| 3463 | -- | 3479 | B. G. Rodrigues, Patrick Solé. Primitive rank 3 groups, binary codes, and 3-designs |
| 3481 | -- | 3505 | Niklas Gassner, Julia Lieb, Abhinaba Mazumder, Michael Schaller. Information-set decoding for convolutional codes |
| 3507 | -- | 3519 | Sergey Bezzateev, Natalia A. Shekhunova. Self-reversible generalized (L,G)-codes |
| 3521 | -- | 3541 | Antonio Corbo Esposito, Rosa Fera, Francesco Romeo. Hilbert series and degrees of regularity of Oil & Vinegar and mixed quadratic systems |
| 3543 | -- | 3563 | Javier Herranz, Germán Sáez. (k, n)-Consecutive access structures |
| 3565 | -- | 3573 | R. Julian R. Abel, Ingo Janiszczak, Reiner Staszewski. Improvements for lower bounds of mutually orthogonal Latin squares of sizes 54, 96 and 108 |
| 3575 | -- | 3591 | Hajime Matsui, Kakeru Kaneko. Entanglement-assisted quantum error-correcting codes via quasi-cyclic codes with complementary duals |
| 3593 | -- | 3618 | Giulia Cavicchioni, Eleonora Guerrini, Alessio Meneghetti. A class of locally recoverable codes over finite chain rings |
| 3619 | -- | 3640 | Frederique Oggier, Shengwei Liu, Hongwei Liu. About the Rankin and Bergé-Martinet constants from a coding theory view point |
| 3641 | -- | 3669 | Kamel Mohamed Faraoun, Nadia El Mrabet. Optimizing and securing GLV multiplication over BLS pairings-friendly curves |
| 3671 | -- | 3687 | Yuehui Cui, Jinquan Luo. Differential uniformity and constacyclic code from some power mapping |
| 3689 | -- | 3705 | Søren Fuglede Jørgensen. On the clique covering numbers of Johnson graphs |
| 3707 | -- | 3731 | Yanyan Zhou, SenPeng Wang, Yunong Wu, Bin Hu. Improved method of searching for boomerang distinguishers on Feistel structures-applications to WARP, TWINE, LBlock, LBlock-s, and ALLPC |
| 3733 | -- | 3760 | Shakir Ali, Nuh Aydin, Pushpendra Sharma, Elif Segah Oztas, Atif Ahmad Khan. Constacyclic codes over general mixed alphabets and their applications |
| 3761 | -- | 3808 | Xiaoen Lin, Le He, Zhengrong Lu, Yantian Shen, Chongxu Ren, Hongbo Yu. Internal differential structure: preimage attacks on up to 5-round Keccak |
| 3809 | -- | 3861 | Danilo Francati, Daniele Venturi 0001. Evolving secret sharing revisited: computational security and succinctness |
| 3863 | -- | 3874 | Marco Buratti, Anita Pasotti. Shiftable Heffter spaces |
| 3875 | -- | 3902 | Sergiy V. Borodachov, Peter G. Boyvalenkov, Peter D. Dragnev, Douglas P. Hardin, Edward B. Saff, Maya Stoyanova. Bounds on discrete potentials of spherical (k, k)-designs |
| 3903 | -- | 3932 | Mrinal Kanti Bose, Udaya Parampalli, Abhay Kumar Singh. Binary cyclic codes from permutation polynomials over ${\mathbb {F}}_{2^m}$ |
| 3933 | -- | 3953 | Danyao Wu, Pingzhi Yuan. The compositional inverses of the permutation polynomials from trace functions over finite fields |
| 3955 | -- | 4017 | Hao Lin 0012, Mingqiang Wang, Weiqiang Wen, Shifeng Sun 0001, Kaitai Liang. Generic construction of threshold ring signatures and lattice-based instantiations |
| 4019 | -- | 4042 | Hiroki Kajiura, Koji Momihara, Utano Ogata. Divisible pre-difference sets for approximating integrations over finite groups |
| 4043 | -- | 4081 | Yong Liu, Zejun Xiang 0001, Xiangyong Zeng, Shasha Zhang. A novel algorithm for the k-XOR problem |
| 4083 | -- | 4112 | Tongliang Zhang, Haibin Kan, Lijing Zheng, Jie Peng 0001, Hanbing Zhao. Further results on permutation pentanomials over finite fields with characteristic two |
| 4113 | -- | 4115 | Simeon Ball, Michel Lavrauw, Tabriz Popatia. Correction to: Griesmer type bounds for additive codes over finite fields, integral and fractional MDS codes |