1377 | -- | 1389 | Joaquim Borges, Cristina Fernández-Córdoba. 2[u]-linear codes |
1391 | -- | 1403 | Philippe Gaborit, Ayoub Otmani, Hervé Talé Kalachi. Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes |
1405 | -- | 1410 | David Clayton. A note on almost difference sets in nonabelian groups |
1411 | -- | 1449 | Shuai Han, Shengli Liu, Lin Lyu. Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system |
1451 | -- | 1467 | Hai Q. Dinh, Abhay Kumar Singh, Sukhamoy Pattanayak, Songsak Sriboonchitta. 2 |
1469 | -- | 1481 | Kai-Uwe Schmidt. Hermitian rank distance codes |
1483 | -- | 1497 | Zibi Xiao, Xiangyong Zeng, Chunlei Li, Tor Helleseth. 2 |
1499 | -- | 1525 | Jingyuan Chen, Lijun Ji, Yun Li. Combinatorial constructions of optimal (m, n, 4, 2) optical orthogonal signature pattern codes |
1527 | -- | 1540 | SenPeng Wang, Bin Hu, Yan Liu. The autocorrelation properties of single cycle polynomial T-functions |
1541 | -- | 1552 | Qian Wang, Chenhui Jin. Upper bound of the length of truncated impossible differentials for AES |
1553 | -- | 1563 | Li Shuai, Miao Li. A method to calculate differential uniformity for permutations |
1565 | -- | 1572 | Jianfa Qian, Lina Zhang. On MDS linear complementary dual codes and entanglement-assisted quantum codes |
1573 | -- | 1588 | Hadi Kharaghani, Sho Suda. Unbiased orthogonal designs |