{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:42:36Z","timestamp":1775770956178,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T00:00:00Z","timestamp":1653696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T00:00:00Z","timestamp":1653696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772015"],"award-info":[{"award-number":["61772015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12095-022-00564-9","type":"journal-article","created":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T08:33:09Z","timestamp":1653726789000},"page":"221-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["MDS or NMDS LCD codes from twisted Reed-Solomon codes"],"prefix":"10.1007","volume":"15","author":[{"given":"Daitao","family":"Huang","sequence":"first","affiliation":[]},{"given":"Qin","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Yongfeng","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,28]]},"reference":[{"key":"564_CR1","doi-asserted-by":"crossref","unstructured":"Beelen, P., Puchinger, S., Ronsenkilde ne Nielsen, J.: Twisted Reed-Solomon codes. In: IEEE ISIT, pp 336\u2013340 (2017)","DOI":"10.1109\/ISIT.2017.8006545"},{"key":"564_CR2","doi-asserted-by":"crossref","unstructured":"Beelen, P., Bossert, M., Puchinger, S., Rosenkilde, J.: Structural properties of twisted Reed-Solomon codes with applications to code-based cryptography. In: IEEE ISIT, pp 946\u2013950 (2018)","DOI":"10.1109\/ISIT.2018.8437923"},{"issue":"11","key":"564_CR3","doi-asserted-by":"publisher","first-page":"7188","DOI":"10.1109\/TIT.2018.2816934","volume":"64","author":"P Beelen","year":"2019","unstructured":"Beelen, P., Jin, L.: Explicit MDS codes with complementary duals. IEEE Trans. Inf. Theory 64(11), 7188\u20137193 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"564_CR4","doi-asserted-by":"crossref","unstructured":"Bringer, J., Carlet, C., Chabanne, H., Guilley, S., Maghrebi, H.: Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with Builtin protection against side-channel and fault attacks. In: Information Security Theory and Practice. Securing the Internet of Things (Lecture Notes in Computer Science), vol. 8501, pp 40\u201356. Springer, New York, NY, USA (2014)","DOI":"10.1007\/978-3-662-43826-8_4"},{"issue":"1","key":"564_CR5","doi-asserted-by":"publisher","first-page":"131","DOI":"10.3934\/amc.2016.10.131","volume":"10","author":"C Carlet","year":"2016","unstructured":"Carlet, C., Guilley, S.: Complementary dual codes for countermeasures to side-channel attacks. Adv. Math. Commun. 10(1), 131\u2013150 (2016)","journal-title":"Adv. Math. Commun."},{"issue":"11","key":"564_CR6","doi-asserted-by":"publisher","first-page":"2605","DOI":"10.1007\/s10623-018-0463-8","volume":"86","author":"C Carlet","year":"2018","unstructured":"Carlet, C., Mesnager, S., Tang, C., Qi, Y.: Euclidean and Hermitian LCD MDS Codes. Des. Codes Cryptogr. 86(11), 2605\u20131618 (2018)","journal-title":"Des. Codes Cryptogr."},{"issue":"8","key":"564_CR7","doi-asserted-by":"publisher","first-page":"5776","DOI":"10.1109\/TIT.2017.2748955","volume":"64","author":"B Chen","year":"2018","unstructured":"Chen, B., Liu, H.: New constructions of MDS codes with complementary duals. IEEE Trans. Inf. Theory 64(8), 5776\u20135782 (2018)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"564_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1090\/conm\/609\/12150","volume":"609","author":"H Dinh","year":"2014","unstructured":"Dinh, H.: Structure of repeated-root constacyclic codes of length 6ps and their duals. Contemp. Math. 609, 69\u201387 (2014)","journal-title":"Contemp. Math."},{"issue":"1-2","key":"564_CR9","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/BF01222850","volume":"54","author":"S Dodunekov","year":"1994","unstructured":"Dodunekov, S., Landjev, I.: On near-MDS codes. J. Geometry 54(1-2), 30\u201343 (1994)","journal-title":"J. Geometry"},{"key":"564_CR10","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/S0012-365X(99)00168-5","volume":"213","author":"S Doudunekov","year":"2000","unstructured":"Doudunekov, S., Landjev, I.: Near-MDS codes over some small fields. Discret. Math. 213, 55\u201365 (2000)","journal-title":"Discret. Math."