{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T18:40:43Z","timestamp":1775760043307,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Fundamental Research Funds for Wuhan Polytechnic University","award":["2023Y40"],"award-info":[{"award-number":["2023Y40"]}]},{"name":"Research Funding of Wuhan Polytechnic University","award":["2025RZ067"],"award-info":[{"award-number":["2025RZ067"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12095-025-00821-7","type":"journal-article","created":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T03:46:54Z","timestamp":1751341614000},"page":"1503-1519","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["New constructions on self-dual algebraic geometry codes"],"prefix":"10.1007","volume":"17","author":[{"given":"Xiaolei","family":"Fang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiangrong","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,7,1]]},"reference":[{"issue":"1","key":"821_CR1","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s10623-018-0497-y","volume":"87","author":"A Bassa","year":"2019","unstructured":"Bassa, A., Stichtenoth, H.: Self-dual codes better than the Gilbert CVarshamov bound. Des. Codes Cryptogr. 87(1), 173\u2013182 (2019)","journal-title":"Des. Codes Cryptogr."},{"issue":"6","key":"821_CR2","doi-asserted-by":"publisher","first-page":"3856","DOI":"10.1109\/TIT.2012.2183114","volume":"58","author":"S Bouyuklieva","year":"2012","unstructured":"Bouyuklieva, S., Willems, W.: Singly even self-dual codes with minimal shadow. IEEE Trans. Inf. Theory 58(6), 3856\u20133860 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"821_CR3","unstructured":"Bras-Amor\u00f3s, M., Castellanos, A.S., Quoos, L.: Self-orthogonal flags of codes and translation of flags of algebraic geometry codes (2024). arXiv:2406.08952v1 [cs.IT]"},{"issue":"10","key":"821_CR4","doi-asserted-by":"publisher","first-page":"2743","DOI":"10.1007\/s10623-024-01412-y","volume":"92","author":"M Chara","year":"2024","unstructured":"Chara, M., Podest\u00e1, R., Quoos, L., Toledano, R.: Lifting iso-dual algebraic geometry codes. Des. Codes Cryptogr. 92(10), 2743\u20132767 (2024)","journal-title":"Des. Codes Cryptogr."},{"key":"821_CR5","doi-asserted-by":"crossref","unstructured":"Chen, H., Cramer, R.: Algebraic geometric secret sharing schemes and secure multiparty computations over small fields. Advances in Cryptology - CRYPTO 2006 4117 of Lecture Notes in Computer Science, 521\u2013536 (2006)","DOI":"10.1007\/11818175_31"},{"issue":"6","key":"821_CR6","doi-asserted-by":"publisher","first-page":"2647","DOI":"10.1109\/TIT.2008.921692","volume":"54","author":"R Cramer","year":"2008","unstructured":"Cramer, R., Daza, V., Gracia, I., Urroz, J.J., Leander, G., Marti-Farre, J., Padro, C.: On codes, matroids and secure multi-party computation from linear secret sharing schemes. IEEE Trans. Inf. Theory 54(6), 2647\u20132657 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"821_CR7","doi-asserted-by":"crossref","unstructured":"Dougherty, S.T., Mesnager, S., Sol\u00e9, P.: Secret-sharing schemes based on self-dual codes. Proc. Inf. Theory Workshop, 338\u2013342 (2008)","DOI":"10.1109\/ITW.2008.4578681"},{"issue":"9","key":"821_CR8","doi-asserted-by":"publisher","first-page":"5574","DOI":"10.1109\/TIT.2019.2916367","volume":"65","author":"W Fang","year":"2019","unstructured":"Fang, W., Fu, F.-W.: New constructions of MDS Euclidean self-dual codes from GRS codes and extended GRS codes. IEEE Trans. Inf. Theory 65(9), 5574\u20135579 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"821_CR9","doi-asserted-by":"publisher","first-page":"5005","DOI":"10.1109\/TIT.2021.3085768","volume":"67","author":"W Fang","year":"2021","unstructured":"Fang, W., Xia, S.-T., Fu, F.-W.: Construction of MDS Euclidean self-dual codes via two subsets. IEEE Trans. Inf. Theory 67(8), 5005\u20135015 (2021)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"821_CR10","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/s12095-021-00549-0","volume":"14","author":"W Fang","year":"2022","unstructured":"Fang, W., Zhang, J., Xia, S.-T., Fu, F.-W.: New constructions of self-dual generalized Reed-Solomon codes. Cryptogr. Commun. 14(3), 677\u2013690 (2022)","journal-title":"Cryptogr. Commun."},{"issue":"6","key":"821_CR11","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1007\/s10623-020-00734-x","volume":"88","author":"X Fang","year":"2020","unstructured":"Fang, X., Lebed, K., Liu, H., Luo, J.: New MDS Euclidean self-dual codes over finite fields of odd characteristic. Des. Codes Cryptogr. 88(6), 1127\u20131138 (2020)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"821_CR12","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TIT.2020.3020986","volume":"67","author":"X Fang","year":"2021","unstructured":"Fang, X., Liu, M., Luo, J.: New MDS Euclidean self-orthogonal codes. IEEE Trans. Inf. Theory 67(1), 130\u2013137 (2021)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"821_CR13","first-page":"75","volume":"21","author":"VD Goppa","year":"1983","unstructured":"Goppa, V.D.: Algebraico-geometric codes. Math. USSR-lvz. 21(1), 75\u201391 (1983)","journal-title":"Algebraico-geometric codes. Math. USSR-lvz."