{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:13:09Z","timestamp":1775769189857,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T00:00:00Z","timestamp":1691971200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T00:00:00Z","timestamp":1691971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s12095-023-00667-x","type":"journal-article","created":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T07:02:15Z","timestamp":1691996535000},"page":"249-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["On the construction of near-MDS matrices"],"prefix":"10.1007","volume":"16","author":[{"given":"Kishan Chand","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Sumit Kumar","family":"Pandey","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4643-5117","authenticated-orcid":false,"given":"Susanta","family":"Samanta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,14]]},"reference":[{"key":"667_CR1","doi-asserted-by":"crossref","unstructured":"Albrecht, MR., Driessen, B., Kavun, E.B., Leander, G., Paar, C., Yal\u00e7\u0131n, T.:Block ciphers \u2013 focus on the linear layer (feat. PRIDE). In Garay, J.A., Gennaro, R. (eds) Advances in Cryptology \u2013 CRYPTO 2014, pp 57\u201376, Berlin, Heidelberg, 2014 Springer (2014)","DOI":"10.1007\/978-3-662-44371-2_4"},{"issue":"2","key":"667_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.46586\/tosc.v2018.i2.20-47","volume":"2018","author":"GN Alfarano","year":"2018","unstructured":"Alfarano, G.N., Beierle, C., Isobe, T., K\u00f6lbl, S., Leander, G.: Shiftrows alternatives for AES-like ciphers and optimal cell permutations for midori and skinny. IACR Trans. Symmetric Cryptology 2018(2), 20\u201347 (2018)","journal-title":"IACR Trans. Symmetric Cryptology"},{"key":"667_CR3","doi-asserted-by":"crossref","unstructured":"Augot, D., Finiasz, M.: Direct construction of recursive MDS diffusion layers using shortened BCH codes. International conference on fast software encryption, pp 3\u201317 cited By 16 (2014)","DOI":"10.1007\/978-3-662-46706-0_1"},{"key":"667_CR4","volume-title":"Advances in Cryptology - ASIACRYPT 2015, pp 411\u2013436","author":"S Banik","year":"2015","unstructured":"Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T., Regazzoni, F.: Midori: A block cipher for low energy. In: Iwata, T., Cheon, J.H. (eds.) Advances in Cryptology - ASIACRYPT 2015, pp 411\u2013436. Heidelberg Springer, Berlin (2015)"},{"key":"667_CR5","doi-asserted-by":"crossref","unstructured":"Banik, S., Funabiki, Y., Isobe, T.: More Results on Shortest Linear Programs. In Attrapadung, N., Yagi, T. (eds) Advances in information and computer security, pp 109\u2013128, Cham, 2019, Springer International Publishing (2019)","DOI":"10.1007\/978-3-030-26834-3_7"},{"key":"667_CR6","volume-title":"Advances in Cryptology - CRYPTO 2016, pp 123\u2013153","author":"C Beierle","year":"2016","unstructured":"Beierle, C., Jean, J., K\u00f6lbl, S., Leander, G., Moradi, A., Peyrin, T., Sasaki, Y., Sasdrich, P., Sim, S.M.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology - CRYPTO 2016, pp 123\u2013153. Heidelberg Springer, Berlin (2016)"},{"key":"667_CR7","volume-title":"Advances in Cryptology - CRYPTO 2016, pp 625\u2013653","author":"C Beierle","year":"2016","unstructured":"Beierle, C., Kranz, T., Leander, G.: Lightweight Multiplication in GF$$(2^n)$$ with Applications to MDS matrices. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology - CRYPTO 2016, pp 625\u2013653. Heidelberg Springer, Berlin (2016)"},{"key":"667_CR8","doi-asserted-by":"crossref","unstructured":"Berger, T.P.: Construction of recursive MDS diffusion layers from gabidulin codes. In Paul, G., Vaudenay, S. (eds) Progress in Cryptology \u2013 INDOCRYPT 2013, pp 274\u2013285, Cham, 2013 Springer International Publishing (2013)","DOI":"10.1007\/978-3-319-03515-4_18"},{"key":"667_CR9","volume-title":"Cryptographic hardware and embedded systems - CHES 2013, pp 142\u2013158","author":"B Bilgin","year":"2013","unstructured":"Bilgin, B., Bogdanov, A., Kne\u017eevi\u0107, M., Mendel, F., Wang, Q.: Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware. In: Bertoni, G., Coron, J.