{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T20:04:35Z","timestamp":1769025875230,"version":"3.49.0"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,1,3]],"date-time":"2013-01-03T00:00:00Z","timestamp":1357171200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s10623-012-9784-1","type":"journal-article","created":{"date-parts":[[2013,1,2]],"date-time":"2013-01-02T10:13:38Z","timestamp":1357121618000},"page":"593-608","source":"Crossref","is-referenced-by-count":18,"title":["K\u00f6tter interpolation in skew polynomial rings"],"prefix":"10.1007","volume":"72","author":[{"given":"Siyu","family":"Liu","sequence":"first","affiliation":[]},{"given":"Felice","family":"Manganiello","sequence":"additional","affiliation":[]},{"given":"Frank R.","family":"Kschischang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,3]]},"reference":[{"key":"9784_CR1","doi-asserted-by":"crossref","unstructured":"Ore O.: Theory of non-commutative polynomials. Ann. Math. 34, 480\u2013508 (1933).","DOI":"10.2307\/1968173"},{"key":"9784_CR2","unstructured":"Cohn P.M.: Free Rings and Their Relations. Academic Press, London (1971)."},{"key":"9784_CR3","doi-asserted-by":"crossref","unstructured":"Jacobson N.: Finite Dimensional Division Algebras over Fields. Springer, Berlin (1996).","DOI":"10.1007\/978-3-642-02429-0"},{"key":"9784_CR4","unstructured":"Boucher D., Ulmer F.: Coding with skew polynomial rings. J. Symb. Comput. 44, 1644\u20131656 (2009)."},{"key":"9784_CR5","doi-asserted-by":"crossref","unstructured":"Boucher D., Geiselmann W., Ulmer F.: Skew cyclic codes. Appl. Algebra Eng. Commun. Comput. 18, 379\u2013389 (2007).","DOI":"10.1007\/s00200-007-0043-z"},{"key":"9784_CR6","unstructured":"Boucher D., Gaborit P., Geiselmann W., Ulmer, F.: Key exchange and encryption schemes based on non-commutative skew polynomials. Proc. PQCrypto. 6061, 126\u2013141 (2010)."},{"key":"9784_CR7","unstructured":"Zhang Y.: A secret sharing scheme via skew polynomials. In: Proceedings of the 2010 International Conference on Computational Science and Its Applications, ICCSA \u201910, pp. 33\u201338. IEEE Computer Society, Washington, DC (2010)."},{"key":"9784_CR8","unstructured":"Sidorenko V., Jiang L., Bossert M.: Skew-feedback shift-register synthesis and decoding interleaved Gabidulin codes. IEEE Trans. Inform. Theory 57, 621\u2013632 (2011)."},{"key":"9784_CR9","unstructured":"Gabidulin E.M.: Theory of codes with maximal rank distance. Probl. Inform. Trans. 21, 1\u201312 (1985)."},{"key":"9784_CR10","unstructured":"K\u00f6tter R., Kschischang F.: Coding for errors and erasures in random network coding. IEEE Trans. Inform. Theory 54, 3579\u20133591 (2008)."},{"key":"9784_CR11","unstructured":"Lam T.Y., Leroy A.: Vandermonde and Wronskian matrices over division rings. J. Algebra 199, 306\u2013336 (1988)."},{"key":"9784_CR12","unstructured":"Eric A.: Polynomial interpolation problem for skew polynomials. Appl. Anal. Discret. Math. 1, 403\u2013414 (2007)."},{"key":"9784_CR13","unstructured":"Wang B., McEliece R.J., Watanabe K.: K\u00f6tter interpolation over free modules. In: Proceedings of 2005 Allerton Conferance on Communications Control and Computing, pp. 2197\u20132206. SEP, Monticello (2005)."},{"key":"9784_CR14","unstructured":"Lidl R., Niederreiter H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1986)."},{"key":"9784_CR15","unstructured":"Lam T.Y.: A general theory of Vandermonde matrices. Expos. Math. 4, 193\u2013215 (1986)."},{"key":"9784_CR16","unstructured":"Xie H., Yan Z., Suter B.: General linearized polynomial interpolation and its applications. In: 2011 International Symposium on Network Coding, pp. 1\u20134. SNC, Beijing (2011)."},{"key":"9784_CR17","doi-asserted-by":"crossref","unstructured":"Cox D., Little J., O\u2019Shea D.: Ideals, Varieties, and Algorithms. Springer, New York (1992).","DOI":"10.1007\/978-1-4757-2181-2"},{"key":"9784_CR18","unstructured":"Berlekamp E.R.: Algebraic Coding Theory. McGraw-Hill, New York (1968)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9784-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9784-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9784-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T19:35:44Z","timestamp":1562528144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9784-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,3]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["9784"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9784-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,3]]}}}