{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:58:47Z","timestamp":1772283527189,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2012,8,15]],"date-time":"2012-08-15T00:00:00Z","timestamp":1344988800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s10623-012-9736-9","type":"journal-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T13:49:29Z","timestamp":1344952169000},"page":"157-173","source":"Crossref","is-referenced-by-count":7,"title":["On the subfield subcodes of Hermitian codes"],"prefix":"10.1007","volume":"70","author":[{"given":"Fernando","family":"Pi\u00f1ero","sequence":"first","affiliation":[]},{"given":"Heeralal","family":"Janwa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,15]]},"reference":[{"key":"9736_CR1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1142\/9789812794017_0002","volume-title":"Advances in Algebraic Geometry Codes.","author":"P. Beelen","year":"2008","unstructured":"Beelen P., H\u00f8holdt T.: The decoding of algebraic geometry codes. In: Mart\u00ednez-Moro, E., Munera, C., Ruano, D. (eds.) Advances in Algebraic Geometry Codes., pp. 49\u201398. World Scientific Publishing Co. Pte. Ltd., Singapore (2008)"},{"key":"9736_CR2","unstructured":"Bulygin S., Pellikaan R.: Decoding error-correcting codes with gr\u00f6bner bases. In: Proceedings of the 28-th Symposium on Information Theory in the Benelux, pp. 3\u201310 (2007)."},{"key":"9736_CR3","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1142\/9789812837172_0013","volume-title":"Selected Topics in Information and Coding Theory.","author":"S. Bulygin","year":"2010","unstructured":"Bulygin S., Pellikaan R.: Decoding and finding the minimum distance with gr\u00f6bner bases: history and new insights. In: Woungang, I.-C., Sudip Misra, S.C.M. (eds.) Selected Topics in Information and Coding Theory., pp. 585\u2013622. World Scientific, London (2010)"},{"key":"9736_CR4","volume-title":"Ideals, varieties, and algorithms. An Introduction to Computational Algebraic Geometry and Commutative Algebra, Undergraduate Texts in Mathematics","author":"D. Cox","year":"2007","unstructured":"Cox D., Little J., O\u2019Shea D.: Ideals, varieties, and algorithms. An Introduction to Computational Algebraic Geometry and Commutative Algebra, 3rd edn. Undergraduate Texts in Mathematics. Springer, New York (2007)","edition":"3"},{"issue":"5","key":"9736_CR5","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1109\/TIT.1975.1055435","volume":"21","author":"P. Delsarte","year":"1975","unstructured":"Delsarte P.: On subfield subcodes of modified Reed\u2013Solomon codes. IEEE Trans. Inf. Theory 21(5), 575\u2013576 (1975)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"9736_CR6","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1023\/A:1008274212057","volume":"13","author":"J. Fitzgerald","year":"1998","unstructured":"Fitzgerald J., Lax R.F.: Decoding affine variety codes using Gr\u00f6bner bases. Des. Codes Cryptogr. 13(2), 147\u2013158 (1998)","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"9736_CR7","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S1071-5797(03)00010-8","volume":"9","author":"O. Geil","year":"2003","unstructured":"Geil O.: On codes from norm\u2013trace curves. Finite Fields Appl. 9(3), 351\u2013371 (2003)","journal-title":"Finite Fields Appl."},{"issue":"3","key":"9736_CR8","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/18.825832","volume":"46","author":"O. Geil","year":"2000","unstructured":"Geil O., H\u00f8holdt T.: Footprints or generalized B\u00e9zout\u2019s theorem. IEEE Trans. Inf. Theory 46(3), 635\u2013641 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9736_CR9","unstructured":"Gustafsson O., Olofsson M.: Complexity reduction of constant matrix computations over the binary field. In: Proceedings of the 1st International Workshop on Arithmetic of Finite Fields, WAIFI \u201907, pp. 103\u2013115. Springer, Berlin (2007)."},{"key":"9736_CR10","doi-asserted-by":"crossref","unstructured":"Hernando F., O\u2019Sullivan M.E., Popovici E.M., Srivastava S.: Subfield-subcodes of generalized toric codes. CoRR abs\/1005.1871 (2010).","DOI":"10.1109\/ISIT.2010.5513688"},{"key":"9736_CR11","volume-title":"Projective Geometries over Finite Fields","author":"J.W.P. Hirschfeld","year":"1979","unstructured":"Hirschfeld J.W.P.: Projective Geometries over Finite Fields. Clarendon Press\/Oxford University Press, Oxford\/New York (1979)"},{"key":"9736_CR12","doi-asserted-by":"crossref","DOI":"10.4171\/001","volume-title":"A Course in Error-Correcting Codes","author":"T. H\u00f8holdt","year":"2004","unstructured":"H\u00f8holdt T., Justesen J.: A Course in Error-Correcting Codes. European Mathematical Society, Z\u00fcrich (2004)"},{"key":"9736_CR13","unstructured":"H\u00f8holdt T., van Lint J.H., Pellikaan R.: Algebraic geometry of codes. In: Handbook of Coding Theory, vols. I, II, pp. 871\u2013961. North-Holland, Amsterdam (1998)."