{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T15:57:54Z","timestamp":1772467074918,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030051525","type":"print"},{"value":"9783030051532","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05153-2_16","type":"book-chapter","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T15:42:30Z","timestamp":1546098150000},"page":"275-290","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Direct Constructions of (Involutory) MDS Matrices from Block Vandermonde and Cauchy-Like Matrices"],"prefix":"10.1007","author":[{"given":"Qiuping","family":"Li","sequence":"first","affiliation":[]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhuojun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,30]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Augot, D., Finiasz, M.: Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions. In: Proceedings of 2013 IEEE International Symposium on Information Theory (ISIT), pp. 1551\u2013C1555. IEEE (2013)","DOI":"10.1109\/ISIT.2013.6620487"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-46706-0_1","volume-title":"Fast Software Encryption","author":"D Augot","year":"2015","unstructured":"Augot, D., Finiasz, M.: Direct construction of recursive MDS diffusion layers using shortened BCH codes. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 3\u201317. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46706-0_1"},{"key":"16_CR3","unstructured":"Barreto, P.S., Rijmen, V.: The Khazad legacy-level block cipher. Submission to the NESSIE Project"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-319-03515-4_18","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"TP Berger","year":"2013","unstructured":"Berger, T.P.: Construction of recursive MDS diffusion layers from Gabidulin codes. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 274\u2013285. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-03515-4_18"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/978-3-662-53018-4_23","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"C Beierle","year":"2016","unstructured":"Beierle, C., Kranz, T., Leander, G.: Lightweight multiplication in $$GF(2^n)$$ with applications to MDS matrices. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9814, pp. 625\u2013653. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53018-4_23"},{"issue":"1","key":"16_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/18.746771","volume":"45","author":"M Blaum","year":"1999","unstructured":"Blaum, M., Roth, R.M.: On lowest density MDS codes. IEEE Trans. Inf. Theory 45(1), 46\u201359 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"16_CR7","doi-asserted-by":"publisher","first-page":"1998","DOI":"10.1109\/TC.2014.2346180","volume":"64","author":"T Cui","year":"2015","unstructured":"Cui, T., Jin, C., Kong, Z.: On compact cauchy matrices for substitution permutation networks. IEEE Trans. Comput. 64(7), 1998\u20132102 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-45325-3_20","volume-title":"Cryptography and Coding","author":"J Daemen","year":"2001","unstructured":"Daemen, J., Rijmen, V.: The wide trail design strategy. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 222\u2013238. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45325-3_20"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 222\u2013239. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_13"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_22"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-642-38553-7_3","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2013","author":"K Chand Gupta","year":"2013","unstructured":"Chand Gupta, K., Ghosh Ray, I.: On constructions of involutory MDS matrices. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 43\u201360. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38553-7_3"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Gazzoni Filho, D., Barreto, P., Rijmen, V.: The Maelstrom-0 hash function. In Proceedings of the 6th Brazilian Symposium on Information and Computer Systems Security (2006)","DOI":"10.5753\/sbseg.2006.20936"},{"issue":"1\u20132","key":"16_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10623-016-0233-4","volume":"82","author":"KC Gupta","year":"2017","unstructured":"Gupta, K.C., Pandey, S.K., Venkateswarlu, A.: On the direct construction of recursive MDS matrices. Des. Codes Crypt. 82(1\u20132), 77\u201394 (2017)","journal-title":"Des. Codes Crypt."},{"key":"16_CR14","unstructured":"Gauravaram, P., et al.: Gr\u00f8stl a SHA-3 candidate. In: Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik (2009)"},{"issue":"4","key":"16_CR15","doi-asserted-by":"crossref","first-page":"169","DOI":"10.46586\/tosc.v2017.i4.169-187","volume":"2017","author":"Z Guo","year":"2017","unstructured":"Guo, Z., Liu, R., Gao, S., Wu, W., Lin, D.: Direct construction of optimal rotational-XOR diffusion primitives. IACR Trans. Symmetric Cryptol. 2017(4), 169\u2013187 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/0024-3795(94)90189-9","volume":"192","author":"I Gohberg","year":"1994","unstructured":"Gohberg, I., Olshevsky, V.: Complexity of multiplication with vectors for structured matrices. Linear Algebra Appl. 192, 163\u2013192 (1994)","journal-title":"Linear Algebra Appl."},{"issue":"4","key":"16_CR17","doi-asserted-by":"publisher","first-page":"130","DOI":"10.13154\/tosc.v2017.i4.130-168","volume":"2017","author":"J Jean","year":"2017","unstructured":"Jean, J., Peyrin, T., Sim, S.M., Tourteaux, J.: Optimizing implementations of lightweight building blocks. IACR Trans. Symmetric Cryptol. 2017(4), 130\u2013168 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i4.130-168","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"188","DOI":"10.13154\/tosc.v2017.i4.188-211","volume":"2017","author":"T Kranz","year":"2017","unstructured":"Kranz, T., Leander, G., Stoffelen, K., Wiemer, F.: Shorter linear straight-line programs for MDS matrices yet another XOR count paper. IACR Trans. Symmetric Cryptol. 