{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:56:26Z","timestamp":1774976186324,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2012,10,27]],"date-time":"2012-10-27T00:00:00Z","timestamp":1351296000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s10623-012-9758-3","type":"journal-article","created":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T13:42:26Z","timestamp":1351258946000},"page":"215-230","source":"Crossref","is-referenced-by-count":8,"title":["On the unique representation of very strong algebraic geometry codes"],"prefix":"10.1007","volume":"70","author":[{"given":"Irene","family":"M\u00e1rquez-Corbella","sequence":"first","affiliation":[]},{"given":"Edgar","family":"Mart\u00ednez-Moro","sequence":"additional","affiliation":[]},{"given":"Ruud","family":"Pellikaan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,27]]},"reference":[{"issue":"4","key":"9758_CR1","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1006\/jsco.2000.0411","volume":"30","author":"J. Abbott","year":"2000","unstructured":"Abbott J., Bigatti A., Kreuzer M., Robbiano L.: Computing ideals of points. J. Symb. Comput. 30(4), 341\u2013356 (2000)","journal-title":"J. Symb. Comput."},{"key":"9758_CR2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF01403081","volume":"49","author":"E. Arbarello","year":"1978","unstructured":"Arbarello E., Sernesi E.: Petri\u2019s approach to the study of the ideal associated to a special divisor. Invent. Math. 49, 99\u2013119 (1978)","journal-title":"Invent. Math."},{"key":"9758_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-5323-3","volume-title":"Geometry of Algebraic Curves","author":"E. Arbarello","year":"1985","unstructured":"Arbarello E., Cornalba M., Griffiths P.A., Harris J.: Geometry of Algebraic Curves. Springer, New York (1985)"},{"key":"9758_CR4","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1112\/jlms\/s1-14.4.310","volume":"14","author":"D. Babbage","year":"1939","unstructured":"Babbage D.: A note on the quadrics through a canonical curve. J. Lond. Math. Soc. 14, 310\u2013315 (1939)","journal-title":"J. Lond. Math. Soc."},{"key":"9758_CR5","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s10623-003-6151-2","volume":"35","author":"T. Berger","year":"2005","unstructured":"Berger T., Loidreau P.: How to mask the structure of codes for a cryptographic use. Des. Codes Cryptogr. 35, 63\u201379 (2005)","journal-title":"Des. Codes Cryptogr."},{"key":"9758_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-88702-7_1","volume-title":"Post-quantum Cryptography","author":"D. Bernstein","year":"2009","unstructured":"Bernstein D.: Introduction to post-quantum cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds) Post-quantum Cryptography, pp. 1\u201314. Springer, Berlin (2009)"},{"key":"9758_CR7","unstructured":"Bordiga G.: Studio generale della quartica normale. Atti. R. Ist. Veneto Sci. Lett. Arti. 6: 503\u2013525 (1885\u20131886)."},{"key":"9758_CR8","doi-asserted-by":"crossref","unstructured":"Bruns W., Vetter U.: Determinantal rings. In: Lecture Notes in Mathematics, vol. 1327. Springer, Berlin (1988).","DOI":"10.1007\/BFb0080378"},{"issue":"2","key":"9758_CR9","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1112\/jlms\/jdm042","volume":"76","author":"E. Carlini","year":"2007","unstructured":"Carlini E., Catalisano M.: Existence results for rational normal cuurves. J. Lond. Math. Soc. 76(2), 73\u201386 (2007)","journal-title":"J. Lond. Math. Soc."