1 | -- | 13 | Yu Zhou, Jianyong Hu, Xudong Miao, Yu Han, Fuzhong Zhang. On the confusion coefficient of Boolean functions |
14 | -- | 19 | Andrea Basso 0002, Fabien Pazuki. On the supersingular GPST attack |
20 | -- | 48 | Paolo Santini, Edoardo Persichetti, Marco Baldi. Reproducible families of codes and cryptographic applications |
49 | -- | 63 | Matthew J. Craven, John R. Woodward. Evolution of group-theoretic cryptology attacks using hyper-heuristics |
64 | -- | 72 | Nael Rahman, Vladimir Shpilrain. MAKE: A matrix action key exchange |
73 | -- | 97 | Bishwajit Chakraborty 0002, Mridul Nandi. The mF mode of authenticated encryption with associated data |
98 | -- | 102 | Daniel R. L. Brown, Neal Koblitz, Jason T. LeGrow. Cryptanalysis of "MAKE" |
103 | -- | 113 | Mingping Qi. An efficient post-quantum KEM from CSIDH |
114 | -- | 140 | Mikhail Anokhin. Pseudo-free families and cryptographic primitives |
141 | -- | 155 | Simran Tinani, Joachim Rosenthal. A deterministic algorithm for the discrete logarithm problem in a semigroup |
156 | -- | 197 | Samed Düzlü, Juliane Krämer. Application of automorphic forms to lattice problems |
198 | -- | 204 | Prasanna Raghaw Mishra, Shashi Kant Pandey. On the algebraic immunity of multiplexer Boolean functions |
205 | -- | 214 | Javad Sharafi, Hassan Daghigh. A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme |
215 | -- | 232 | Liljana Babinkostova, Ariana Chin, Aaron Kirtland, Vladyslav Nazarchuk, Esther Plotnick. The polynomial learning with errors problem and the smearing condition |
233 | -- | 250 | Carolina Mejía, Juan Andrés Montoya. Abelian sharing, common informations, and linear rank inequalities |
251 | -- | 277 | Srinivas Vivek 0001, Shyam Murthy, Deepak Kumaraswamy. Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting |
278 | -- | 288 | Jiao Han, Jincheng Zhuang. DLP in semigroups: Algorithms and lower bounds |
289 | -- | 297 | Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti. On the efficiency of a general attack against the MOBS cryptosystem |
298 | -- | 309 | Dmitrii Koshelev. j-invariant 1728 |
310 | -- | 319 | Madhu Dadhwal, Pankaj. Group codes over binary tetrahedral group |