{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:16:44Z","timestamp":1757618204659,"version":"3.44.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T00:00:00Z","timestamp":1748304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T00:00:00Z","timestamp":1748304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12095-025-00806-6","type":"journal-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T02:16:59Z","timestamp":1748312219000},"page":"1109-1124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A note on cyclic MDS and non-MDS matrices"],"prefix":"10.1007","volume":"17","author":[{"given":"Tapas","family":"Chatterjee","sequence":"first","affiliation":[]},{"given":"Ayantika","family":"Laha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,27]]},"reference":[{"key":"806_CR1","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1090\/S0002-9947-1963-0155841-7","volume":"107","author":"CM Ablow","year":"1963","unstructured":"Ablow, C.M., Brenner, J.L.: Roots and canonical forms for circulant matrices. Trans. Am. Math. Soc. 107, 360\u2013376 (1963)","journal-title":"Trans. Am. Math. Soc."},{"key":"806_CR2","first-page":"1619","volume":"17","author":"I Adhiguna","year":"2022","unstructured":"Adhiguna, I., Arifin, I.S.N., Yuliawan, F., Alamsyah, I.M.: Orthogonal Circulant MDS Matrices 17, 1619\u20131637 (2022)","journal-title":"Orthogonal Circulant MDS Matrices"},{"key":"806_CR3","unstructured":"Barreto, P.S.L.M., Rijmen, V.: The Whirlpool hashing function (2003)"},{"key":"806_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like cryptosystems. J. Cryptol. 4, 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"806_CR5","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10623-018-0520-3","volume":"87","author":"V Cauchois","year":"2019","unstructured":"Cauchois, V., Loidreau, P.: On circulant involutory MDS matrices. Design, Codes and Cryptography 87, 249\u2013260 (2019)","journal-title":"Design, Codes and Cryptography"},{"key":"806_CR6","doi-asserted-by":"crossref","unstructured":"Chatterjee, T., Laha, A.: A note on Semi-Orthogonal (G-matrix) and Semi-Involutory MDS Matrices. Finite Fields and Their Applications, 92, Paper No. 102279, 27 (2023)","DOI":"10.1016\/j.ffa.2023.102279"},{"issue":"12","key":"806_CR7","doi-asserted-by":"publisher","first-page":"8268","DOI":"10.1109\/TIT.2022.3187407","volume":"68","author":"T Chatterjee","year":"2022","unstructured":"Chatterjee, T., Laha, A., Sanadhya, S.K.: On the Structure of Format Preserving Sets in the Diffusion Layer of Block Ciphers. IEEE Trans. Inf. Theory 68(12), 8268\u20138279 (2022)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"806_CR8","unstructured":"Chatterjee, T., Laha, A.: A Note on MDS Property of Circulant Matrices, to appear in Journal of Discrete Mathematical Sciences & Cryptography"},{"key":"806_CR9","unstructured":"Chatterjee, T., Laha, A.: A Characterization of Semi-Involutory MDS Matrices (2024). arxiv.org\/pdf\/2406.12842"},{"key":"806_CR10","unstructured":"Chatterjee, T., Laha, A.: On MDS Properties of $$g$$-Circulant Matrices. (2024). arxiv.org\/pdf\/2406.15872"},{"key":"806_CR11","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume":"1267","author":"J Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L.R., Rijmen, V.: The block cipher SQUARE. Fast Software Encryption Workshop, LNCS 1267, 149\u2013165 (1997)","journal-title":"Fast Software Encryption Workshop, LNCS"},{"key":"806_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer-Verlag, Berlin (2002)"},{"key":"806_CR13","volume-title":"Circulant Matrices","author":"PJ Davis","year":"1979","unstructured":"Davis, P.J.: Circulant Matrices. John Wiley and Sons, Hoboken (1979)"},{"key":"806_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/S0024-3795(97)10073-8","volume":"277","author":"XD Dong","year":"1998","unstructured":"Dong, X.D., Cheong, B.S., Gunawan, E.: Matrix characterization of MDS linear codes over modules. Linear Algebra and its Application 277, 57\u201361 (1998)","journal-title":"Linear Algebra and its Application"},{"key":"806_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1017\/S0305004100034836","volume":"57","author":"B Friedman","year":"1961","unstructured":"Friedman, B.: Eigenvalues of Composite Matrix. Math. Proc. Cambridge Philos. Soc. 57, 37\u201349 (1961)","journal-title":"Math. Proc. Cambridge Philos. Soc."},{"key":"806_CR16","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume":"6841","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions, CRYPTO 2011. Lect. Notes Comput. Sci. 6841, 222\u2013239 (2011)","journal-title":"Lect. Notes Comput. Sci."},{"key":"806_CR17","first-page":"326","volume":"6917","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.J.B.: The LED Block Cipher, CHES 2011. LNCS 6917, 326\u2013341 (2011)","journal-title":"LNCS"},{"issue":"7918","key":"806_CR18","first-page":"43","volume":"2013","author":"KC Gupta","year":"2013","unstructured":"Gupta, K.C., Ray, I.G.: On Constructions of Involutory MDS Matrices. Progress in Cryptology - AFRICACRYPT 2013(7918), 43\u201360 (2013)","journal-title":"Progress in Cryptology - AFRICACRYPT"},{"key":"806_CR19","first-page":"564","volume-title":"On constructions of circulant MDS matrices for lightweight cryptography","author":"KC Gupta","year":"2014","unstructured":"Gupta, K.C., Ray, I.G.: On constructions of circulant MDS matrices for lightweight cryptography, pp. 564\u2013576. ISPEC, Springer (2014)"},{"key":"806_CR20","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s12095-014-0116-3","volume":"7","author":"KC Gupta","year":"2015","unstructured":"Gupta, K.C., Ray, I.G.: Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications. Cryptogr. Commun. 7, 257\u2013287 (2015)","journal-title":"Cryptogr. Commun."},{"key":"806_CR21","doi-asserted-by":"publisher","first-page":"779","DOI":"10.3934\/amc.2019045","volume":"13","author":"KC Gupta","year":"2019","unstructured":"Gupta, K.C., Pandey, S.K., Ghosh Ray, I., Samanta, S.: Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results. Adv. Math. Commun. 13, 779\u2013843 (2019)","journal-title":"Adv. Math. Commun."},{"key":"806_CR22","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/LCOMM.2004.833807","volume":"8","author":"J Lacan","year":"2004","unstructured":"Lacan, J., Fimes, J.: Systematic MDS erasure codes based on Vandermonde matrices. IEEE Communication Letters 8, 570\u2013572 (2004)","journal-title":"IEEE Communication Letters"},{"key":"806_CR23","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-662-52993-5_6","volume":"9783","author":"M Liu","year":"2016","unstructured":"Liu, M., Sim, S.M.: Lightweight MDS generalized circulant matrices. Fast Software Encryption, LNCS 9783, 101\u2013120 (2016)","journal-title":"Fast Software Encryption, LNCS"},{"key":"806_CR24","volume-title":"The Theory of Error Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error Correcting Codes. North-Holland Publishing Co., Amsterdam-New York-Oxford (1977)"},{"issue":"765","key":"806_CR25","first-page":"386","volume":"1993","author":"M Matsui","year":"1993","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 1993(765), 386\u2013397 (1993)","journal-title":"EUROCRYPT"},{"key":"806_CR26","doi-asserted-by":"publisher","first-page":"3871","DOI":"10.1007\/s12190-023-01907-2","volume":"69","author":"N Mohsenifar","year":"2023","unstructured":"Mohsenifar, N., Sajadieh, M.: Introducing a new connection between the entries of MDS matrices constructed by generalized Cauchy matrices in GF$$(2^q)$$. J. Appl. Math. Comput. 69, 3871\u20133891 (2023)","journal-title":"J. Appl. Math. Comput."},{"key":"806_CR27","doi-asserted-by":"publisher","first-page":"716","DOI":"10.3934\/amc.2024020","volume":"19","author":"M Mousavi","year":"2024","unstructured":"Mousavi, M., Esmaeili, M., Gulliver, T.A.: Circulant, circulant-like and orthogonal MDS generalized Cauchy matrices. Adv. Math. Commun. 19, 716\u2013735 (2024)","journal-title":"Adv. Math. Commun."},{"key":"806_CR28","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1049\/iet-ifs.2017.0156","volume":"12","author":"MK Pehlivano\u011flu","year":"2018","unstructured":"Pehlivano\u011flu, M.K., Sakalli, M.T., Akleylek, S., Duru, N., Rijmen, V.: Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography. IET Inf. Secur. 12, 348\u2013355 (2018)","journal-title":"IET Inf. Secur."},{"issue":"10655","key":"806_CR29","first-page":"307","volume":"2017","author":"TF Prabowo","year":"2017","unstructured":"Prabowo, T.F., Tan, C.H.: Orthogonal MDS Diffusion Matrices over Galois Rings. IMACC 2017(10655), 307\u2013330 (2017)","journal-title":"IMACC"},{"key":"806_CR30","first-page":"2416","volume":"2018","author":"TF Prabowo","year":"2018","unstructured":"Prabowo, T.F., Tan, C.H.: Almost Orthogonal MDS Matrices over GR($$2^n, k$$). IEEE International Symposium on Information Theory (ISIT) 2018, 2416\u20132420 (2018)","journal-title":"IEEE International Symposium on Information Theory (ISIT)"},{"key":"806_CR31","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10623-011-9578-x","volume":"64","author":"M Sajadieh","year":"2012","unstructured":"Sajadieh, M., Dakhilalian, M., Mala, H., Omoomi, B.: On construction of involutory MDS matrices from Vandermonde Matrices in $$GF(2^q)$$. Design, Codes and Cryptography 64, 287\u2013308 (2012)","journal-title":"Design, Codes and Cryptography"},{"key":"806_CR32","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"806_CR33","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-662-48116-5_23","volume":"9054","author":"SM Sim","year":"2015","unstructured":"Sim, S.M., Khoo, K., Oggier, F., Peyrin, T.: Lightweight MDS Involution Matrices. Fast Software Encryption, LNCS 9054, 471\u2013493 (2015)","journal-title":"Fast Software Encryption, LNCS"},{"key":"806_CR34","first-page":"99","volume":"1039","author":"V Rijmen","year":"1996","unstructured":"Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., Win, E.D.: The cipher SHARK, In 3rd Fast Software Encryption Workshop. LNCS 1039, 99\u2013111 (1996)","journal-title":"LNCS"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-025-00806-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-025-00806-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-025-00806-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T15:46:20Z","timestamp":1757173580000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-025-00806-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,27]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["806"],"URL":"https:\/\/doi.org\/10.1007\/s12095-025-00806-6","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2025,5,27]]},"assertion":[{"value":"24 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}