},{"issue":"2-3","key":"564_CR11","first-page":"116","volume":"4","author":"S Dougherty","year":"2017","unstructured":"Dougherty, S., Kim, J., Ozkaya, B., Sok, L., Sol\u00e9, P.: The combinatorics of LCD codes: Linear programming bound and orthogonal matrices. Int. J. Inf. Coding Theory 4(2-3), 116\u2013128 (2017)","journal-title":"Int. J. Inf. Coding Theory"},{"issue":"3","key":"564_CR12","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.ffa.2009.01.002","volume":"15","author":"M Esmaeili","year":"2009","unstructured":"Esmaeili, M., Yari, S.: On complementary-dual quasi-cyclic codes. Finite Fields Appl. 15(3), 375\u2013386 (2009)","journal-title":"Finite Fields Appl."},{"issue":"1","key":"564_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12095-020-00428-0","volume":"13","author":"X Fang","year":"2021","unstructured":"Fang, X., Liu, M., Luo, J.: On Euclidean hulls odf MDS codes. Cryptogr. Commun. 13(1), 1\u201314 (2021)","journal-title":"Cryptogr. Commun."},{"issue":"6","key":"564_CR14","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1109\/TIT.2019.2950245","volume":"66","author":"W Fang","year":"2020","unstructured":"Fang, W., Fu, F., Li, L., Zhu, S.: Euclidean and hermitian hulls of MDS codes and their applications to EAQECCs. IEEE Trans. Inf. Theory 66 (6), 3527\u20133537 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"564_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.ffa.2016.07.005","volume":"42","author":"C G\u00fcneri","year":"2016","unstructured":"G\u00fcneri, C., \u00d6zkaya, B., Sol\u00e8, P.: Quasi-cyclic complementary dual codes. Finite Fields Appl. 42, 67\u201380 (2016)","journal-title":"Finite Fields Appl."},{"key":"564_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error Correcting Codes","author":"W Huffman","year":"2003","unstructured":"Huffman, W., Pless, V.: Fundamentals of Error Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"issue":"9","key":"564_CR17","doi-asserted-by":"publisher","first-page":"2195","DOI":"10.1007\/s10623-021-00910-7","volume":"89","author":"D Huang","year":"2021","unstructured":"Huang, D., Yue, Q., Niu, Y., Li, X.: MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes. Des. Codes Cryptogr. 89 (9), 2195\u20132209 (2021)","journal-title":"Des. Codes Cryptogr."},{"key":"564_CR18","doi-asserted-by":"crossref","unstructured":"Hou, X., Oggier, F.: On LCD codes and lattices. In: Proc. IEEE Int. Symp. Inf. Theory, pp 1501\u20131505 (2016)","DOI":"10.1109\/ISIT.2016.7541549"},{"issue":"5","key":"564_CR19","first-page":"2843","volume":"63","author":"L Jin","year":"2017","unstructured":"Jin, L.: Construction of MDS codes with complementary duals. IEEE Trans. Inf. Theory 63(5), 2843\u20132847 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"564_CR20","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1109\/TIT.2018.2880913","volume":"65","author":"L Jin","year":"2019","unstructured":"Jin, L., Kan, H.: Self-dual near MDS codes from elliptic curves. IEEE Trans. Inf. Theory 65(4), 2166\u20132170 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"564_CR21","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1007\/s10623-020-00747-6","volume":"88","author":"J Lavauzelle","year":"2020","unstructured":"Lavauzelle, J., Renner, J.: Cryptanalysis of a system based on twisted Reed-Solomon codes. Des. Codes Cryptogr. 88(7), 1285\u20131300 (2020)","journal-title":"Des. Codes Cryptogr."