{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:03Z","timestamp":1772119983166,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12171241, 12226408"],"award-info":[{"award-number":["12171241, 12226408"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["BK20230867"],"award-info":[{"award-number":["BK20230867"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s12095-024-00735-w","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T07:02:27Z","timestamp":1723532547000},"page":"1527-1537","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A new construction of cyclic subspace codes"],"prefix":"10.1007","volume":"16","author":[{"given":"Yuqing","family":"Han","sequence":"first","affiliation":[]},{"given":"Xiwang","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"issue":"2","key":"735_CR1","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TIT.2010.2095232","volume":"57","author":"T Etzion","year":"2011","unstructured":"Etzion, T., Vardy, A.: Error-correcting codes in projective space. IEEE Trans. Inf. Theory. 57(2), 1165\u20131173 (2011)","journal-title":"IEEE Trans. Inf. Theory."},{"issue":"8","key":"735_CR2","doi-asserted-by":"publisher","first-page":"3579","DOI":"10.1109\/TIT.2008.926449","volume":"54","author":"R Koetter","year":"2008","unstructured":"Koetter, R., Kschischang, F.R.: Coding for errors and erasures in random network coding. IEEE Trans. Inf. Theory. 54(8), 3579\u20133591 (2008)","journal-title":"IEEE Trans. Inf. Theory."},{"key":"735_CR3","doi-asserted-by":"crossref","unstructured":"Braun, M., Etzion, T., \u00d6sterg\u00e5rd, P.RJ., Vardy, A., Wassermann, A.: Existence of-analogs of Steiner systems. Forum. Math. Pi (4) p.7 Cambridge University Press, (2016)","DOI":"10.1017\/fmp.2016.5"},{"issue":"11","key":"735_CR4","doi-asserted-by":"publisher","first-page":"7386","DOI":"10.1109\/TIT.2013.2274266","volume":"59","author":"A-L Trautmann","year":"2013","unstructured":"Trautmann, A.-L., Manganiello, F., Braun, M., Rosenthal, J.: Cyclic orbit codes. IEEE Trans. Inf. Theory. 59(11), 7386\u20137404 (2013)","journal-title":"IEEE Trans. Inf. Theory."},{"issue":"3","key":"735_CR5","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1109\/TIT.2016.2520479","volume":"62","author":"E Ben-Sasson","year":"2016","unstructured":"Ben-Sasson, E., Etzion, T., Gabizon, A., Raviv, N.: Subspace polynomials and cyclic subspace codes. IEEE Trans. Inf. Theory. 62(3), 1157\u20131165 (2016)","journal-title":"IEEE Trans. Inf. Theory."},{"issue":"2","key":"735_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s10623-016-0297-1","volume":"85","author":"K Otal","year":"2017","unstructured":"Otal, K., \u00d6zbudak, F.: Cyclic subspace codes via subspace polynomials. Designs. Codes. Crypto. 85(2), 191\u2013204 (2017)","journal-title":"Designs. Codes. Crypto."},{"issue":"6","key":"735_CR7","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1007\/s10623-017-0394-9","volume":"86","author":"B Chen","year":"2017","unstructured":"Chen, B., Liu, H.: Constructions of cyclic constant dimension codes. Designs. Codes. Crypto. 86(6), 1267\u20131279 (2017)","journal-title":"Designs. Codes. Crypto."},{"key":"735_CR8","doi-asserted-by":"crossref","unstructured":"Santonastaso, P., Zullo, F.: Linearized trinomials with maximum kernel. J. Pure. Appl. Algeb. 226(3),(2022)","DOI":"10.1016\/j.jpaa.2021.106842"},{"key":"735_CR9","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s12095-020-00463-x","volume":"13","author":"H Zhang","year":"2021","unstructured":"Zhang, H., Cao, X.: Further constructions of cyclic subspace codes. Crypto. Commu. 13, 245\u2013262 (2021)","journal-title":"Crypto. Commu."},{"issue":"6","key":"735_CR10","doi-asserted-by":"publisher","first-page":"4412","DOI":"10.1109\/TIT.2017.2766178","volume":"64","author":"RM Roth","year":"2017","unstructured":"Roth, R.M., Raviv, N., Tamo, I.: Construction of sidon spaces with applications to coding. IEEE Trans. Inf. Theory. 64(6), 4412\u20134422 (2017)","journal-title":"IEEE Trans. Inf. Theory."},{"key":"735_CR11","doi-asserted-by":"crossref","unstructured":"Bachoc, C., Serra, O., Z\u00e9mor, G.: An analogue of vosper\u2019s theorem for extension fields. In: Mathematical Proceedings of the Cambridge Philosophical Society, vol. 163, pp. 423\u2013452 (2017). Cambridge University Press","DOI":"10.1017\/S0305004117000044"},{"issue":"5","key":"735_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2019.111788","volume":"343","author":"Y Niu","year":"2020","unstructured":"Niu, Y., Yue, Q., Wu, Y.: Several kinds of large cyclic subspace codes via sidon spaces. Discrete Math. 343(5), 111788 (2020)","journal-title":"Discrete Math."