},{"key":"9758_CR10","unstructured":"Cascudo I., Chen H., Cramer R., Xing X.: Asymptotically good ideal linear secret sharing with strong multiplication overy any fixed finite field. In: Halevi S. (ed.) Advances in Cryptology\u2014CRYPTO 2009, Lecture Notes in Computer Science, vol. 5677, pp. 466\u2013486. Springer, Berlin (2009)."},{"key":"9758_CR11","unstructured":"Castelnuovo G.: Studio dellinvoluzione generale sulle curve razionali. Atti. R. Ist. Veneto Sci. Lett. Arti. 6, 1167\u20131199 (1885\u20131886)."},{"key":"9758_CR12","first-page":"55","volume":"1","author":"F. Cioffi","year":"1999","unstructured":"Cioffi F.: Minimally generating ideals of points in polynomial time using linear algebra. Ric. Mat. XLVIII 1, 55\u201363 (1999)","journal-title":"Ric. Mat. XLVIII"},{"key":"9758_CR13","first-page":"80","volume":"23","author":"F. Enriques","year":"1919","unstructured":"Enriques F.: Sulle curve canoniche di genere p dello spazio a p\u22121 dimensioni. Rend. Accad. Sci. Ist. Bologna 23, 80\u201382 (1919)","journal-title":"Rend. Accad. Sci. Ist. Bologna"},{"key":"9758_CR14","unstructured":"Faure C., Minder L.: Cryptanalysis of the McEliece cryptosystem over hyperelliptic codes. In: Proceedings of the 11th International Workshop on Algebraic and Combinatorial Coding Theory, ACCT 2008, Pamporovo, pp. 99\u2013107 (2008)."},{"key":"9758_CR15","unstructured":"Fortuna E., Gianni P., Trager B.: Ideals of curves given by points. In: Sepp\u00e4l\u00e4 M., Volcheck E. (eds.) Computational Algebraic and Analytic Geometry, vol. 572, pp. 71\u201388. American Mathematical Society, Providence (2012)."},{"key":"9758_CR16","first-page":"22","volume":"13","author":"V. Goppa","year":"1977","unstructured":"Goppa V.: Codes associated with divisors. Probl. Inf. Transm. 13, 22\u201326 (1977)","journal-title":"Probl. Inf. Transm."},{"key":"9758_CR17","volume-title":"Principles of Algebraic Geometry","author":"P. Griffiths","year":"1978","unstructured":"Griffiths P., Harris J.: Principles of Algebraic Geometry. Wiley-Interscience, New York (1978)"},{"key":"9758_CR18","volume-title":"Algebraic Geometry, a First Course","author":"J. Harris","year":"1978","unstructured":"Harris J.: Algebraic Geometry, a First Course. Springer, New York (1978)"},{"key":"9758_CR19","doi-asserted-by":"crossref","DOI":"10.1515\/9781400847419","volume-title":"Algebraic Curves Over a Finite Field","author":"J.W.P. Hirschfeld","year":"2008","unstructured":"Hirschfeld J.W.P., Kochm\u00e1ros G., Torres F.: Algebraic Curves Over a Finite Field. Princeton University Press, Princeton (2008)"},{"key":"9758_CR20","doi-asserted-by":"crossref","first-page":"1589","DOI":"10.1109\/18.476214","volume":"41","author":"T. H\u00f8holdt","year":"1995","unstructured":"H\u00f8holdt T., Pellikaan R.: On decoding algebraic-geometric codes. IEEE Trans. Inf. 41, 1589\u20131614 (1995)","journal-title":"IEEE Trans. Inf."},{"key":"9758_CR21","unstructured":"H\u00f8holdt T., Lint J.v., Pellikaan R.: Algebraic geometry codes. In: Pless V., Huffman W. (eds.) Handbook of Coding Theory, vol. 1, pp. 871\u2013961. North-Holland, Amsterdam (1998)."},{"issue":"2","key":"9758_CR22","doi-asserted-by":"crossref","first-page":"31","DOI":"10.21099\/tkbjm\/1496158686","volume":"3","author":"M. Homma","year":"1979","unstructured":"Homma M.: On the equations defining a projective curve embedded by a nonspecial divisor. Tsukuba J. Math. 3(2), 31\u201339 (1979)","journal-title":"Tsukuba J. Math."