2017, 188\u2013211 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i4.188-211","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-662-44709-3_24","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"K Khoo","year":"2014","unstructured":"Khoo, K., Peyrin, T., Poschmann, A.Y., Yap, H.: FOAM: searching for hardware-optimal SPN structures and components with a fair comparison. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 433\u2013450. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3_24"},{"issue":"9","key":"16_CR20","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/LCOMM.2004.833807","volume":"8","author":"J Lacan","year":"2004","unstructured":"Lacan, J., Fimes, J.: Systematic MDS erasure codes based on Vandermonde matrices. IEEE Commun. Lett. 8(9), 570\u2013572 (2004)","journal-title":"IEEE Commun. Lett."},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-662-52993-5_6","volume-title":"Fast Software Encryption","author":"M Liu","year":"2016","unstructured":"Liu, M., Sim, S.M.: Lightweight MDS generalized circulant matrices. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 101\u2013120. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_6"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-662-52993-5_7","volume-title":"Fast Software Encryption","author":"Y Li","year":"2016","unstructured":"Li, Y., Wang, M.: On the construction of lightweight circulant involutory MDS matrices. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 121\u2013139. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_7"},{"issue":"1","key":"16_CR23","doi-asserted-by":"crossref","first-page":"129","DOI":"10.46586\/tosc.v2017.i1.129-155","volume":"2017","author":"C Li","year":"2017","unstructured":"Li, C., Wang, Q.: Design of lightweight linear diffusion layers from near-MDS matrices. IACR Trans. Symmetric Cryptol. 2017(1), 129\u2013155 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"16_CR24","unstructured":"Rijmen, V., Barreto, P.: The Anubis Block Cipher. The NESSIE (2000)"},{"key":"16_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES. The Advanced Encryption Standard","author":"V Rijmen","year":"2002","unstructured":"Rijmen, V., Daemen, J.: The Design of Rijndael: AES. The Advanced Encryption Standard. Springer, Berlin (2002). https:\/\/doi.org\/10.1007\/978-3-662-04722-4"},{"key":"16_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-60865-6_47","volume-title":"Fast Software Encryption","author":"V Rijmen","year":"1996","unstructured":"Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., De Win, E.: The cipher SHARK. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 99\u2013111. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-60865-6_47"},{"issue":"4","key":"16_CR27","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"16_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-662-48116-5_23","volume-title":"Fast Software Encryption","author":"SM Sim","year":"2015","unstructured":"Sim, S.M., Khoo, K., Oggier, F., Peyrin, T.: Lightweight MDS involution matrices. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 471\u2013493. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48116-5_23"},{"issue":"64","key":"16_CR29","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10623-011-9578-x","volume":"2012","author":"M Sajadieh","year":"2012","unstructured":"Sajadieh, M., Dakhilalian, M., Mala, H., Omoomi, B.: On construction of involutory MDS matrices from Vandermond matrices in GF ($$2^{q}$$). Des. Codes Crypt. 2012(64), 287\u2013308 (2012)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"16_CR30","doi-asserted-by":"crossref","first-page":"95","DOI":"10.46586\/tosc.v2016.i1.95-113","volume":"2016","author":"S Sarkar","year":"2016","unstructured":"Sarkar, S., Syed, H.: Lightweight diffusion layer: importance of Toeplitz matrices. IACR Trans. Symmetric Cryptol. 2016(1), 95\u2013113 (2016)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"16_CR31","unstructured":"Schneier, B., Kelsey, J., Whiting, D., et al.: Twofish: a 128-bit block cipher. NIST AES Proposal, vol. 15, p. 23 (1998)"},{"issue":"501","key":"16_CR32","doi-asserted-by":"publisher","first-page":"460","DOI":"10.2307\/3620776","volume":"84","author":"JR Silvester","year":"2000","unstructured":"Silvester, J.R.: Determinants of block matrices. Math. Gaz. 84(501), 460\u2013467 (2000)","journal-title":"Math. Gaz."},{"key":"16_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/3-540-36552-4_12","volume-title":"Information Security and Cryptology \u2014 ICISC 2002","author":"L Xiao","year":"2003","unstructured":"Xiao, L., Heys, H.M.: Hardware design and analysis of block cipher components. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 164\u2013181. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36552-4_12"},{"key":"16_CR34","unstructured":"Youssef, A.M., Mister, S., Tavares, S.E.: On the design of linear transformations for substitute permutation encryption networks. In: Workshop on Selected Areas of Cryptography 1996, pp. 40\u201348 (1997)"},{"issue":"59","key":"16_CR35","first-page":"99","volume":"2016","author":"R Zhao","year":"2016","unstructured":"Zhao, R., Zhang, R., Li, Y., Wu, B.: On constructions of a sort of MDS block diffusion matrices for block ciphers and hash functions. Sci. Chin. Inf. Sci. 2016(59), 99\u2013101 (2016)","journal-title":"Sci. Chin. Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Arithmetic of Finite Fields"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05153-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T04:29:45Z","timestamp":1662697785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05153-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051525","9783030051532"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05153-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"WAIFI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on the Arithmetic of Finite Fields","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bergen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waifi2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/waifi.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"26","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"54% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}