{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T15:57:54Z","timestamp":1772467074163,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/allerton.2015.7447110","type":"proceedings-article","created":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T20:58:11Z","timestamp":1461185891000},"page":"949-955","source":"Crossref","is-referenced-by-count":4,"title":["Constructions of MDS codes via random Vandermonde and Cauchy matrices over small fields"],"prefix":"10.1109","author":[{"given":"Son Hoang","family":"Dau","sequence":"first","affiliation":[]},{"given":"Wentu","family":"Song","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Sprintson","sequence":"additional","affiliation":[]},{"given":"Chau","family":"Yuen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875056"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875177"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248352"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1984.tb00072.x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2094592"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173631"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/ecja.4410690906"},{"key":"ref18","article-title":"Weakly secure network coding","author":"bhattad","year":"2005","journal-title":"Proc 3rd Workshop on Network Coding Theory & Applications (NetCod)"},{"key":"ref19","first-page":"210","article-title":"SEC: A practical secure erasure coding scheme for peer-to-peer storage system","author":"tian","year":"2006","journal-title":"Proc Symp Storage Syst Technol"},{"key":"ref4","first-page":"109","article-title":"A new involutory MDS matrix for AES","volume":"9","year":"2009","journal-title":"Int J Network Security"},{"key":"ref3","first-page":"40","article-title":"On the design of linear transformations for substitution permutation encryption networks","author":"youssef","year":"1997","journal-title":"Workshop on Selected Areas in Cryptology (SAC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620554"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6874913"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2384295"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875141"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref1","author":"macwilliams","year":"1977","journal-title":"The Theory of Error-Correcting Codes"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NetCod.2013.6570836"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2217331"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref21","first-page":"165","article-title":"Ranks of completions of partial matrices","volume":"40 41","author":"cohen","year":"1989","journal-title":"The Gohberg Anniversary Collection"},{"key":"ref23","article-title":"Secure erasure codes with partial decodability (full version)","author":"dau","year":"2015"}],"event":{"name":"2015 53rd Annual Allerton Conference on Communication, Control and Computing (Allerton)","location":"Monticello, IL","start":{"date-parts":[[2015,9,29]]},"end":{"date-parts":[[2015,10,2]]}},"container-title":["2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7444067\/7446973\/07447110.pdf?arnumber=7447110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T16:58:38Z","timestamp":1489769918000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7447110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/allerton.2015.7447110","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}