1455 | -- | 1475 | Xiaoni Du, René RodrÃguez, Hao Wu. Infinite families of minimal binary codes via Krawtchouk polynomials |
1477 | -- | 1500 | Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso. Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives |
1501 | -- | 1516 | Laura Monroe. Optimal binary signed-digit representations of integers and the Stern polynomial |
1517 | -- | 1531 | Zhaoping Meng, Qingling Gao, Zhanggui Wu. A recursive construction of doubly resolvable Steiner quadruple systems |
1533 | -- | 1540 | Haode Yan, Yanan Yin. On the parameters of extended primitive cyclic codes and the related designs |
1541 | -- | 1597 | Qiqi Lai, Feng-Hao Liu, Zhedong Wang. Leakage-resilient sf IBE/sf ABE with optimal leakage rates from lattices |
1599 | -- | 1617 | Adam Michael Roberts. Self-dual codes from a block matrix construction characterised by group rings |
1619 | -- | 1635 | Kanchan Singh, Ritesh Kumar Pathak, Sheo Kumar Singh. Linear codes associated to determinantal varieties in the space of hermitian matrices |
1637 | -- | 1661 | Chun Guo, Yiyuan Luo, Chenyu Xiao. On the sequential indifferentiability of the Lai-Massey construction |
1663 | -- | 1728 | Xinxin Gong, Yonglin Hao, Qingju Wang 0001. Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW |
1729 | -- | 1746 | Yu-Chi Chen. A conceptually simple and generic construction of plaintext checkable encryption in the standard model |
1747 | -- | 1759 | Alexander M. Romanov 0001. Perfect mixed codes from generalized Reed-Muller codes |
1761 | -- | 1802 | Sabrina Kunzweiler. n)-isogenies |
1803 | -- | 1821 | Angelot Behajaina, Martino Borello, Javier de la Cruz, Wolfgang Willems. Twisted skew G-codes |
1823 | -- | 1843 | Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, Chang-An Zhao. Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees |