{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T18:41:13Z","timestamp":1775760073575,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T00:00:00Z","timestamp":1663632000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T00:00:00Z","timestamp":1663632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11901579"],"award-info":[{"award-number":["11901579"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2021JQ-335"],"award-info":[{"award-number":["2021JQ-335"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2021JM-216"],"award-info":[{"award-number":["2021JM-216"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Support fund for Excellent Doctoral Dissertation of Air Force Engineering University","award":["KGD083920015"],"award-info":[{"award-number":["KGD083920015"]}]},{"name":"Research Fund of Fundamentals Department of Air Force Engineering University","award":["JK2022201"],"award-info":[{"award-number":["JK2022201"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20428"],"award-info":[{"award-number":["U21A20428"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12095-022-00605-3","type":"journal-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T07:02:36Z","timestamp":1663657356000},"page":"383-395","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Duality of generalized twisted Reed-Solomon codes and Hermitian self-dual MDS or NMDS codes"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3519-9289","authenticated-orcid":false,"given":"Guanmin","family":"Guo","sequence":"first","affiliation":[]},{"given":"Ruihu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,20]]},"reference":[{"issue":"3","key":"605_CR1","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/18.30988","volume":"35","author":"RM Roth","year":"1989","unstructured":"Roth, R.M., Lempel, A.: A construction of non-Reed-Solomon type MDS codes. IEEE Trans. Inf. Theory 35(3), 655\u2013657 (1989)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"605_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/BF01222850","volume":"54","author":"S Dodunekov","year":"1995","unstructured":"Dodunekov, S., Landgev, I.: On near-MDS codes. J. Geometry 54, 30\u201343 (1995)","journal-title":"J. Geometry"},{"key":"605_CR3","unstructured":"Landjev, I., Rousseva, A.: The main conjecture for near-MDS codes. Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich. WCC2015-9th International Workshop on Coding and Cryptography (2015)"},{"key":"605_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Wang, F., Xin, Y., Luo, S., Qing, S., Yang, Y.: A secret sharing scheme based on near-MDS codes. In: Proc. IC-NIDC, pp. 833-836 (2009)","DOI":"10.1109\/ICNIDC.2009.5360821"},{"key":"605_CR5","doi-asserted-by":"crossref","unstructured":"Dougherty, S.T., Mesnager, S., Sole, P.: Secret-sharing schemes based on self-dual code. In: Proc. Inf. Theory Workshop, pp. 338-342 (2008)","DOI":"10.1109\/ITW.2008.4578681"},{"key":"605_CR6","unstructured":"Massey, J.: Some applications of coding theory in cryptography. In: Proc. 4th IMA Conf. Cryptogr. Coding, pp. 33-47 (1995)"},{"issue":"1","key":"605_CR7","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.jcta.2003.10.003","volume":"105","author":"JL Kim","year":"2006","unstructured":"Kim, J.L., Lee, Y.: Euclidean and Hermitian self-dual MDS codes over large finite fields. J. Comb. Theory Ser. A 105(1), 79\u201395 (2006)","journal-title":"J. Comb. Theory Ser. A"},{"issue":"9","key":"605_CR8","doi-asserted-by":"publisher","first-page":"4354","DOI":"10.1109\/TIT.2008.928297","volume":"54","author":"TA Gulliver","year":"2008","unstructured":"Gulliver, T.A., Kim, J.L., Lee, Y.: New MDS or near-MDS self-dual codes. IEEE Trans. Inf. Theory 54(9), 4354\u20134360 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"605_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10623-011-9489-x","volume":"62","author":"K Guenda","year":"2012","unstructured":"Guenda, K.: New MDS self-dual codes over finite fields. Des. Codes Cryptogr. 