},{"issue":"7","key":"564_CR22","doi-asserted-by":"publisher","first-page":"4344","DOI":"10.1109\/TIT.2017.2672961","volume":"63","author":"C Li","year":"2017","unstructured":"Li, C., Ding, C., Li, S.: LCD cyclic codes over finite fields. IEEE Trans. Inf. Theory 63(7), 4344\u20134356 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"564_CR23","doi-asserted-by":"publisher","first-page":"2051","DOI":"10.1007\/s10623-021-00899-z","volume":"89","author":"H Liu","year":"2021","unstructured":"Liu, H., Liu, S.: New constructions of MDS twisted Reed-Solomon codes and LCD MDS codes. Des. Codes Cryptogr. 89(9), 2051\u20132065 (2021)","journal-title":"Des. Codes Cryptogr."},{"key":"564_CR24","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.ffa.2017.10.001","volume":"49","author":"X Liu","year":"2018","unstructured":"Liu, X., Fan, Y., Liu, H.: Galois LCD codes over finite fields. Finite Fields Appl. 49, 227\u2013242 (2018)","journal-title":"Finite Fields Appl."},{"key":"564_CR25","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/0012-365X(92)90563-U","volume":"106-107","author":"J Massey","year":"1992","unstructured":"Massey, J.: Linear codes with complementary duals. Discret. Math. 106-107, 337\u2013342 (1992)","journal-title":"Discret. Math."},{"key":"564_CR26","first-page":"3","volume":"637","author":"H Randriambololona","year":"2015","unstructured":"Randriambololona, H.: On products and powers of linear codes under componentwise multiplication. Algorithm. Arith. Geom. Cod. Theory 637, 3\u201378 (2015)","journal-title":"Algorithm. Arith. Geom. Cod. Theory"},{"key":"564_CR27","doi-asserted-by":"publisher","first-page":"101892","DOI":"10.1016\/j.ffa.2021.101892","volume":"75","author":"M Shi","year":"2021","unstructured":"Shi, M., \u00d6zbudak, F., Xu, L., Sol\u00e9, P.: LCD codes from tridiagonal Toeplitz matrices. Finite Fields Appl. 75, 101892 (2021)","journal-title":"Finite Fields Appl."},{"key":"564_CR28","doi-asserted-by":"publisher","unstructured":"Shi, X., Yue, Q.: New LCD MDS codes constructed from generalized Reed-Solomon codes. J. Algebra Appl., https:\/\/doi.org\/10.1142\/S0219498819501500 (2018)","DOI":"10.1142\/S0219498819501500"},{"key":"564_CR29","unstructured":"Simos, D.E., Varbanov, Z.: MDS codes, NMDS codes and their secret-sharing schems. Accessed: Apr. 2018. [Online]"},{"key":"564_CR30","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.ffa.2017.11.007","volume":"50","author":"L Sok","year":"2018","unstructured":"Sok, L., Shi, M., Sol\u00e9, P.: Construction of optimal LCD codes over large finite fields. Finite Fields Appl. 50, 138\u2013153 (2018)","journal-title":"Finite Fields Appl."},{"issue":"8","key":"564_CR31","doi-asserted-by":"publisher","first-page":"5069","DOI":"10.1109\/TIT.2021.3086818","volume":"67","author":"Y Wu","year":"2021","unstructured":"Wu, Y., Hyun, J., Lee, Y.: New LCD MDS codes of non-Reed-Solomon type. IEEE Trans. Inf. Theory 67(8), 5069\u20135078 (2021)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"564_CR32","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/0012-365X(94)90283-6","volume":"126","author":"X Yang","year":"1994","unstructured":"Yang, X., Massey, J.: The necessary and sufficient condition for a cyclic code to have a complementary dual. Discret. Math. 126, 391\u2013393 (1994)","journal-title":"Discret. Math."},{"key":"564_CR33","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Wang, F., Xin, Y., Luo, S., Qing, S., Yang, Y.: A Secret sharing scheme based on near-MDS codes. In: Proc. IC-NIDC, pp 833\u2013836 (2009)","DOI":"10.1109\/ICNIDC.2009.5360821"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00564-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00564-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00564-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T16:11:46Z","timestamp":1676304706000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00564-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,28]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["564"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00564-9","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,28]]},"assertion":[{"value":"26 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}