| 2897 | -- | 2918 | Julia Lieb, Raquel Pinto, Carlos Vela. A new method for erasure decoding of convolutional codes |
| 2919 | -- | 2930 | Eric Kubischta, Ian Teixeira. Quantum codes and irreducible products of characters |
| 2931 | -- | 2945 | Giacomo Micheli, Vincenzo Pallozzi Lavorante, Abhi Shukul, Noah Smith. Constructions of locally recoverable codes with large availability |
| 2947 | -- | 2969 | Joonas Ahola, Iván Blanco-Chacón, Wilmar Bolaños, Antti Haavikko, Camilla Hollanti, Rodrigo Martín Sánchez-Ledesma. Fast multiplication and the PLWE-RLWE equivalence for an infinite family of maximal real subfields of cyclotomic fields |
| 2971 | -- | 2992 | Hai Liu, Chunyu Gan, Chengju Li, Xueying Shi. Constructions of binary cyclic codes with minimum weights exceeding the square-root lower bound |
| 2993 | -- | 3009 | Matteo Bonini, Martino Borello, Eimear Byrne. The geometry of covering codes in the sum-rank metric |
| 3011 | -- | 3027 | Yuqing Zhu 0003, Chang Lv, Jiqiang Liu. Utilizing two subfields to accelerate individual logarithm computation in extended tower number field sieve |
| 3029 | -- | 3068 | Altan Berdan Kilic, Anne Nijsten, Ruud Pellikaan, Alberto Ravagnani. Knot theory and error-correcting codes |
| 3069 | -- | 3082 | Chengyu Sun, Xin Wang. New upper bounds for wide-sense frameproof codes |
| 3083 | -- | 3105 | Axel Lemoine, Rocco Mora, Jean-Pierre Tillich. Understanding the new distinguisher of alternant codes at degree 2 |
| 3107 | -- | 3133 | Xue Jia, Qin Yue 0001, Huan Sun. Coding properties and automorphism groups of two classes of twisted generalized Reed-Solomon codes |
| 3135 | -- | 3142 | Joshua Cooper, Jack Hyatt. Permutations minimizing the number of collinear triples |
| 3143 | -- | 3157 | Max Schulz. Rational transformations over finite fields that are never irreducible |
| 3159 | -- | 3179 | Andrea C. Burgess, Nicholas J. Cavenagh, Peter Danziger, David A. Pike. Weak colourings of Kirkman triple systems |
| 3181 | -- | 3205 | Shuiyin Liu, Amin Sakzad. Lattice codes for CRYSTALS-Kyber |
| 3207 | -- | 3225 | Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Celestin Nkuimi Jugnia. Avoiding trusted setup in isogeny-based commitments |
| 3227 | -- | 3241 | Zibi Xiao, Yaya Ye, Zhiye Yang, Xiangyong Zeng. n |
| 3243 | -- | 3281 | Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann 0004, Léo Perrin, Lukas Stennes. Commutative cryptanalysis as a generalization of differential cryptanalysis |
| 3283 | -- | 3302 | Lev Yohananov, Moshe Schwartz 0001. On the coding capacity of reverse-complement and palindromic duplication-correcting codes |
| 3303 | -- | 3335 | Makhan Maji, Sihem Mesnager, Santanu Sarkar 0001, Kalyan Hansda. Characterizations for minimal codes: graph theory approach and algebraic approach over finite chain rings |
| 3337 | -- | 3359 | Seyed Hassan Alavi. On flag-transitive symmetric (v, k, 4) designs |
| 3361 | -- | 3373 | Barbara Gatti, Gábor Korchmáros, Gábor Péter Nagy, Vincenzo Pallozzi Lavorante, Gioia Schulte. Evaluation codes arising from symmetric polynomials |
| 3375 | -- | 3412 | Chun Guo 0002, Xiao Wang 0012, Kang Yang 0002, Yu Yu 0001. On tweakable correlation robust hashing against key leakages |
| 3413 | -- | 3436 | Gretchen L. Matthews, Emily McMillon. A combinatorial approach to avoiding weak keys in the BIKE cryptosystem |
| 3437 | -- | 3462 | Zuo Ye, Omer Sabary, Ryan Gabrys, Eitan Yaakobi, Ohad Elishco. More on codes for combinatorial composite DNA |