3859 | -- | 3875 | Yi Li, Xiutao Feng, Qiang Wang. i+ax over ${\mathbb {F}}_{2^n}$ |
3877 | -- | 3894 | Haiyan Guan, Shenglin Zhou. 2,k,λ ) designs |
3895 | -- | 3918 | Shi Bai 0001, Hansraj Jangir, Tran Ngo, William Youmans. An algebraic algorithm for breaking NTRU with multiple keys |
3919 | -- | 3953 | Jinrui Sha, Shengli Liu, Shuai Han 0001. Functional commitments for arbitrary circuits of bounded sizes |
3955 | -- | 3979 | Yue Gao 0001, Weijun Fang, Jingke Xu, Dong Wang, Sihuang Hu. Optimal (2,δ ) locally repairable codes via punctured simplex codes |
3981 | -- | 4009 | Ferruh Özbudak, Buket Özkaya. New distance bounds for quasi-cyclic codes |
4011 | -- | 4033 | Deepak Agrawal, Srinivasan Krishnaswamy, Smarajit Das. On Boolean functions derived from linear maps over $\mathbb {Z}_4$ and their application to secret sharing |
4035 | -- | 4055 | Noy Soffer Aranov, Angelot Behajaina. On the maximum size of ultrametric orthogonal sets over discrete valued fields |
4057 | -- | 4083 | Robert Christian Subroto. An algebraic approach to circulant column parity mixers |
4085 | -- | 4097 | Melek Çil, Baris Bülent Kirlar. On the construction of certain odd degree irreducible polynomials over finite fields |
4099 | -- | 4129 | Feixiang Zhao, Jian Weng 0001, Wenli Xie, Lin Hou, Ming Li 0049. Time-based attribute-based proxy re-encryption with decryption key update |
4131 | -- | 4143 | Simon Masson, Antonio Sanso, Zhenfei Zhang. Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field |
4145 | -- | 4168 | Alexander Barg, Ohad Elishco, Ryan Gabrys, Geyang Wang, Eitan Yaakobi. Storage codes and recoverable systems on lines and grids |
4169 | -- | 4187 | Yiwen Gao, Yuan Li, Haibin Kan. On the uniqueness of balanced complex orthogonal design |
4189 | -- | 4194 | Zoltán Füredi, Alexandr V. Kostochka, Mohit Kumbhat. Minimal abundant packings and choosability with separation |
4195 | -- | 4211 | Nicola Durante, Giovanni Giuseppe Grimaldi, Giovanni Longobardi. Non-linear MRD codes from cones over exterior sets |
4213 | -- | 4230 | Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang 0005. Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions |
4231 | -- | 4245 | Ajani De Vas Gunasekara, Alice Devillers. Transitive path decompositions of Cartesian products of complete graphs |
4247 | -- | 4277 | Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau. Binary cyclic-gap constant weight codes with low-complexity encoding and decoding |
4279 | -- | 4285 | Zhiguo Ding 0005, Michael E. Zieve. Two classes of exceptional m-to-1 rational functions |
4287 | -- | 4311 | Yingyin Pan, Jianghua Zhong, Dongdai Lin. Generalized cycle joining method and its application to the construction of long-period Galois NFSRs |
4313 | -- | 4333 | Ákos K. Matszangosz, Ferenc Szöllosi. A characterization of complex Hadamard matrices appearing in families of MUB triplets |
4335 | -- | 4352 | Rong Luo, Mingliang Yan, Sihem Mesnager, Dongchun Han. On Abelian one-dimensional hull codes in group algebras |
4353 | -- | 4422 | Yadi Wei, Jiaxin Wang, Fang-Wei Fu. Association schemes arising from non-weakly regular bent functions |
4423 | -- | 4451 | Kazuhiko Minematsu, Shingo Sato, Junji Shikata. Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing |
4453 | -- | 4486 | Shuping Mao, Tingting Guo, Peng Wang 0009, Ruozhou Xu, Yuchao Chen, Lei Hu. A quantum-secure partial parallel MAC QPCBC |
4487 | -- | 4509 | Guangkui Xu, Xiwang Cao, Gaojun Luo, Huawei Wu. Infinite families of 3-designs from special symmetric polynomials |
4511 | -- | 4530 | Carlos Aguilar Melchor, Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit, Jérôme Lacan, Gilles Zémor. Efficient error-correcting codes for the HQC post-quantum cryptosystem |
4531 | -- | 4548 | Shuyu Luo, Weiqiong Wang, Qi Zhang, Zhenjie Song. Constructions of plateaued correctors with high correction order and good nonlinearity via Walsh spectral neutralization technique |
4549 | -- | 4591 | Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia. Truncated differential cryptanalysis: new insights and application to QARMAv1-n and QARMAv2-64 |