{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T09:57:40Z","timestamp":1769507860684,"version":"3.49.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031643804","type":"print"},{"value":"9783031643811","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-64381-1_9","type":"book-chapter","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T23:01:56Z","timestamp":1719961316000},"page":"201-221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On the\u00a0Generalizations of\u00a0the\u00a0Rank Metric over\u00a0Finite Chain Rings"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0452-2546","authenticated-orcid":false,"given":"Hermann Tchatchiem","family":"Kamche","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2590-4159","authenticated-orcid":false,"given":"Herv\u00e9 Tal\u00e9","family":"Kalachi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Alagic, G., et\u00a0al.: Status report on the second round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST 2 (2020)","DOI":"10.6028\/NIST.IR.8240"},{"issue":"4","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s10623-023-01330-5","volume":"92","author":"N Aragon","year":"2024","unstructured":"Aragon, N., Dyseryn, V., Gaborit, P., Loidreau, P., Renner, J., Wachter-Zeh, A.: LowMS: a new rank metric code-based KEM without ideal structure. Des. Codes Crypt. 92(4), 1075\u20131093 (2024)","journal-title":"Des. Codes Crypt."},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"E Berlekamp","year":"1978","unstructured":"Berlekamp, E., McEliece, R., van Tilborg, H.: On the inherent intractability of certain coding problems. IEEE Trans. Inform. Theory 24(3), 384\u2013386 (1978)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9_CR4","unstructured":"Bernstein, D.J., et al.: Classic McEliece: conservative code-based cryptography (2019). https:\/\/classic.mceliece.org. Second round submission to the NIST post-quantum cryptography call"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-319-69284-5_10","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"D Bucerzan","year":"2017","unstructured":"Bucerzan, D., Dragoi, V., Kalachi, H.T.: Evolution of the McEliece public key encryption scheme. In: Farshim, P., Simion, E. (eds.) SecITC 2017. LNCS, vol. 10543, pp. 129\u2013149. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69284-5_10"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ejc.2015.11.002","volume":"53","author":"A Campello","year":"2016","unstructured":"Campello, A., Jorge, G.C., Strapasson, J.E., Costa, S.I.: Perfect codes in the lp metric. Eur. J. Comb. 53, 72\u201385 (2016)","journal-title":"Eur. J. Comb."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Delsarte, P.: Bilinear forms over a finite field, with applications to coding theory. J. Comb. Theory, Ser. A 25(3), 226\u2013241 (1978)","DOI":"10.1016\/0097-3165(78)90015-8"},{"key":"9_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00234-2","volume-title":"Encyclopedia of Distances","author":"E Deza","year":"2009","unstructured":"Deza, E., Deza, M.M., Deza, M.M., Deza, E.: Encyclopedia of Distances. Springer, Cham (2009)"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.ejc.2018.02.026","volume":"80","author":"RG D\u2019Oliveira","year":"2019","unstructured":"D\u2019Oliveira, R.G., Firer, M.: Channel metrization. Eur. J. Comb. 80, 107\u2013119 (2019)","journal-title":"Eur. J. Comb."},{"issue":"12","key":"9_CR10","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1016\/j.disc.2015.05.011","volume":"338","author":"RGL D\u2019Oliveira","year":"2015","unstructured":"D\u2019Oliveira, R.G.L., Firer, M.: The packing radius of a code and partitioning problems: the case for poset metrics on finite vector spaces. Discret. Math. 338(12), 2143\u20132167 (2015)","journal-title":"Discret. Math."},{"key":"9_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2021.101946","volume":"77","author":"M Epelde","year":"2022","unstructured":"Epelde, M., R\u00faa, I.F.: Cardinal rank metric codes over Galois rings. Finite Fields Appl. 77, 101946 (2022)","journal-title":"Finite Fields Appl."