| 1581 | -- | 1593 | Susan G. Barwick, Alice M. W. Hui, Wen-Ai Jackson. A geometric description of the Figueroa plane |
| 1595 | -- | 1605 | Henk D. L. Hollmann, Karan Khathuria, Ago-Erik Riet, Vitaly Skachek. On some batch code properties of the simplex code |
| 1607 | -- | 1625 | Alexander Shaporenko. Derivatives of bent functions in connection with the bent sum decomposition problem |
| 1627 | -- | 1644 | Jérôme Ducoat, Frédérique E. Oggier. Rank weight hierarchy of some classes of polynomial codes |
| 1645 | -- | 1684 | Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Takahiro Matsuda 0002, Jacob C. N. Schuldt. Maliciously circuit-private multi-key FHE and MPC based on LWE |
| 1685 | -- | 1694 | Simeon Ball. Grassl-Rötteler cyclic and consta-cyclic MDS codes are generalised Reed-Solomon codes |
| 1695 | -- | 1711 | Zhao Hu, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang. The differential spectrum and boomerang spectrum of a class of locally-APN functions |
| 1713 | -- | 1736 | Han-Bing Yu, Qun-Xiong Zheng, Yi-jian Liu, Jingguo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun. An improved method for predicting truncated multiple recursive generators with unknown parameters |
| 1737 | -- | 1750 | Hopein Christofen Tang, Djoko Suprijanto. A general family of Plotkin-optimal two-weight codes over $\mathbb {Z}_4$ |
| 1751 | -- | 1778 | Reo Eriguchi, Noboru Kunihiro, Koji Nuida. Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures |
| 1779 | -- | 1811 | Jiabo Wang, Cong Ling 0001. Polar sampler: A novel Bernoulli sampler using polar codes with application to integer Gaussian sampling |
| 1813 | -- | 1843 | Makoto Araya, Masaaki Harada. Some restrictions on the weight enumerators of near-extremal ternary self-dual codes and quaternary Hermitian self-dual codes |
| 1845 | -- | 1872 | Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay. Short attribute-based signatures for arbitrary Turing machines from standard assumptions |
| 1873 | -- | 1888 | Fengwei Li. Cyclic codes of length 5p with MDS symbol-pair |
| 1889 | -- | 1910 | Zhongxiao Wang, Xiaoxin Zhao, Qunxiong Zheng, Xiutao Feng, Zehao Sun. The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited |
| 1911 | -- | 1921 | Nicola Durante, Giovanni Longobardi, Valentina Pepe. $(d,\varvec{\sigma })$-Veronese variety and some applications |
| 1923 | -- | 1934 | Hui Han 0002, Jianjun Mu, Xiaopeng Jiao, Yu-Cheng He, Zhanzhan Zhao. Constructions of multi-permutation codes correcting a single burst of deletions |
| 1935 | -- | 1949 | Michel Lavrauw, John Sheekey. 4 |
| 1951 | -- | 1971 | Máté Gyarmati. Secret sharing on regular bipartite access structures |
| 1973 | -- | 2003 | Monika Yadav, Anuradha Sharma. A recursive method for the construction and enumeration of self-orthogonal and self-dual codes over the quasi-Galois ring $\mathbb {F}_{2^r}[u]/$ |
| 2005 | -- | 2020 | Elisa Gorla, Cristina Landolina. Quasi optimal anticodes: structure and invariants |
| 2021 | -- | 2055 | Lin Jiao, Yonglin Hao, Yongqiang Li 0001. Guess-and-determine attacks on SNOW-Vi stream cipher |
| 2057 | -- | 2075 | Wenxiao Qiao, Hailun Yan, Siwei Sun, Lei Hu, Jiwu Jing. New cryptanalysis of LowMC with algebraic techniques |
| 2077 | -- | 2105 | María Chara, Sam Kottler, Beth Malmskog, Bianca Thompson, Mckenzie West. Minimum distance and parameter ranges of locally recoverable codes with availability from fiber products of curves |
| 2107 | -- | 2115 | Daniel M. Gordon. Signed difference sets |