0001. The q-ary Golay arrays of size 2˟ 2˟ ... ˟ 2 are standard |
| 2779 | -- | 2789 | Jiseung Kim 0001, Changmin Lee 0001. A polynomial time algorithm for breaking NTRU encryption with multiple keys |
| 2791 | -- | 2807 | Ting Lan, Weijun Liu, Fugang Yin. Block-transitive 3-(v, k, 1) designs associated with alternating groups |