},{"issue":"10","key":"9_CR12","doi-asserted-by":"publisher","first-page":"5899","DOI":"10.1109\/TIT.2014.2346079","volume":"60","author":"C Feng","year":"2014","unstructured":"Feng, C., N\u00f3brega, R.W., Kschischang, F.R., Silva, D.: Communication over finite-chain-ring matrix channels. IEEE Trans. Inf. Theory 60(10), 5899\u20135917 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"9_CR13","first-page":"3","volume":"21","author":"\u00c8M Gabidulin","year":"1985","unstructured":"Gabidulin, \u00c8.M.: Theory of codes with maximum rank distance. Problemy Peredachi Informatsii 21(1), 3\u201316 (1985)","journal-title":"Problemy Peredachi Informatsii"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/3-540-46416-6_41","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201991","author":"EM Gabidulin","year":"1991","unstructured":"Gabidulin, E.M., Paramonov, A.V., Tretjakov, O.V.: Ideals over a non-commutative ring and their application in cryptology. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 482\u2013489. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_41"},{"key":"9_CR15","unstructured":"Gaborit, P., Murat, G., Ruatta, O., Z\u00e9mor, G.: Low rank parity check codes and their application to cryptography. In: Proceedings of the Workshop on Coding and Cryptography, WCC 2013, Bergen, Norway (2013). www.selmer.uib.no\/WCC2013\/pdfs\/Gaborit.pdf"},{"issue":"2","key":"9_CR16","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1109\/TIT.2015.2511786","volume":"62","author":"P Gaborit","year":"2016","unstructured":"Gaborit, P., Ruatta, O., Schrek, J.: On the complexity of the rank syndrome decoding problem. IEEE Trans. Inf. Theory 62(2), 1006\u20131019 (2016). https:\/\/doi.org\/10.1109\/TIT.2015.2511786","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"9_CR17","doi-asserted-by":"publisher","first-page":"4480","DOI":"10.1109\/TIT.2017.2778726","volume":"64","author":"E Gorla","year":"2017","unstructured":"Gorla, E., Ravagnani, A.: An algebraic framework for end-to-end physical-layer network coding. IEEE Trans. Inf. Theory 64(6), 4480\u20134495 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming, R.W.: Error detecting and error correcting codes. Bell Syst. Tech. J. 29(2), 147\u2013160 (1950)","journal-title":"Bell Syst. Tech. J."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Honold, T., Landjev, I.: Linear codes over finite chain rings. Electron. J. Comb. 7, R11\u2013R11 (2000)","DOI":"10.37236\/1489"},{"key":"9_CR20","unstructured":"Horlemann, A.L.: Code-based cryptography with the subspace metric. In: SIAM Conference on Applied Geometry (2021)"},{"key":"9_CR21","doi-asserted-by":"publisher","unstructured":"Kalachi, H.T., Kamche, H.T.: On the rank decoding problem over finite principal ideal rings. Adv. Math. Commun. (2023). https:\/\/doi.org\/10.3934\/amc.2023003","DOI":"10.3934\/amc.2023003"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Kamche, H.T., Kalachi, H.T.: Solving systems of algebraic equations over finite commutative rings and applications. In: Applicable Algebra in Engineering, Communication and Computing, pp. 1\u201329 (2024)","DOI":"10.1007\/s00200-024-00652-8"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Kamche, H.T., Kalachi, H.T., Djomou, F.R.K., Fouotsa, E.: Low-rank parity-check codes over finite commutative rings. In: Applicable Algebra in Engineering, Communication and Computing, pp. 1\u201327 (2024)","DOI":"10.1007\/s00200-023-00641-3"},{"issue":"12","key":"9_CR24","doi-asserted-by":"publisher","first-page":"7718","DOI":"10.1109\/TIT.2019.2933520","volume":"65","author":"HT Kamche","year":"2019","unstructured":"Kamche, H.T., Mouaha, C.: Rank-metric codes over finite principal ideal rings and applications. IEEE Trans. Inf. Theory 65(12), 7718\u20137735 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"9_CR25","doi-asserted-by":"publisher","first-page":"3579","DOI":"10.1109\/TIT.2008.926449","volume":"54","author":"R Koetter","year":"2008","unstructured":"Koetter, R., Kschischang, F.R.: Coding for errors and erasures in random network coding. IEEE Trans. Inf. Theory 54(8), 3579\u20133591 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9_CR26","volume-title":"Introduction to Commutative Algebra and Algebraic Geometry","author":"E Kunz","year":"1985","unstructured":"Kunz, E.: Introduction to Commutative Algebra and Algebraic Geometry. Springer, Cham (1985)"},{"key":"9_CR27","unstructured":"McDonald, B.R.: Finite Rings with Identity, vol.