62(1), 31\u201342 (2012)","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"605_CR10","doi-asserted-by":"publisher","first-page":"325","DOI":"10.4236\/apm.2017.75019","volume":"7","author":"H Tong","year":"2017","unstructured":"Tong, H., Wang, X.: New MDS Euclidean and Hermitian self-dual codes over finite fields. Adv. Pure Math. 7(5), 325\u2013333 (2017)","journal-title":"Adv. Pure Math."},{"key":"605_CR11","first-page":"67","volume":"18","author":"T Baicheva","year":"2004","unstructured":"Baicheva, T., Bouyukliev, I., Dodunekov, S., Willems, W.: On the \u00a0[10, 5, 6]9 Reed-Solomon and Glynn codes. Mathematica Balkanica, New Series 18, 67\u201378 (2004)","journal-title":"Mathematica Balkanica, New Series"},{"issue":"6","key":"605_CR12","doi-asserted-by":"publisher","first-page":"3603","DOI":"10.1109\/TIT.2019.2954877","volume":"66","author":"L Sok","year":"2020","unstructured":"Sok, L.: Explicit constructions of MDS self-dual codes. IEEE Trans. Inf. Theory 66(6), 3603\u20133615 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"605_CR13","doi-asserted-by":"publisher","first-page":"1434","DOI":"10.1109\/TIT.2016.2645759","volume":"63","author":"L Jin","year":"2017","unstructured":"Jin, L., Xing, C.: New MDS self-dual codes from generalized Reed-Solomon codes. IEEE Trans. Inf. Theory 63(3), 1434\u20131438 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"605_CR14","doi-asserted-by":"publisher","first-page":"5574","DOI":"10.1109\/TIT.2019.2916367","volume":"65","author":"W Fang","year":"2019","unstructured":"Fang, W., Fu, F.-W.: New constructions of MDS Euclidean self-dual codes from GRS codes and extended GRS codes. IEEE Trans. Inf. Theory 65(9), 5574\u20135579 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"605_CR15","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1007\/s10623-020-00734-x","volume":"88","author":"X Fang","year":"2020","unstructured":"Fang, X., Labad, K., Liu, H., Luo, J.: New MDS self-dual codes over finite fields of odd characteristic. Des. Codes Cryptogr. 88(6), 1127\u20131138 (2020)","journal-title":"Des. Codes Cryptogr."},{"key":"605_CR16","unstructured":"Fang, W., Zhang, J., Xia, S.-T., Fu, F.-W.: A note on self-dual generalized Reed-Solomon codes. arXiv:2005.11732, [online] (2020)"},{"issue":"6","key":"605_CR17","doi-asserted-by":"publisher","first-page":"3650","DOI":"10.1109\/TIT.2020.2963975","volume":"66","author":"A Zhang","year":"2020","unstructured":"Zhang, A., Feng, K.: A unified approach to construct MDS self-dual codes via Reed-Solomon codes. IEEE Trans. Inf. Theory 66(6), 3650\u20133656 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"605_CR18","doi-asserted-by":"publisher","first-page":"349","DOI":"10.3934\/amc.2009.3.349","volume":"3","author":"IS Kotsireas","year":"2009","unstructured":"Kotsireas, I.S., Koukouvinos, C., Simos, D.E.: MDS and near-MDS self-dual codes over large prime fields. Adv. Math. Commun. 3(4), 349\u2013361 (2009)","journal-title":"Adv. Math. Commun."},{"issue":"4","key":"605_CR19","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1109\/TIT.2018.2880913","volume":"65","author":"L Jin","year":"2019","unstructured":"Jin, L., Kan, H.: Self-dual near MDS codes from elliptic curves. IEEE Trans. Inform. Theory 65(4), 2166\u20132170 (2019)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"605_CR20","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/LCOMM.2020.3044893","volume":"25","author":"G Guo","year":"2021","unstructured":"Guo, G., Li, R.: Hermitian self-Dual GRS and extended GRS codes. IEEE Commun. Lett. 25(4), 1062\u20131065 (2021)","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"605_CR21","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2019.2908640","volume":"23","author":"Y Niu","year":"2019","unstructured":"Niu, Y., Yue, Q., Wu, Y., Hu, L.: Hermitian self-dual, MDS, and generalized Reed-Solomon codes. IEEE Commun. Lett. 23(5), 781\u2013784 (2019)","journal-title":"IEEE Commun. Lett."},{"key":"605_CR22","doi-asserted-by":"publisher","first-page":"475","DOI":"10.3934\/amc.2016019","volume":"10","author":"J Sheekey","year":"2016","unstructured":"Sheekey, J.: A new family of linear maximum rank distance codes. Adv. Math. Commun. 