| 1 | -- | 0 | Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie. Simulation secure multi-input quadratic functional encryption: applications to differential privacy |
| 2 | -- | 0 | Joo Woo, Jonghyun Kim, Ga Hee Hong, Seungwoo Lee, Minkyu Kim, HoChang Lee, Jong Hwan Park. NTRU+Sign: compact NTRU-based signatures using bimodal distributions |
| 3 | -- | 0 | Michele Battagliola, Riccardo Longo, Alessio Meneghetti. Extensible decentralized secret sharing and application to Schnorr signatures |
| 4 | -- | 0 | Wanbao Zhang, Zhilin Zhang, Shenglin Zhou. On flag-transitive quasi-symmetric 2-designs |
| 5 | -- | 0 | Jianming Lin, Damien Robert 0001, Chang-An Zhao, Yuhao Zheng. Biextensions in pairing-based cryptography |
| 6 | -- | 0 | Yaoda Hu, Yu Zhang, Wenling Wu. Construction of correctors using resilient fragmentary Boolean functions |
| 7 | -- | 0 | Huilan Chang, Ching-Chih Hsu. Lemmas on traceability codes and an upper bound for 4-traceability |
| 8 | -- | 0 | Mahir Bilen Can. MDS stabilizer poset codes |
| 9 | -- | 0 | Tomer Ashur, Amit Singh Bhati. Generalized indifferentiable sponge and its application to Polygon Miden VM |
| 10 | -- | 0 | Sanjit Bhowmick, Deepak Kumar Dalai, Sihem Mesnager. On construction of linear (Euclidean) hull codes over finite extensions binary fields |
| 11 | -- | 0 | Amin Saeidi, Hadiseh Saydi, Thekiso Seretlo. A new method for constructing designs and codes from the conjugacy classes of groups |
| 12 | -- | 0 | Tingting Wu, Lanqiang Li, Xiuyu Zhang, Shixin Zhu. Binary duadic codes and their related codes with a square-root-like lower bound |
| 13 | -- | 0 | Leijo Jose, Anuradha Sharma. On Eisenstein additive codes over chain rings and linear codes over mixed alphabets |
| 14 | -- | 0 | Hao Chen, Shengwei Liu, Conghui Xie, Hongwei Liu. Optimal CIS codes, optimal t-CIS codes and their applications in cryptography |
| 15 | -- | 0 | Giuseppe D'Alconzo, Andre Esser 0001, Andrea Gangemi, Carlo Sanna. Sneaking up the ranks: Partial key exposure attacks on rank-based schemes |
| 16 | -- | 0 | Giulia Cavicchioni, Alessio Meneghetti, Giovanni Tognolini. Information set decoding for ring-linear codes |
| 17 | -- | 0 | Chunyan Qin, Gaojun Luo, Bocong Chen. New construction of non-expandable (1, k)-overlap-free codes |
| 18 | -- | 0 | Mohsen Bayat, Nasrin Soltankhah. On flag-transitive 2-designs with prime block length and projective special linear groups |
| 19 | -- | 0 | Zixiang Xu, Chi Hoi Yip. Intersective sets over abelian groups |
| 20 | -- | 0 | Andrea C. Burgess, Peter Danziger, Daniel Horsley, Muhammad Tariq Javed. Packing designs with large block size |
| 21 | -- | 0 | Yanzhi Li, Wenjie Zhong, Tingting Chen, Xiande Zhang. Improved bounds for codes over trees |
| 22 | -- | 0 | Ivan N. Landjev, Emiliyan Rogachev, Assia Rousseva. Characterization of some minihypers in ${{\,\textrm{PG}\,}}(r,3)$ and the nonexistence of some ternary Griesmer codes |
| 23 | -- | 0 | Shun Zhang, Tairong Shi, SenPeng Wang, Jie Guan, Mingyao Gao. Improved preimage attacks on Ascon-XOF based on linearization technique |
| 24 | -- | 0 | Sanjit Chatterjee, Tapas Pandit, Subhabrata Samajder. Multi-splitting forking based modular security of signatures in multivariate quadratic setting |
| 25 | -- | 0 | Yao Tian, Hengfeng Jin, Fang-Wei Fu 0001. Weight distributions of two classes of optimal (r,δ )-locally repairable codes |