},{"key":"9758_CR23","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"W.C. Huffman","year":"2003","unstructured":"Huffman W.C., Pless V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"key":"9758_CR24","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1027351723034","volume":"8","author":"H. Janwa","year":"1996","unstructured":"Janwa H., Moreno O.: McEliece public crypto system using algebraic-geometric codes. Des. Codes Cryptogr. 8, 293\u2013307 (1996)","journal-title":"Des. Codes Cryptogr."},{"key":"9758_CR25","unstructured":"Lakshman Y.N.: A single exponential bound on the complexity of computing Gr\u00f6bner bases of zero-dimensional ideals. In: Effective Methods in Algebraic Geometry (Castiglioncello, 1990), Progress in Mathematics, vol. 94, pp. 227\u2013234. Birkh\u00e4user, Boston (1991)."},{"issue":"4","key":"9758_CR26","first-page":"269","volume":"59","author":"M. Mancini","year":"2001","unstructured":"Mancini M.: Projectively normal curves defined by quadrics. Rend. Semin. Mat. Univ. Politech. Torino 59(4), 269\u2013275 (2001)","journal-title":"Rend. Semin. Mat. Univ. Politech. Torino"},{"key":"9758_CR27","unstructured":"M\u00e1rquez-Corbella I., Mart\u00ednez-Moro E., Pellikaan R.: Cryptanalysis of public-key cryptosystems based on algebraic geometry codes. Oberwolfach Prepr. OWP 2012-01, 1\u201317 (2012)."},{"key":"9758_CR28","doi-asserted-by":"crossref","unstructured":"M\u00e1rquez-Corbella I., Mart\u00ednez-Moro E., Pellikaan R.: The non-gap sequence of a subcode of a generalized Reed\u2013Solomon code. Des. Codes Cryptogr. doi: 10.1007\/s10623-012-9694-2 (2012).","DOI":"10.1007\/s10623-012-9694-2"},{"key":"9758_CR29","unstructured":"McEliece R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 42\u201344, 114\u2013116 (1978)."},{"key":"9758_CR30","unstructured":"M\u00f6ller H.M., Buchberger B.: The construction of multivariate polynomials with preassigned zeros. In: Computer Algebra (Marseille, 1982), Lecture Notes in Computer Science, vol. 144, pp. 24\u201331. Springer, Berlin (1982)."},{"key":"9758_CR31","unstructured":"Mumford D.: Varieties defined by quadratic equations. In: Questions on Algebraic Varieties, C.I.M.E., III Ciclo, Varenna, 1969, pp. 29\u2013100. Edizioni Cremonese, Rome (1970)."},{"key":"9758_CR32","volume-title":"Curves and Their Jacobians","author":"D. Mumford","year":"1975","unstructured":"Mumford D.: Curves and Their Jacobians. University of Michigan Press, Ann Arbor (1975)"},{"issue":"3","key":"9758_CR33","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/0022-4049(93)90043-S","volume":"90","author":"C. Munuera","year":"1993","unstructured":"Munuera C., Pellikaan R.: Equality of geometric Goppa codes and equivalence of divisors. J. Pure Appl. Algebra 90(3), 229\u2013252 (1993)","journal-title":"J. Pure Appl. Algebra"},{"issue":"2","key":"9758_CR34","first-page":"159","volume":"15","author":"H. Niederreiter","year":"1986","unstructured":"Niederreiter H.: Knapsack-type crypto systems and algebraic coding theory. Probl. Control Inf. Theory 15(2), 159\u2013166 (1986)","journal-title":"Probl. Control Inf. Theory"},{"key":"9758_CR35","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1109\/18.79915","volume":"37","author":"R. Pellikaan","year":"1991","unstructured":"Pellikaan R., Shen B.Z., van Wee G.J.M.: Which linear codes are algebraic-geometric? IEEE Trans. Inf. Theory 37, 583\u2013602 (1991)","journal-title":"Inf. Theory"},{"issue":"3\u20134","key":"9758_CR36","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/BF01579181","volume":"88","author":"K. Petri","year":"1923","unstructured":"Petri K.: \u00dcber die invariante Darstellung algebraischer Funktionen einer Ver\u00e4nderlichen. Math. Ann. 88(3\u20134), 242\u2013289 (1923)","journal-title":"Math. Ann."