},{"issue":"3","key":"821_CR14","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1023\/A:1027351723034","volume":"8","author":"H Janwa","year":"1996","unstructured":"Janwa, H., Moreno, O.: McEliece public key cryptosystems using algebraic-geometric codes. Des. Codes Cryptogr. 8(3), 293\u2013307 (1996)","journal-title":"Des. Codes Cryptogr."},{"issue":"4","key":"821_CR15","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1109\/TIT.2018.2880913","volume":"65","author":"L Jin","year":"2019","unstructured":"Jin, L., Kan, H.: Self-dual near MDS codes from elliptic curves. IEEE Trans. Inf. Theory 65(4), 2166\u20132170 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"821_CR16","doi-asserted-by":"publisher","first-page":"1434","DOI":"10.1109\/TIT.2016.2645759","volume":"63","author":"L Jin","year":"2017","unstructured":"Jin, L., Xing, C.: New MDS self-dual codes from generalized Reed-Solomon codes. IEEE Trans. Inf. Theory 63(3), 1434\u20131438 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"821_CR17","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.ffa.2019.05.007","volume":"59","author":"K Lebed","year":"2019","unstructured":"Lebed, K., Liu, H., Luo, J.: Construction of MDS Euclidean self-dual codes over finite field. Finite Fields and Their Appl. 59, 199\u2013207 (2019)","journal-title":"Finite Fields and Their Appl."},{"key":"821_CR18","volume-title":"The theory of error-correcting codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The theory of error-correcting codes. North Holland, Amsterdam, The Netherlands (1977)"},{"key":"821_CR19","unstructured":"Massey J.: Some applications of coding theory in cryptography. In: Proceedings of the 4th IMA Conference on Cryptography and Coding, pp. 33-47 (1995)"},{"issue":"6","key":"821_CR20","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.1109\/18.782103","volume":"45","author":"EM Rain","year":"1999","unstructured":"Rain, E.M.: Nonbinary quantum codes. IEEE Trans. Inf. Theory 45(6), 1827\u20131832 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"821_CR21","doi-asserted-by":"publisher","first-page":"3603","DOI":"10.1109\/TIT.2019.2954877","volume":"66","author":"L Sok","year":"2020","unstructured":"Sok, L.: Explicit constructions of MDS self-dual codes. IEEE Trans. Inf. Theory 66(6), 3603\u20133615 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"821_CR22","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1007\/s10623-021-00847-x","volume":"89","author":"L Sok","year":"2021","unstructured":"Sok, L.: New families of self-dual codes. Des. Codes Cryptogr. 89(5), 823\u2013841 (2021)","journal-title":"Des. Codes Cryptogr."},{"key":"821_CR23","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/0022-4049(88)90046-1","volume":"55","author":"H Stichtenoth","year":"1988","unstructured":"Stichtenoth, H.: Self-dual Goopa codes. J. Pure Appl. Algebra 55, 199\u2013211 (1988)","journal-title":"J. Pure Appl. Algebra"},{"key":"821_CR24","doi-asserted-by":"crossref","unstructured":"Stichtenoth H.: Algebraic function fields and codes. Springer (2008)","DOI":"10.1007\/978-3-540-76878-4"},{"key":"821_CR25","doi-asserted-by":"publisher","first-page":"10813","DOI":"10.1016\/j.ffa.2021.101813","volume":"72","author":"D Xie","year":"2021","unstructured":"Xie, D., Fang, X., Luo, J.: Construction of long MDS self-dual codes from short codes. Finite Fields and Their Appl. 72, 10813 (2021)","journal-title":"Finite Fields and Their Appl."},{"issue":"2","key":"821_CR26","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s12095-018-0288-3","volume":"11","author":"H Yan","year":"2019","unstructured":"Yan, H.: A note on the construction of MDS self-dual codes. Cryptogr. Commun. 11(2), 259\u2013268 (2019)","journal-title":"Cryptogr. Commun."},{"issue":"6","key":"821_CR27","doi-asserted-by":"publisher","first-page":"3650","DOI":"10.1109\/TIT.2020.2963975","volume":"66","author":"A Zhang","year":"2020","unstructured":"Zhang, A., Feng, K.: An unified approach on constructing of MDS self-dual codes via Reed-Solomon codes. IEEE Trans. Inf. Theory 66(6), 3650\u20133656 (2020)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-025-00821-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-025-00821-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-025-00821-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:02:35Z","timestamp":1760738555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-025-00821-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,1]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["821"],"URL":"https:\/\/doi.org\/10.1007\/s12095-025-00821-7","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,1]]},"assertion":[{"value":"7 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Our research does not involve any ethical issues and does not require ethical approval.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}