-S. (eds.) Cryptographic hardware and embedded systems - CHES 2013, pp 142\u2013158. Heidelberg Springer, Berlin (2013)"},{"key":"667_CR10","volume-title":"Advances in Cryptology- ASIACRYPT 2012, pp 208\u2013225","author":"J Borghoff","year":"2012","unstructured":"Borghoff, J., Canteaut, A., G\u00fcneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S.S., Yal\u00e7\u0131n, T.: PRINCE - A low-latency block cipher for pervasive computing applications. In: Wang, X., Sako, K. (eds.) Advances in Cryptology- ASIACRYPT 2012, pp 208\u2013225. Heidelberg Springer, Berlin (2012)"},{"key":"667_CR11","volume-title":"Mathematical foundations of computer science 2008, pp 168\u2013179","author":"J Boyar","year":"2008","unstructured":"Boyar, J., Matthews, P., Peralta, R.: On the shortest linear straight-line program for computing linear forms. In: Ochma\u0144ski, E., Tyszkiewicz, J. (eds.) Mathematical foundations of computer science 2008, pp 168\u2013179. Heidelberg Springer, Berlin (2008)"},{"key":"667_CR12","volume-title":"Information security, pp 367\u2013384","author":"J Choy","year":"2008","unstructured":"Choy, J., Khoo, K.: New Applications of Differential Bounds of the SDS Structure. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) Information security, pp 367\u2013384. Heidelberg Springer, Berlin (2008)"},{"key":"667_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of rijndael: AES - The advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of rijndael: AES - The advanced encryption standard. Springer, Information security and cryptography (2002)"},{"issue":"1","key":"667_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/BF01222850","volume":"54","author":"S Dodunekov","year":"1995","unstructured":"Dodunekov, S., Landgev, I.: On near-MDS codes. J. Geometry 54(1), 30\u201343 (1995)","journal-title":"Geometry"},{"issue":"2","key":"667_CR15","doi-asserted-by":"publisher","first-page":"48","DOI":"10.46586\/tosc.v2018.i2.48-78","volume":"2018","author":"S Duval","year":"2018","unstructured":"Duval, S., Leurent, G.: MDS matrices with lightweight circuits. IACR Trans. Symmetric Cryptology 2018(2), 48\u201378 (2018)","journal-title":"IACR Trans. Symmetric Cryptology"},{"key":"667_CR16","volume-title":"Advances in Cryptology - CRYPTO 2011, pp 222\u2013239","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: Rogaway, P. (ed.) Advances in Cryptology - CRYPTO 2011, pp 222\u2013239. Heidelberg Springer, Berlin (2011)"},{"key":"667_CR17","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2011, p 326\u2013341","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2011, p 326\u2013341. Heidelberg Springer, Berlin (2011)"},{"issue":"4","key":"667_CR18","doi-asserted-by":"publisher","first-page":"779","DOI":"10.3934\/amc.2019045","volume":"13","author":"KC Gupta","year":"2019","unstructured":"Gupta, K.C., Pandey, S.K., Ray, I.G., Samanta, S.: Cryptographically significant MDS matrices over finite fields: A brief survey and some generalized results. Adv. Math. Commun. 13(4), 779\u2013843 (2019)","journal-title":"Adv. Math. Commun."},{"key":"667_CR19","doi-asserted-by":"crossref","unstructured":"Gupta, K.C., Pandey, S.K., Samanta, S.: A few negative results on constructions of MDS matrices using low XOR matrices. In Bhasin, S., Mendelson, A., Nandi, M. (eds) Security, privacy, and applied cryptography engineering, pp 195\u2013213 Cham, 2019. Springer International Publishing (2019)","DOI":"10.1007\/978-3-030-35869-3_14"},{"key":"667_CR20","volume-title":"Progress in Cryptology- AFRICACRYPT 2022, pp 3\u201327","author":"KC Gupta","year":"2022","unstructured":"Gupta, K.C., Pandey, S.K., Samanta, S.: Construction of recursive MDS matrices using DLS matrices. In: Batina, L., Daemen, J. (eds.) Progress in Cryptology- AFRICACRYPT 2022, pp 3\u201327. Cham, Springer Nature Switzerland (2022)"},{"key":"667_CR21","volume-title":"Progress in Cryptology - AFRICACRYPT 2022, pp 28\u201352","author":"KC Gupta","year":"2022","unstructured":"Gupta, K.C., Pandey, S.K., Samanta, S.: FUTURE: A lightweight block cipher using an optimal diffusion matrix. In: Batina, L., Daemen, J. (eds.) Progress in Cryptology - AFRICACRYPT 2022, pp 28\u201352. Cham, Springer Nature Switzerland (2022)"},{"issue":"1\u20132","key":"667_CR22","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10623-016-0233-4","volume":"82","author":"KC