},{"key":"9758_CR37","first-page":"130","volume":"31","author":"H.E. Piggott","year":"1947","unstructured":"Piggott H.E., Steiner A.: Isogonal conjugates. A new approach to certain geometrical theorems and to a general theory of conics. Math. Gaz. 31, 130\u2013144 (1947)","journal-title":"A new approach to certain geometrical theorems and to a general theory of conics. Math. Gaz."},{"key":"9758_CR38","volume-title":"The Geometry of Determinantal Loci","author":"T. Room","year":"1938","unstructured":"Room T.: The Geometry of Determinantal Loci. Cambridge University Press, Cambridge (1938)"},{"key":"9758_CR39","unstructured":"Saint-Donat B.: Sur les \u00e9quations d\u00e9finissant une courbe alg\u00e9brique. C. R. Acad. Sci. Paris 274, 324\u2013327, 487\u2013489 (1972)."},{"key":"9758_CR40","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/BF01430982","volume":"206","author":"B. Saint-Donat","year":"1973","unstructured":"Saint-Donat B.: On Petri\u2019s analysis of the linear system of quadrics through a canonical curve. Math. Ann. 206, 157\u2013175 (1973)","journal-title":"Math. Ann."},{"key":"9758_CR41","first-page":"439","volume":"2","author":"V.M. Sidelnikov","year":"1992","unstructured":"Sidelnikov V.M., Shestakov S.O.: On the insecurity of cryptosystems based on generalized Reed\u2013Solomon codes. Discret. Math. Appl. 2, 439\u2013444 (1992)","journal-title":"Discret. Math. Appl."},{"key":"9758_CR42","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/0021-8693(90)90104-V","volume":"130","author":"H. Stichtenoth","year":"1990","unstructured":"Stichtenoth H.: The automorphisms of geometric Goppa codes. J. Algebra 130, 113\u2013121 (1990)","journal-title":"J. Algebra"},{"key":"9758_CR43","doi-asserted-by":"crossref","unstructured":"Stichtenoth H.: Algebraic function fields and codes. In: Graduate Texts in Mathematics, vol. 254, 2nd edn. Springer, Berlin (2009).","DOI":"10.1007\/978-3-540-76878-4"},{"key":"9758_CR44","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-011-3810-9","volume-title":"Algebraic-Geometric Codes","author":"M.A. Tsfasman","year":"1991","unstructured":"Tsfasman M.A., Vl\u01cedu\u0163 S.: Algebraic-Geometric Codes. Kluwer, Dordrecht (1991)"},{"key":"9758_CR45","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF01446461","volume":"19","author":"G. Veronese","year":"1882","unstructured":"Veronese G.: Behandlung der projectivischen Verh\u00e4ltnisse der R\u00e4ume von verschiedenen Dimensionen durch das Princip des Projectirens und Schneidens. Math. Ann. 19, 161\u2013234 (1882)","journal-title":"Math. Ann."},{"key":"9758_CR46","unstructured":"Wieschebrink C.: An attack on the modified Niederreiter encryption scheme. In: PKC 2006, Lecture Notes in Computer Science, vol. 3958, pp. 14\u201326. Springer, Berlin (2006)."},{"key":"9758_CR47","unstructured":"Wieschebrink C.: Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes. In: Post-quantum Cryptography, Lecture Notes in Computer Science, vol. 6061, pp. 61\u201372. Springer, Berlin (2010)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9758-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9758-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9758-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T11:44:05Z","timestamp":1687779845000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9758-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,27]]},"references-count":47,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["9758"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9758-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10,27]]}}}