{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:50:56Z","timestamp":1775757056250,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T00:00:00Z","timestamp":1655078400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T00:00:00Z","timestamp":1655078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772015"],"award-info":[{"award-number":["61772015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172219"],"award-info":[{"award-number":["62172219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s10623-022-01062-y","type":"journal-article","created":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T17:03:52Z","timestamp":1655139832000},"page":"1629-1647","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Non-binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes"],"prefix":"10.1007","volume":"90","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9925-1026","authenticated-orcid":false,"given":"Xia","family":"Li","sequence":"first","affiliation":[]},{"given":"Qin","family":"Yue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,13]]},"reference":[{"key":"1062_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-25405-5_12","volume-title":"Post-Quantum Cryptography","author":"PSLM Barreto","year":"2011","unstructured":"Barreto P.S.L.M., Lindner R., Misoczki R.: Monoidic codes in cryptography. In: Yang B.Y. (ed.) Post-Quantum Cryptography, vol. 7071, pp. 179\u2013199. Lecture Notes in Computer Science. Springer, Berlin (2011)."},{"key":"1062_CR2","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1090\/conm\/225\/03216","volume-title":"Finite Field: Theory, Applications and Algorithms, Contemporary Mathematics","author":"TP Berger","year":"1999","unstructured":"Berger T.P.: Cyclic alternant codes induced by an automorphism of a GRS code. In: Mullin R., Mullen G. (eds.) Finite Field: Theory, Applications and Algorithms, Contemporary Mathematics, vol. 225, pp. 143\u2013154. American Mathematical Society, Providence (1999)."},{"issue":"7","key":"1062_CR3","doi-asserted-by":"publisher","first-page":"2628","DOI":"10.1109\/18.887871","volume":"46","author":"TP Berger","year":"2000","unstructured":"Berger T.P.: Goppa and related codes invariant under a prescribed permutation. IEEE Trans. Inf. Theory 46(7), 2628\u20132633 (2000).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"1062_CR4","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1006\/ffta.2000.0277","volume":"6","author":"TP Berger","year":"2000","unstructured":"Berger T.P.: On the cyclicity of Goppa codes, parity-check subcodes of Goppa codes, and extended Goppa codes. Finite Fields Their Appl. 6(3), 255\u2013281 (2000).","journal-title":"Finite Fields Their Appl."},{"key":"1062_CR5","doi-asserted-by":"crossref","unstructured":"Berger T.P., Cayrel P.L., Gaborit P., Otmani A.: Reducing key length of the McEliece cryptosystem. In: Proceedings of the 2nd international conference on Cryptology (AFRICACRYPT), Gammarth, Tunisia, pp. 77\u201397 (2009).","DOI":"10.1007\/978-3-642-02384-2_6"},{"key":"1062_CR6","first-page":"37","volume":"4","author":"ER Berlekamp","year":"1966","unstructured":"Berlekamp E.R., Rumsey H., Solomon G.: Solutions of algebraic equations in fields of characteristic $$2$$. Jet Propuls. Lab. Space Programs Summ. 4, 37\u201339 (1966).","journal-title":"Jet Propuls. Lab. Space Programs Summ."},{"issue":"6","key":"1062_CR7","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/S0019-9958(67)91016-9","volume":"10","author":"ER Berlekamp","year":"1967","unstructured":"Berlekamp E.R., Rumsey H., Solomon G.: On the solution of algebraic equations over finite fields. Inf. Control. 10(6), 553\u2013564 (1967).","journal-title":"Inf. Control."},{"issue":"2","key":"1062_CR8","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1023\/A:1008327723647","volume":"20","author":"G Bommier","year":"2000","unstructured":"Bommier G., Blanchet F.: Binary quasi-cyclic Goppa codes. Des. Codes Cryptogr. 20(2), 107\u2013124 (2000).","journal-title":"Des. Codes Cryptogr."},{"key":"1062_CR9","doi-asserted-by":"crossref","unstructured":"Faug$$\\grave{e}$$re J.C., Otmani A., Perret L., de Portzamparc F., Tillich J.P.: Folding alternant and Goppa codes with non-trivial automorphism groups. IEEE Trans. Inf. Theory 62(1), 184\u2013198 (2016).","DOI":"10.1109\/TIT.2015.2493539"},{"key":"1062_CR10","unstructured":"Gaborit P.: Shorter keys for code based cryptography. In: Proceedings of the International Workshop on Coding and Cryptography (WCC), Bergen, Norway, pp. 81\u201391 (2005)."},{"issue":"3","key":"1062_CR11","first-page":"24","volume":"6","author":"VD Goppa","year":"1970","unstructured":"Goppa V.D.: A new class of linear correcting codes. Probl. Pereda. Inf. 6(3), 24\u201330 (1970).","journal-title":"Probl. Pereda. Inf."},{"key":"1062_CR12","unstructured":"Li X., Yue Q., Huang D.T.: Binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes. arXiv:2107.10494v1"},{"key":"1062_CR13","volume-title":"The Theory of Error Correcting Codes","author":"FJ Macwilliams","year":"1986","unstructured":"Macwilliams F.J., Sloane N.J.A.: The Theory of Error Correcting Codes. North-Holland, Amsterdam (1986)."},{"key":"1062_CR14","first-page":"114","volume":"42\u201344","author":"R McEliece","year":"1978","unstructured":"McEliece R.: A public-key cryptosystem based on algebraic coding theory. DSN Progr. Rep. 42\u201344, 114\u2013116 (1978).","journal-title":"DSN Progr. Rep."},{"key":"1062_CR15","doi-asserted-by":"crossref","unstructured":"Misoczki R., Barreto P.S.L.M.: Compact McEliece keys from Goppa codes. In: Proceedings of 16th Annual International Workshop Selected Areas in Cryptography (SAC), Calgary, AB, pp. 376\u2013392 (2009).","DOI":"10.1007\/978-3-642-05445-7_24"},{"issue":"2","key":"1062_CR16","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1515\/jmc-2011-0099","volume":"6","author":"E Persichetti","year":"2012","unstructured":"Persichetti E.: Compact McEliece keys based on quasi-dyadic Srivastava codes. J. Math. Cryptol. 6(2), 149\u2013169 (2012).","journal-title":"J. Math. Cryptol."},{"key":"1062_CR17","unstructured":"Ryan J.A., Fitzpatrick P.: Quasi-cyclic irreducible Goppa codes. In: Proceedings Under IEEE International Symposium on Information Theory (ISIT), p. 183 (2004)."},{"key":"1062_CR18","volume-title":"Cyclotomy and Difference Sets","author":"T Storer","year":"1967","unstructured":"Storer T.: Cyclotomy and Difference Sets. Markham, Chicago (1967)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01062-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-022-01062-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01062-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T15:17:57Z","timestamp":1657293477000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-022-01062-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,13]]},"references-count":18,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["1062"],"URL":"https:\/\/doi.org\/10.1007\/s10623-022-01062-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,13]]},"assertion":[{"value":"5 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}