{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:09:16Z","timestamp":1757617756171,"version":"3.44.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T00:00:00Z","timestamp":1745020800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T00:00:00Z","timestamp":1745020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12441103"],"award-info":[{"award-number":["12441103"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Program for Quantum Science and Technology","award":["2021ZD0302902"],"award-info":[{"award-number":["2021ZD0302902"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["NP2024129"],"award-info":[{"award-number":["NP2024129"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10623-025-01630-y","type":"journal-article","created":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T06:32:21Z","timestamp":1745044341000},"page":"3107-3133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Coding properties and automorphism groups of two classes of twisted generalized Reed\u2013Solomon codes"],"prefix":"10.1007","volume":"93","author":[{"given":"Xue","family":"Jia","sequence":"first","affiliation":[]},{"given":"Qin","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,19]]},"reference":[{"key":"1630_CR1","doi-asserted-by":"crossref","unstructured":"Allen A., Blackwell K., Fiol O., Kshirsagar R., Matsick B., Matthews G.L., Nelson Z.: Twisted Hermitian codes. Mathematics 9(1), 40 (2021).","DOI":"10.3390\/math9010040"},{"issue":"4","key":"1630_CR2","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s00200-021-00525-4","volume":"34","author":"N Aydin","year":"2023","unstructured":"Aydin N., Oliver V.R.: A new algorithm for equivalence of cyclic codes and its applications. Appl. Algebra Eng. Commun. Comput. 34(4), 649\u2013661 (2023).","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"7","key":"1630_CR3","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1007\/s10623-022-01055-x","volume":"90","author":"S Ball","year":"2022","unstructured":"Ball S., Dixon J.: The equivalence of linear codes implies semi-linear equivalence. Des. Codes Cryptogr. 90(7), 1557\u20131565 (2022).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"1630_CR4","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3934\/amc.2022064","volume":"17","author":"A Barenghi","year":"2023","unstructured":"Barenghi A., Biasse J.F., Persichetti E., Santini P.: On the computational hardness of the code equivalence problem in cryptography. Adv. Math. Commun. 17(1), 23\u201355 (2023).","journal-title":"Adv. Math. Commun."},{"key":"1630_CR5","doi-asserted-by":"crossref","unstructured":"Beelen P., Bossert M., Puchinger S., Rosenkilde J.: Structural properties of twisted Reed-Solomon codes with applications to code-based cryptography. In: IEEE International Symposium on Information Theory (ISIT), pp. 946\u2013950 (2018).","DOI":"10.1109\/ISIT.2018.8437923"},{"issue":"5","key":"1630_CR6","doi-asserted-by":"publisher","first-page":"3047","DOI":"10.1109\/TIT.2022.3146254","volume":"68","author":"P Beelen","year":"2022","unstructured":"Beelen P., Puchinger S., Nielsen J.: Twisted Reed-Solomon codes. IEEE Trans. Inf. Theory 68(5), 3047\u20133061 (2022).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1630_CR7","doi-asserted-by":"crossref","unstructured":"Berger T.P.: Cyclic alternant codes induced by an automorphism of a GRS code. In: Mullin R., Mullen G. (eds.) Finite Field: Theory, Applications and Algorithms, Contemporary Mathematics, vol. 225, pp. 143\u2013154. American Mathematical Society, Providence (1999).","DOI":"10.1090\/conm\/225\/03216"},{"key":"1630_CR8","doi-asserted-by":"crossref","unstructured":"Berger T.P., Cayrel P.L., Gaborit P., Otmani A.: Reducing key length of the McEliece cryptosystem. In: Proceedings of the 2nd international conference on Cryptology (AFRICACRYPT), Gammarth, Tunisia, pp. 77\u201397 (2009).","DOI":"10.1007\/978-3-642-02384-2_6"},{"key":"1630_CR9","doi-asserted-by":"crossref","unstructured":"Faug$$\\grave{e}$$re J., Otmani A., Perret L., de Portzamparc F., Tillich J.: Folding alternant and Goppa codes with non-trivial automorphism groups. IEEE Trans. Inf. Theory 62(1), 184\u2013198 (2016).","DOI":"10.1109\/TIT.2015.2493539"},{"key":"1630_CR10","unstructured":"Gaborit P.: Shorter keys for code based cryptography. In: Proceedings of the International Workshop on Coding and Cryptography (WCC), Bergen, Norway, pp. 81\u201391 (2005)."},{"issue":"10","key":"1630_CR11","doi-asserted-by":"publisher","first-page":"6619","DOI":"10.1109\/TIT.2021.3074526","volume":"67","author":"Y Gao","year":"2021","unstructured":"Gao Y., Yue Q., Huang X., Zhang J.: Hulls of generalized Reed-Solomon codes via Goppa codes and their applications to quantum codes. IEEE Trans. Inf. Theory 67(10), 6619\u20136626 (2021).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1630_CR12","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TIT.2023.3314059","volume":"70","author":"H Gu","year":"2024","unstructured":"Gu H., Zhang J.: On twisted generalized Reed-Solomon codes with $$\\ell $$ twists. IEEE Trans. Inf. Theory 70(1), 145\u2013153 (2024).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"1630_CR13","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s12095-022-00605-3","volume":"15","author":"G Guo","year":"2023","unstructured":"Guo G., Li R., Liu Y., Song H.: Duality of generalized twisted Reed-Solomon codes and Hermitian self-dual MDS or NMDS codes. Cryptogr. Commun. 15(2), 383\u2013395 (2023).","journal-title":"Cryptogr. Commun."