},{"key":"9736_CR14","unstructured":"Janwa H.: Some recent results on our two public key cryptosystems based on algebraic geometric codes. Preprint http:\/\/algo.epfl.ch\/en\/group\/seminars\/20091209 (2010)."},{"key":"9736_CR15","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1027351723034","volume":"8","author":"H. Janwa","year":"1996","unstructured":"Janwa H., Moreno O.: McEliece public key cryptosystems using algebraic-geometric codes. Des. Codes Cryptogr. 8, 293\u2013307 (1996)","journal-title":"Des. Codes Cryptogr."},{"key":"9736_CR16","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/18.108255","volume":"38","author":"J. Justesen","year":"1992","unstructured":"Justesen J., Larsen K.J., Jensen H.E., H\u00f8holdt T.: Fast decoding of codes from algebraic plane curves. IEEE Trans. Inf. Theory 38, 111\u2013119 (1992)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9736_CR17","volume-title":"The Art of Computer Programming, vol. II: Seminumerical Algorithms","author":"D.E. Knuth","year":"1981","unstructured":"Knuth D.E.: The Art of Computer Programming, vol. II: Seminumerical Algorithms, 2nd edn. Addison-Wesley, Reading (1981)","edition":"2"},{"key":"9736_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-0310-7","volume-title":"A Course in Number Theory and Cryptography","author":"N. Koblitz","year":"1987","unstructured":"Koblitz N.: A Course in Number Theory and Cryptography. Springer, New York (1987)"},{"key":"9736_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-1983-2","volume-title":"Finite Field for Scientists and Engineers","author":"R.J. McEliece","year":"1987","unstructured":"McEliece R.J.: Finite Field for Scientists and Engineers. Kluwer, Norwell (1987)"},{"key":"9736_CR20","volume-title":"Groebner Bases, Coding, and Cryptography","author":"F. Mora","year":"2009","unstructured":"Mora F., Perret L., Sakata S., Sala M., Traverso C.: Groebner Bases, Coding, and Cryptography. Springer, Berlin (2009)"},{"key":"9736_CR21","first-page":"99","volume":"206","author":"F. Pinero","year":"2010","unstructured":"Pinero F., Janwa H.: On the parameters of subfield subcodes of norm trace codes. Congressus Numerantium 206, 99\u2013113 (2010)","journal-title":"Congressus Numerantium"},{"key":"9736_CR22","unstructured":"PKS-URL-LINKS: Code-based public-key cryptography. http:\/\/pqcrypto.org\/code.html ."},{"key":"9736_CR23","unstructured":"Shibuya T., Matsumoto R., Sakaniwa K.: An improved bound for the dimension of subfield subcodes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 80(5), 876\u2013880 (1997). http:\/\/ci.nii.ac.jp\/naid\/110003216323\/en\/ ."},{"key":"9736_CR24","unstructured":"Shibuya T., Matsumoto R., Sakaniwa K.: Simple estimation for the dimension of subfield subcodes of AG codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 80(11), 2058\u20132065 (1997). http:\/\/ci.nii.ac.jp\/naid\/110003207748\/en\/ ."},{"key":"9736_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-011-1806-4","volume-title":"Computational and Algorithmic Problems in Finite Fields. Mathematics and Its Applications","author":"I.E. Shparlinski","year":"1992","unstructured":"Shparlinski I.E.: Computational and Algorithmic Problems in Finite Fields. Mathematics and Its Applications. Kluwer, Dordrecht (1992)"},{"key":"9736_CR26","unstructured":"Stichtenoth H.: A note on Hermitian codes over GF (q 2). IEEE Trans. Inf. Theory 34(5, part 2), 1345\u20131348 (1988)."},{"issue":"1","key":"9736_CR27","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/18.50376","volume":"36","author":"H. Stichtenoth","year":"1990","unstructured":"Stichtenoth H.: On the dimension of subfield subcodes. IEEE Trans. Inf. Theory 36(1), 90\u201393 (1990)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9736_CR28","unstructured":"Yang K., Kumar P.V.: On the true minimum distance of Hermitian codes. In: Coding Theory and Algebraic Geometry (Luminy, 1991). Lecture Notes in Mathematics, vol. 1518, pp. 99\u2013107. Springer, Berlin (1992)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9736-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9736-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9736-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T09:28:53Z","timestamp":1687685333000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9736-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,15]]},"references-count":28,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["9736"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9736-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,8,15]]}}}