{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:43Z","timestamp":1725496243181},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540772231"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77224-8_35","type":"book-chapter","created":{"date-parts":[[2007,11,29]],"date-time":"2007-11-29T10:38:56Z","timestamp":1196332736000},"page":"301-310","source":"Crossref","is-referenced-by-count":1,"title":["Novel Algebraic Structure for Cyclic Codes"],"prefix":"10.1007","author":[{"given":"Dang Hoai","family":"Bac","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nguyen","family":"Binh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nguyen Xuan","family":"Quynh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Prange, E.: Cyclic Error-Correcting Codes in Two Symbols. Electronics Research Directorate, Air Force Cambridge Res. Ctr. (1957)"},{"key":"35_CR2","volume-title":"The Theory of Error-Correcting Code","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A: The Theory of Error-Correcting Code. North-Holland, Amsterdam (1977)"},{"key":"35_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-58575-3","volume-title":"Introduction to Coding Theory","author":"J.H. Lint Van","year":"1999","unstructured":"Van Lint, J.H.: Introduction to Coding Theory, 3rd edn. Springer, Heidelberg (1999)","edition":"3"},{"key":"35_CR4","volume-title":"Theory and Practice of Error Control Coding","author":"R.E. Blahut","year":"1983","unstructured":"Blahut, R.E.: Theory and Practice of Error Control Coding. Addison-Wesley, Reading, MA (1983)"},{"key":"35_CR5","doi-asserted-by":"crossref","DOI":"10.1002\/0471739219","volume-title":"Error Correction Coding: Mathematical Methods and Algorithm","author":"T.K. Moon","year":"2005","unstructured":"Moon, T.K.: Error Correction Coding: Mathematical Methods and Algorithm. John Wiley & Sons, Inc., Chichester (2005)"},{"issue":"1","key":"35_CR6","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1109\/12.30855","volume":"38","author":"A. Pincin","year":"1989","unstructured":"Pincin, A.: A New Algorithm for Multiplication in Finite Fields. IEEE Trans. Computer\u00a038(1), 1045\u20131049 (1989)","journal-title":"IEEE Trans. Computer"},{"issue":"7","key":"35_CR7","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1109\/TC.2007.1047","volume":"56","author":"A.H. Namin","year":"2007","unstructured":"Namin, A.H., Wu, H., Ahmadi, M.: Comb Architectures for Finite Field Multiplication in F_2\n                    m\n                  . IEEE Trans. Computers\u00a056(7), 909\u2013916 (2007)","journal-title":"IEEE Trans. Computers"},{"issue":"4","key":"35_CR8","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TC.2003.1190583","volume":"52","author":"R. Katti","year":"2003","unstructured":"Katti, R., Brennan, J.: Low Complexity Multiplication in a Finite Field Using Ring Representation. IEEE Trans. Computers\u00a052(4), 418\u2013427 (2003)","journal-title":"IEEE Trans. Computers"},{"key":"35_CR9","volume-title":"Introduction to Finite Fields and Their Applications","author":"R. Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications, 2nd edn. Cambridge Univ. Press, Cambridge (1997)","edition":"2"},{"issue":"8","key":"35_CR10","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1109\/TC.1985.1676616","volume":"34","author":"C.C. Wang","year":"1985","unstructured":"Wang, C.C., Truong, T.K., Shao, H.M., Deutsch, L.J., Omura, J.K., Reed, I.S.: VLSI Architectures for Computing Multiplications and Inverses in GF(2\n                    m\n                  ). IEEE Trans. Computers\u00a034(8), 709\u2013717 (1985)","journal-title":"IEEE Trans. Computers"},{"issue":"11","key":"35_CR11","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1109\/TC.2002.1047755","volume":"51","author":"H. Wu","year":"2002","unstructured":"Wu, H., Hasan, M.A., Blake, I.F., Gao, S.: Finite Field Multiplier Using Redundant Representation. IEEE Trans. Computers\u00a051(11), 1306\u20131316 (2002)","journal-title":"IEEE Trans. Computers"},{"key":"35_CR12","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1049\/el:20030444","volume":"39","author":"W. Baodian","year":"2003","unstructured":"Baodian, W., Liu, D., Ma, W., Wang, X.: Property of Finite Fields and Its Cryptography Application. Electron. Lett.\u00a039, 655\u2013656 (2003)","journal-title":"Electron. Lett."}],"container-title":["Lecture Notes in Computer Science","Applied Algebra, Algebraic Algorithms and Error-Correcting Codes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77224-8_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:04:47Z","timestamp":1619521487000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77224-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540772231"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77224-8_35","relation":{},"subject":[]}}