{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:17:45Z","timestamp":1729667865855,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.1109\/redundancy52534.2021.9606472","type":"proceedings-article","created":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T20:32:50Z","timestamp":1636662770000},"page":"55-60","source":"Crossref","is-referenced-by-count":0,"title":["On Squares of Dihedral Codes"],"prefix":"10.1109","author":[{"given":"Kirill","family":"Vedenev","sequence":"first","affiliation":[]},{"given":"Yury","family":"Kosolapov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Some properties of dihedral group codes","year":"2020","author":"vedenev","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1134\/S0001434620010204"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411619070198"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10469-012-9183-8"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_27"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2015.05.002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-7643-7394-6_2"},{"journal-title":"Post-Quantum Cryptography","year":"2021","key":"ref12"},{"key":"ref13","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","author":"mceliece","year":"1978","journal-title":"DSN progress report"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/637\/12749"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2393251"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_5"},{"key":"ref17","first-page":"273","article-title":"Effective attack on the McEliece cryptosystem based on Reed-Muller codes","volume":"24","author":"chizhov","year":"2014","journal-title":"Discrete Math Appl"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9967-z"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18681-8_14"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-0405-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1134\/S0032946015040092"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2867873"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11122-005-0022-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1134\/S0032946019030074"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/273\/04419"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1134\/S0032946019030049"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58265-7_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/358746.358762"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1134\/S0032946009030107"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008259214236"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88961-8_5"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"115","DOI":"10.4213\/dm1583","article-title":"Hadamard products classification of subcodes of Reed&#x2013;Muller codes codimension 1","volume":"32","author":"chizhov","year":"2020","journal-title":"Diskretnaya Matematika"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_20"},{"key":"ref21","first-page":"57","article-title":"On an encoding system con-)+structed on the basis of generalized Reed&#x2013;Solomon codes","volume":"4","author":"sidel\u2019nikov","year":"1992","journal-title":"Diskretnaya Matematika"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1515\/dma.1994.4.3.191"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54074-6_2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1137\/130931886"},{"key":"ref25","first-page":"189","article-title":"A new code-based cryptosystem via pseudorepetition of codes","author":"kabatiansky","year":"2018","journal-title":"Proceedings of ACCT XVI"}],"event":{"name":"2021 XVII International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY)","start":{"date-parts":[[2021,10,25]]},"location":"Moscow, Russian Federation","end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 XVII International Symposium \"Problems of Redundancy in Information and Control Systems\" (REDUNDANCY)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9606438\/9606439\/09606472.pdf?arnumber=9606472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T23:44:11Z","timestamp":1726098251000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9606472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/redundancy52534.2021.9606472","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}