},{"issue":"9","key":"1630_CR14","doi-asserted-by":"publisher","first-page":"2195","DOI":"10.1007\/s10623-021-00910-7","volume":"89","author":"D Huang","year":"2021","unstructured":"Huang D., Yue Q., Niu Y., Li X.: MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes. Des. Codes Cryptogr. 89(9), 2195\u20132209 (2021).","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"1630_CR15","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s12095-022-00564-9","volume":"15","author":"D Huang","year":"2023","unstructured":"Huang D., Yue Q., Niu Y.: MDS or NMDS LCD codes from twisted Reed-Solomon codes. Cryptogr. Commun. 15(2), 221\u2013237 (2023).","journal-title":"Cryptogr. Commun."},{"key":"1630_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error Correcting Codes","author":"W Huffman","year":"2003","unstructured":"Huffman W., Pless V.: Fundamentals of Error Correcting Codes. Cambridge University Press, Cambridge (2003)."},{"issue":"7","key":"1630_CR17","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1007\/s10623-020-00747-6","volume":"88","author":"J Lavauzelle","year":"2020","unstructured":"Lavauzelle J., Renner J.: Cryptanalysis of a system based on twisted Reed-Solomon codes. Des. Codes Cryptogr. 88(7), 1285\u20131300 (2020).","journal-title":"Des. Codes Cryptogr."},{"issue":"7","key":"1630_CR18","doi-asserted-by":"publisher","first-page":"1629","DOI":"10.1007\/s10623-022-01062-y","volume":"90","author":"X Li","year":"2022","unstructured":"Li X., Yue Q.: Non-binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes. Des. Codes Cryptogr. 90(7), 1629\u20131647 (2022).","journal-title":"Des. Codes Cryptogr."},{"key":"1630_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2023.102183","volume":"88","author":"J Liu","year":"2023","unstructured":"Liu J., Lin L.: Galois hulls of special Goppa codes and related codes with application to EAQECCs. Finite Fields Their Appl. 88, 102183 (2023).","journal-title":"Finite Fields Their Appl."},{"key":"1630_CR20","doi-asserted-by":"crossref","unstructured":"Neri A.: Twisted linearized Reed-Solomon codes: a skew polynomial framework (2021). arXiv:2105.10451.","DOI":"10.1016\/j.jalgebra.2022.06.027"},{"key":"1630_CR21","volume-title":"Construction and Decoding of Evaluation Codes in Hamming and Rank Metric","author":"S Puchinger","year":"2018","unstructured":"Puchinger S.: Construction and Decoding of Evaluation Codes in Hamming and Rank Metric. University of Ulm, Germany (2018)."},{"key":"1630_CR22","unstructured":"Puchinger S., Rosenkildene N., Sheekey J.: Further generalisations of twisted Gabidulin codes. In: International Workshop on Coding and Cryptography (2017)."},{"key":"1630_CR23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511808968","volume-title":"Introduction to Coding Theory","author":"RM Roth","year":"2006","unstructured":"Roth R.M.: Introduction to Coding Theory. Cambridge University Press, Cambridge (2006)."},{"issue":"12","key":"1630_CR24","doi-asserted-by":"publisher","first-page":"7832","DOI":"10.1109\/TIT.2022.3190676","volume":"68","author":"J Sui","year":"2022","unstructured":"Sui J., Yue Q., Li X., Huang D.: MDS, near-MDS or 2-MDS self-dual codes via twisted generalized Reed-Solomon codes. IEEE Trans. Inf. Theory 68(12), 7832\u20137841 (2022).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"1630_CR25","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1007\/s12095-023-00644-4","volume":"15","author":"J Sui","year":"2023","unstructured":"Sui J., Yue Q., Sun F.: New constructions of self-dual codes via twisted generalized Reed-Solomon codes. Cryptogr. Commun. 15(5), 959\u2013978 (2023).","journal-title":"Cryptogr. Commun."},{"issue":"8","key":"1630_CR26","doi-asserted-by":"publisher","first-page":"5069","DOI":"10.1109\/TIT.2021.3086818","volume":"67","author":"Y Wu","year":"2021","unstructured":"Wu Y., Hyun J.Y., Lee Y.: New LCD MDS codes of non-Reed-Solomon type. IEEE Trans. Inf. Theory 67(8), 5069\u20135078 (2021).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1630_CR27","volume-title":"Coding Theory: A First Course","author":"C Xing","year":"2003","unstructured":"Xing C., Ling S.: Coding Theory: A First Course. Cambridge University Press, Cambridge (2003)."},{"issue":"7","key":"1630_CR28","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1007\/s10623-022-01064-w","volume":"90","author":"J Zhang","year":"2022","unstructured":"Zhang J., Zhou Z., Tang C.: A class of twisted generalized Reed-Solomon codes. Des. Codes Cryptogr. 90(7), 1649\u20131658 (2022).","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"1630_CR29","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1007\/s10623-020-00716-z","volume":"88","author":"Y Zhou","year":"2020","unstructured":"Zhou Y.: On equivalence of maximum additive symmetric rank-distance codes. Des. Codes Cryptogr. 88(5), 841\u2013850 (2020).","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01630-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-025-01630-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01630-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T12:07:55Z","timestamp":1757160475000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-025-01630-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,19]]},"references-count":29,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1630"],"URL":"https:\/\/doi.org\/10.1007\/s10623-025-01630-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2025,4,19]]},"assertion":[{"value":"20 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"I declare that the authors have no Conflict of interest as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}