| 26 | -- | 0 | Alessandro Montinaro. On the systems of Higman |
| 27 | -- | 0 | Sebastian Petit, Geertrui Van de Voorde. On certain blocking sets and the minimum weight of the code of generalised polygons |
| 28 | -- | 0 | Priyanka Dutta 0001, Willy Susilo, Fuchun Guo, Dung Hoang Duong. PAORE: public-key authenticated order-revealing encryption |
| 29 | -- | 0 | Can Xiang, Chunming Tang 0001. Ternary self-orthogonal codes from square functions |
| 30 | -- | 0 | Anton Betten. Large sets of Desargues configurations |
| 31 | -- | 0 | Subrata Manna. Maximum number of points of intersection of a non-degenerate Hermitian variety and a cubic hypersurface |
| 32 | -- | 0 | Yun Ding, Shixin Zhu. The weight distributions and weight hierarchies of two classes of few-weight linear codes |
| 33 | -- | 0 | Chiara Castello, Heide Gluesing-Luerssen, Olga Polverino, Ferdinando Zullo. Quasi-optimal cyclic orbit codes |
| 34 | -- | 0 | Xiumei Li, Zongxi Chen, Fei Li 0010. Some three-weight linear codes and their complete weight enumerators and weight hierarchies |
| 35 | -- | 0 | Sam Adriaensen, Tamás Szonyi, Zsuzsa Weiner. Multisets with few special directions and small weight codewords in desarguesian planes |
| 36 | -- | 0 | Nour Alnajjarine, Michel Lavrauw. Linear complete symmetric rank-distance codes |
| 37 | -- | 0 | Thierno Mamoudou Sabaly, Marine Minier. Differential-linear attacks from new distinguishers |
| 38 | -- | 0 | Yu Zhang 0216, Wenling Wu, Yafei Zheng, Lei Zhang 0186, Yongxia Mao. Research on constructing integral distinguishers for block ciphers via the division property |
| 39 | -- | 0 | Stefka Bouyuklieva, Iliya Bouyukliev, Ferruh Özbudak. Sequence of numbers of linear codes with increasing hull dimensions |
| 40 | -- | 0 | Suyun Ding, Xiaoqin Zhan. Block-primitive 2-(v,k,λ ) designs with sporadic socle |
| 41 | -- | 0 | Joan-Josep Climent, Verónica Requena, Xaro Soler-Escrivà. Spread codes from Abelian non-cyclic groups |
| 42 | -- | 0 | Giuseppe D'Alconzo, Alessio Meneghetti, Edoardo Signorini. Group factorisation for smaller signatures from cryptographic group actions |
| 43 | -- | 0 | Kang Li, Shancheng Zhao, Jie Chen 0021, Jinming Wen. On the ability to approximate k-DSP of HKZ, BKZ and Slide reduction |
| 44 | -- | 0 | Monika Yadav, Anuradha Sharma. Recursive construction and enumeration of self-orthogonal and self-dual codes over finite commutative chain rings of even characteristic |
| 45 | -- | 0 | Haoyang Wang 0001, Jianing Zhang. Optimizing key recovery in impossible cryptanalysis and its automated tool |
| 46 | -- | 0 | Jean-Philippe Bossuat, Malika Izabachène. Large domain homomorphic evaluation for BFV-like schemes via ring repacking |
| 47 | -- | 0 | Nolan J. Coble, Alexander Barg. Coxeter codes: extending the Reed-Muller family |
| 48 | -- | 0 | Shreya Dey, Avijit Dutta, Kazuhiko Minematsu. Two-key variant of the four-round cascading sfLRW1 |