{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:13:09Z","timestamp":1775769189886,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,11,12]],"date-time":"2011-11-12T00:00:00Z","timestamp":1321056000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1007\/s10623-011-9578-x","type":"journal-article","created":{"date-parts":[[2011,11,11]],"date-time":"2011-11-11T04:04:14Z","timestamp":1320984254000},"page":"287-308","source":"Crossref","is-referenced-by-count":49,"title":["On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q )"],"prefix":"10.1007","volume":"64","author":[{"given":"Mahdi","family":"Sajadieh","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Dakhilalian","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Mala","sequence":"additional","affiliation":[]},{"given":"Behnaz","family":"Omoomi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,12]]},"reference":[{"key":"9578_CR1","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1109\/TIT.1969.1054253","volume":"15","author":"H.L. Althaus","year":"1969","unstructured":"Althaus H.L., Leake R.J.: Inverse of a finite-field Vandermonde matrix. IEEE Trans. Inform. Theory 15, 173 (1969)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9578_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham E., Shamir A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Berlin (1993)"},{"key":"9578_CR3","unstructured":"Barreto P., Rijmen V.: The Anubis Block Cipher. Submission to the NESSIE Project (2000). Available at http:\/\/cryptonessie.org ."},{"key":"9578_CR4","unstructured":"Barreto P., Rijmen V.: The Khazad Legacy-Level Block Cipher. Submission to the NESSIE Project (2000). Available at http:\/\/cryptonessie.org ."},{"key":"9578_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES\u2014The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen J., Rijmen V.: The Design of Rijndael: AES\u2014The Advanced Encryption Standard. Springer, Berlin (2002)"},{"key":"9578_CR6","unstructured":"Filho G.D., Barreto P., Rijmen V.: The Maelstrom-0 hash function. In: Proceedings of the 6th Brazilian Symposium on Information and Computer Systems Security (2006)."},{"key":"9578_CR7","unstructured":"Gauravaram P., Knudsen L.R., Matusiewicz K., Mendel F., Rechberger C., Schlaffer M., Thomsen S.: Gr\u00f8stl a SHA-3 Candidate. Submission to NIST (2008). Available at http:\/\/www.groestl.info ."},{"key":"9578_CR8","unstructured":"Junod P., Vaudenay S.: Perfect Diffusion primitives for block ciphers building efficient MDS matrices. In: SAC\u201904, pp. 84\u201399. Springer, Heidelberg (2004)."},{"issue":"9","key":"9578_CR9","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1109\/LCOMM.2004.833807","volume":"8","author":"J. Lacan","year":"2004","unstructured":"Lacan J., Fimes J.: Systematic MDS erasure codes based on vandermonde matrices. IEEE Trans. Commun. Lett. 8(9), 570\u2013572 (2004)","journal-title":"IEEE Trans. Commun. Lett."},{"key":"9578_CR10","volume-title":"Error Control Coding: Fundamentals and Applications","author":"S. Lin","year":"2004","unstructured":"Lin S., Costello D.: Error Control Coding: Fundamentals and Applications, 2nd edn. Prentice Hall, Englewood Cliffs (2004)","edition":"2"},{"key":"9578_CR11","unstructured":"MacWilliams F.J., Sloane N.J.A.: The theory of error correcting codes. North-Holland (1977)."},{"key":"9578_CR12","unstructured":"Matsui M.: Linear cryptanalysis method for DES cipher. In: EUROCRYPT\u201993, pp. 386\u2013397. Springer, Heidelberg (1993)."},{"issue":"2","key":"9578_CR13","first-page":"109","volume":"9","author":"J. Nakahara Jr.","year":"2009","unstructured":"Nakahara J. Jr., Abrahao E.: A new involutory MDS matrix for the AES. IJNS 9(2), 109\u2013116 (2009)","journal-title":"IJNS"},{"key":"9578_CR14","unstructured":"Rijmen V.: Cryptanalysis and Design of Iterated Block Ciphers. Ph.D. thesis, Dept. Elektrotechniek Katholieke Universiteit Leuven, pp. 228\u2013238 (1998)."},{"key":"9578_CR15","unstructured":"Sony Corporation: The 128-bit Block cipher CLEFIA: Algorithm Specification (2007). Available at http:\/\/www.sony.co.jp\/Products\/cryptography\/clefia\/download\/data\/clefia-spec-1.0.pdf ."},{"key":"9578_CR16","doi-asserted-by":"crossref","unstructured":"Yan S., Yang A.: Explicit algorithm to the inverse of Vandermonde matrix. In: ICTM 2009, pp. 176\u2013179 (2009).","DOI":"10.1109\/ICTM.2009.5413083"},{"key":"9578_CR17","unstructured":"Youssef A.M., Mister S., Tavares S.E.: On the design of linear transformations for substitution permutation encryption networks. In: SAC\u201997, pp. 1\u20139 (1997)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9578-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-011-9578-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9578-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T00:01:38Z","timestamp":1741910498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-011-9578-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,12]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["9578"],"URL":"https:\/\/doi.org\/10.1007\/s10623-011-9578-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11,12]]}}}