Gupta","year":"2017","unstructured":"Gupta, K.C., Pandey, S.K., Venkateswarlu, A.: On the direct construction of recursive MDS matrices. Designs Codes Cryptography 82(1\u20132), 77\u201394 (2017)","journal-title":"Designs Codes Cryptography"},{"issue":"1\u20132","key":"667_CR23","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s10623-016-0261-0","volume":"82","author":"KC Gupta","year":"2017","unstructured":"Gupta, K.C., Pandey, S.K., Venkateswarlu, A.: Towards a general construction of recursive MDS diffusion layers. Designs, Codes and Cryptography 82(1\u20132), 179\u2013195 (2017)","journal-title":"Designs, Codes and Cryptography"},{"key":"667_CR24","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s12095-014-0116-3","volume":"7","author":"KC Gupta","year":"2015","unstructured":"Gupta, K.C., Ray, I.G.: Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications. Cryptography Commun. 7, 257\u2013287 (2015)","journal-title":"Cryptography Commun."},{"key":"667_CR25","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-030-17653-2_10","volume-title":"Advances in Cryptology - EUROCRYPT 2019","author":"L K\u00f6lsch","year":"2019","unstructured":"K\u00f6lsch, L.: XOR-counts and lightweight multiplication with fixed elements in binary finite fields. In: Ishai, Y., Rijmen, V. (eds.) Advances in Cryptology - EUROCRYPT 2019, pp. 285\u2013312. Springer International Publishing, Cham (2019)"},{"issue":"4","key":"667_CR26","doi-asserted-by":"publisher","first-page":"188","DOI":"10.46586\/tosc.v2017.i4.188-211","volume":"2017","author":"T Kranz","year":"2017","unstructured":"Kranz, T., Leander, G., Stoffelen, K., Wiemer, F.: Shorter linear straight-line programs for MDS matrices. IACR Trans. Symmetric Cryptology 2017(4), 188\u2013211 (2017)","journal-title":"IACR Trans. Symmetric Cryptology"},{"issue":"1","key":"667_CR27","doi-asserted-by":"publisher","first-page":"129","DOI":"10.46586\/tosc.v2017.i1.129-155","volume":"2017","author":"C Li","year":"2017","unstructured":"Li, C., Wang, Q.: Design of lightweight linear diffusion layers from near-mds matrices. IACR Trans. Symmetric Cryptology 2017(1), 129\u2013155 (2017)","journal-title":"IACR Trans. Symmetric Cryptology"},{"issue":"1","key":"667_CR28","doi-asserted-by":"publisher","first-page":"84","DOI":"10.46586\/tosc.v2019.i1.84-117","volume":"2019","author":"S Li","year":"2019","unstructured":"Li, S., Sun, S., Li, C., Wei, Z., Hu, L.: Constructing low-latency involutory MDS matrices with lightweight circuits. IACR Trans. Symmetric Cryptology 2019(1), 84\u2013117 (2019)","journal-title":"IACR Trans. Symmetric Cryptology"},{"key":"667_CR29","volume-title":"Information security and privacy, pp 132\u2013150","author":"X Li","year":"2021","unstructured":"Li, X., Wu, W.: Constructions of iterative near-MDS matrices with the lowest XOR Count. In: Baek, J., Ruj, S. (eds.) Information security and privacy, pp 132\u2013150. Springer International Publishing, Cham (2021)"},{"key":"667_CR30","volume-title":"Fast software encryption, pp 101\u2013120","author":"M Liu","year":"2016","unstructured":"Liu, M., Sim, S.M.: Lightweight MDS generalized circulant matrices. In: Peyrin, T. (ed.) Fast software encryption, pp 101\u2013120. Heidelberg Springer, Berlin Heidelberg, Berlin (2016)"},{"key":"667_CR31","volume-title":"The theory of error correcting codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The theory of error correcting codes. North-Holland Publishing Co., Amsterdam-New York-Oxford (1977)"},{"issue":"4","key":"667_CR32","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1049\/iet-ifs.2017.0156","volume":"12","author":"MK Pehlivano\u011flu","year":"2018","unstructured":"Pehlivano\u011flu, M.K., Sakall\u0131, M.T., Akleylek, S., Duru, N., Rijmen, V.: Generalisation of hadamard matrix to generate involutory MDS matrices for lightweight cryptography. IET Inf. Security 12(4), 348\u2013355 (2018)","journal-title":"IET Inf. Security"},{"key":"667_CR33","doi-asserted-by":"publisher","DOI":"10.1201\/b12335","volume-title":"Applied combinatorics","author":"FS Roberts","year":"2009","unstructured":"Roberts, F.S., Tesman, B.: Applied combinatorics, 2nd edn. CRC Press, Chapman