\u00a028. Marcel Dekker Incorporated (1974)"},{"key":"9_CR28","unstructured":"McEliece, R.J.: A Public-Key System Based on Algebraic Coding Theory, pp. 114\u2013116. Jet Propulsion Lab (1978). dSN Progress Report 44"},{"key":"9_CR29","unstructured":"Melchor, C.A., et\u00a0al.: Rollo\u2013rank-ouroboros, lake & locker. Round-2 submission to the NIST PQC project (2019)"},{"key":"9_CR30","first-page":"213","volume":"5","author":"AA Nechaev","year":"2008","unstructured":"Nechaev, A.A.: Finite rings with applications. Handb. Algebra 5, 213\u2013320 (2008)","journal-title":"Handb. Algebra"},{"key":"9_CR31","unstructured":"NIST: Post-quantum cryptography standardization (2017). https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/Post-Quantum-Cryptography-Standardization"},{"key":"9_CR32","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-540-88702-7_4","volume-title":"Post-Quantum Cryptography","author":"R Overbeck","year":"2009","unstructured":"Overbeck, R., Sendrier, N.: Code-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 95\u2013145. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-540-88702-7_4"},{"issue":"10","key":"9_CR33","doi-asserted-by":"publisher","first-page":"5207","DOI":"10.1109\/TIT.2010.2059590","volume":"56","author":"L Panek","year":"2010","unstructured":"Panek, L., Firer, M., Alves, M.M.S.: Classification of Niederreiter-Rosenbloom-Tsfasman block codes. IEEE Trans. Inf. Theory 56(10), 5207\u20135216 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"9_CR34","doi-asserted-by":"publisher","first-page":"5075","DOI":"10.1109\/TIT.2022.3167629","volume":"68","author":"S Puchinger","year":"2022","unstructured":"Puchinger, S., Renner, J., Rosenkilde, J.: Generic decoding in the sum-rank metric. IEEE Trans. Inf. Theory 68(8), 5075\u20135097 (2022)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Puchinger, S., Renner, J., Wachter-Zeh, A., Zumbr\u00e4gel, J.: Efficient decoding of Gabidulin codes over Galois rings. In: 2021 IEEE International Symposium on Information Theory (ISIT), pp. 25\u201330. IEEE (2021)","DOI":"10.1109\/ISIT45174.2021.9517904"},{"key":"9_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-031-46495-9_4","volume-title":"Code-Based Cryptography","author":"S Ritterhoff","year":"2023","unstructured":"Ritterhoff, S., et al.: FuLeeca: a Lee-based signature scheme. In: Esser, A., Santini, P. (eds.) CBCrypto 2023. LNCS, vol. 14311, pp. 56\u201383. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-46495-9_4"},{"issue":"4","key":"9_CR37","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(4), 623\u2013656 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"9_CR38","unstructured":"Weger, V., Gassner, N., Rosenthal, J.: A survey on code-based cryptography. In: Coding Theory and Applications V, Applications of Coding Theory in Quantum Computing and Cryptography. Springer, Cham (2022)"},{"issue":"1","key":"9_CR39","doi-asserted-by":"publisher","first-page":"233","DOI":"10.3934\/amc.2022029","volume":"18","author":"V Weger","year":"2024","unstructured":"Weger, V., Khathuria, K., Horlemann, A.L., Battaglioni, M., Santini, P., Persichetti, E.: On the hardness of the Lee syndrome decoding problem. Adv. Math. Commun. 18(1), 233\u2013266 (2024)","journal-title":"Adv. Math. Commun."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-64381-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T23:02:42Z","timestamp":1719961362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-64381-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031643804","9783031643811"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-64381-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Douala","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cameroon","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}