257 | -- | 265 | Fuzhi Zhang, Shuangxia Sun, Huawei Yi. Robust collaborative recommendation algorithm based on kernel function and Welsch reweighted M-estimator |
266 | -- | 276 | Qingju Wang, Zhiqiang Liu, Deniz Toz, Kerem Varici, Dawu Gu. Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192 |
277 | -- | 283 | Le Dong, Yanling Wang, Wenling Wu, Jian Zou. Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes |
284 | -- | 287 | Myong-Son Sin, Ryul Kim. Some new results on equivalency of collusion-secure properties for Reed-Solomon codes |
288 | -- | 293 | Zhuohua Liu, Chuankun Wu. Privacy of a randomised skip lists-based protocol |
294 | -- | 301 | Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref. Biclique cryptanalysis of the full-round KLEIN block cipher |