and Hall\/CRC (2009)","edition":"2"},{"key":"667_CR34","doi-asserted-by":"crossref","unstructured":"Sajadieh, M., Dakhilalian, M., Mala, H., Sepehrdad, P.: Recursive diffusion layers for block ciphers and hash functions. In Canteaut, A. (ed) Fast software encryption, pp 385\u2013401, Berlin Heidelberg Springer (2012)","DOI":"10.1007\/978-3-642-34047-5_22"},{"key":"667_CR35","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1007\/s10623-021-00876-6","volume":"89","author":"M Sajadieh","year":"2021","unstructured":"Sajadieh, M., Mousavi, M.: Construction of MDS matrices from generalized feistel structures. Designs Codes and Cryptography 89, 1433\u20131452 (2021). https:\/\/doi.org\/10.1007\/s10623-021-00876-6","journal-title":"Designs Codes and Cryptography"},{"issue":"1","key":"667_CR36","doi-asserted-by":"publisher","first-page":"95","DOI":"10.46586\/tosc.v2016.i1.95-113","volume":"2016","author":"S Sarkar","year":"2016","unstructured":"Sarkar, S., Syed, H.: Lightweight diffusion layer: importance of Toeplitz matrices. IACR Trans. Symmetric Cryptology 2016(1), 95\u2013113 (2016)","journal-title":"IACR Trans. Symmetric Cryptology"},{"key":"667_CR37","volume-title":"Information security and privacy, pp 3\u201318","author":"S Sarkar","year":"2017","unstructured":"Sarkar, S., Syed, H.: Analysis of toeplitz MDS matrices. In: Pieprzyk, J., Suriadi, S. (eds.) Information security and privacy, pp 3\u201318. Springer International Publishing, Cham (2017)"},{"issue":"4","key":"667_CR38","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. The Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"The Bell Syst. Tech. J."},{"key":"667_CR39","volume-title":"Fast Software Encryption, pp 471\u2013493","author":"SM Sim","year":"2015","unstructured":"Sim, S.M., Khoo, K., Oggier, F., Peyrin, T.: Lightweight MDS involution matrices. In: Leander, G. (ed.) Fast Software Encryption, pp 471\u2013493. Heidelberg Springer, Berlin Heidelberg, Berlin (2015)"},{"key":"667_CR40","volume-title":"Progress in Cryptology - AFRICACRYPT 2018, pp 51\u201371","author":"D Toh","year":"2018","unstructured":"Toh, D., Teo, J., Khoo, K., Sim, S.M.: Lightweight MDS serial-type matrices with minimal fixed XOR count. In: Joux, A., Nitaj, A., Rachidi, T. (eds.) Progress in Cryptology - AFRICACRYPT 2018, pp 51\u201371. Springer International Publishing, Cham (2018)"},{"key":"667_CR41","first-page":"289","volume":"79","author":"G Viswanath","year":"2006","unstructured":"Viswanath, G., Rajan, B.S.: A matrix characterization of near-MDS codes. Ars. Comb. 79, 289\u2013294 (2006)","journal-title":"Ars. Comb."},{"key":"667_CR42","doi-asserted-by":"crossref","unstructured":"Wu, S., Wang, M., Wu, W.: Recursive diffusion layers for (Lightweight) block ciphers and hash functions. In Knudsen, L.R., Wu, H. (eds) Selected Areas in Cryptography, pp 355\u2013371, Berlin Heidelberg Springer (2013)","DOI":"10.1007\/978-3-642-35999-6_23"},{"key":"667_CR43","doi-asserted-by":"crossref","unstructured":"Xu, H., Tan, L., Lai, X.: On the recursive construction of MDS matrices for lightweight cryptography. In Huang, X., Zhou, J. (eds) Information security practice and experience, pp 552\u2013563, Cham Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-06320-1_40"},{"issue":"07","key":"667_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-021-00879-3","volume":"89","author":"Y Yang","year":"2021","unstructured":"Yang, Y., Zeng, X., Wang, S.: Construction of lightweight involutory MDS matrices. Designs Codes Cryptography 89(07), 1\u201331 (2021)","journal-title":"Designs Codes Cryptography"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00667-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-023-00667-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00667-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T08:19:54Z","timestamp":1709626794000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-023-00667-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,14]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["667"],"URL":"https:\/\/doi.org\/10.1007\/s12095-023-00667-x","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,14]]},"assertion":[{"value":"27 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}