},{"issue":"4","key":"735_CR13","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1007\/s10623-022-01146-9","volume":"91","author":"Y Li","year":"2023","unstructured":"Li, Y., Liu, H.: Cyclic constant dimension subspace codes via the sum of sidon spaces. Designs. Codes. Crypto. 91(4), 1193\u20131207 (2023)","journal-title":"Designs. Codes. Crypto."},{"key":"735_CR14","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.laa.2022.12.011","volume":"661","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Tang, C.: Further constructions of large cyclic subspace codes via sidon spaces. Linear. Algeb. Appl. 661, 106\u2013115 (2023)","journal-title":"Linear. Algeb. Appl."},{"key":"735_CR15","doi-asserted-by":"crossref","unstructured":"Li, Y., Liu, H., Mesnager, S.: New constructions of constant dimension subspace codes with large sizes. Designs. Codes. Crypto. 1\u201315 (2024)","DOI":"10.1007\/s10623-023-01350-1"},{"key":"735_CR16","doi-asserted-by":"crossref","unstructured":"Yu, S., Ji, L.: Two new constructions of cyclic subspace codes via Sidon spaces. Designs, Codes. Crypto. 1\u201313 (2024)","DOI":"10.1007\/s10623-024-01466-y"},{"key":"735_CR17","doi-asserted-by":"crossref","unstructured":"Zullo, F.: Multi-orbit cyclic subspace codes and linear sets. Finite Fields and Their Appl. 87,(2023)","DOI":"10.1016\/j.ffa.2022.102153"},{"issue":"4","key":"735_CR18","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1007\/s10801-023-01275-x","volume":"58","author":"C Castello","year":"2023","unstructured":"Castello, C., Polverino, O., Santonastaso, P., Zullo, F.: Constructions and equivalence of sidon spaces. J. Algeb. Combi. 58(4), 1299\u20131329 (2023)","journal-title":"J. Algeb. Combi."},{"key":"735_CR19","doi-asserted-by":"crossref","unstructured":"Sheekey, J.: A new family of linear maximum rank distance codes. arXiv:1504.01581. (2015)","DOI":"10.3934\/amc.2016019"},{"key":"735_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, H., Tang, C., Cao, X.: Large optimal cyclic subspace codes. Discrete Math. 347(7),(2024)","DOI":"10.1016\/j.disc.2024.114007"},{"issue":"4","key":"735_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2020.112273","volume":"344","author":"T Feng","year":"2021","unstructured":"Feng, T., Wang, Y.: New constructions of large cyclic subspace codes and sidon spaces. Discrete Math. 344(4), 112273 (2021)","journal-title":"Discrete Math."},{"issue":"2","key":"735_CR22","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s11464-022-1011-4","volume":"17","author":"H Zhang","year":"2022","unstructured":"Zhang, H., Cao, X.: Constructions of sidon spaces and cyclic subspace codes. Frontiers. Math. China. 17(2), 275\u2013288 (2022)","journal-title":"Frontiers. Math. China."},{"issue":"1","key":"735_CR23","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10623-022-01095-3","volume":"91","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Tang, C.: Constructions of large cyclic constant dimension codes viasidon spaces. Designs. Codes. Crypto. 91(1), 29\u201344 (2023)","journal-title":"Designs. Codes. Crypto."},{"issue":"5","key":"735_CR24","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/s40314-023-02353-3","volume":"42","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Tang, C., Hu, X.: New constructions of sidon spaces and large cyclic constant dimension codes. Compu. Appl. Math. 42(5), 230 (2023)","journal-title":"Compu. Appl. Math."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00735-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-024-00735-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00735-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T11:28:09Z","timestamp":1737458889000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-024-00735-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,13]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["735"],"URL":"https:\/\/doi.org\/10.1007\/s12095-024-00735-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3908812\/v1","asserted-by":"object"}]},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,13]]},"assertion":[{"value":"29 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interest"}}]}}