10, 475\u2013488 (2016)","journal-title":"Adv. Math. Commun."},{"key":"605_CR23","doi-asserted-by":"crossref","unstructured":"Beelen, P., Puchinger, S., Rosenkilde, n\u00e9 N. J.: Twisted Reed-Solomon codes. In: IEEE Int. Symp. Inf. Theory (ISIT), pp. 336-340 (2017)","DOI":"10.1109\/ISIT.2017.8006545"},{"key":"605_CR24","doi-asserted-by":"crossref","unstructured":"Beelen, P., Bossert, M., Puchinger, S., Rosenkilde, n\u00e9 N.J.: Structural properties of twisted Reed-Solomon codes with applications to code-based cryptography. In: IEEE Int. Symp. Inf. Theory (ISIT), pp. 946-950 (2018)","DOI":"10.1109\/ISIT.2018.8437923"},{"issue":"7","key":"605_CR25","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1007\/s10623-020-00747-6","volume":"88","author":"J Lavauzelle","year":"2020","unstructured":"Lavauzelle, J., Renner, J.: Cryptanalysis of a system based on twisted Reed-Solomon codes. Des. Codes Cryptogr. 88(7), 1285\u20131300 (2020)","journal-title":"Des. Codes Cryptogr."},{"key":"605_CR26","doi-asserted-by":"publisher","first-page":"2195","DOI":"10.1007\/s10623-021-00910-7","volume":"89","author":"D Huang","year":"2021","unstructured":"Huang, D., Yue, Q., Niu, Y., Li, X.: MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes. Des. Codes Cryptogr. 89, 2195\u20132209 (2021)","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"605_CR27","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/LCOMM.2020.3025178","volume":"25","author":"Y Wu","year":"2021","unstructured":"Wu, Y.: Twisted Reed-Solomon codes with one-dimensional Hull. IEEE Commun. Lett. 25(2), 383\u2013386 (2021)","journal-title":"IEEE Commun. Lett."},{"key":"605_CR28","doi-asserted-by":"publisher","first-page":"5069","DOI":"10.1109\/TIT.2021.3086818","volume":"67","author":"Y Wu","year":"2021","unstructured":"Wu, Y., Hyun, J.Y., Lee, Y.: New LCD MDS codes of non-Reed-Solomon type. IEEE Trans. Inf. Theory 67, 5069\u20135078 (2021)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"605_CR29","doi-asserted-by":"publisher","first-page":"2051","DOI":"10.1007\/s10623-021-00899-z","volume":"89","author":"H Liu","year":"2021","unstructured":"Liu, H., Liu, S.: New constructions of MDS twisted Reed-Solomon codes and LCD MDS codes. Des. Codes Cryptogr. 89, 2051\u20132065 (2021)","journal-title":"Des. Codes Cryptogr."},{"key":"605_CR30","doi-asserted-by":"crossref","unstructured":"Mullen, G.L., Panario, D.: Handbook of finite fields. Discrete Mathematics and its Applications. Boca Raton, FL, USA: CRC Press (2013)","DOI":"10.1201\/b15006"},{"key":"605_CR31","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1049\/iet-ifs.2018.5207","volume":"13","author":"M Baldi","year":"2019","unstructured":"Baldi, M., Chiaraluce, F., Rosenthal, J., Santini, P., Schipani, D.: Security of generalized Reed-Solomon code-based cryptosystems. IET Inform. Secur. 13, 404\u2013410 (2019)","journal-title":"IET Inform. Secur."},{"key":"605_CR32","doi-asserted-by":"crossref","unstructured":"Senger, C., Bohara, R.: A linear algebraic approach to subfield subcodes of GRS codes. In: Proc. IEEE Int. Symp. Inf. Theory (ISIT), pp. 6-10 (2018)","DOI":"10.1109\/ISIT.2018.8437645"},{"key":"605_CR33","doi-asserted-by":"crossref","unstructured":"Neri, A.: Twisted linearized Reed-Solomon codes: A skew polynomial framework, arXiv:2105.10451, [online] (2021)","DOI":"10.1016\/j.jalgebra.2022.06.027"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00605-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00605-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00605-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T16:13:45Z","timestamp":1676304825000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00605-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,20]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["605"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00605-3","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,20]]},"assertion":[{"value":"23 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}