{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:31:27Z","timestamp":1773235887690,"version":"3.50.1"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/tit.2014.2314099","type":"journal-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T18:04:05Z","timestamp":1395943445000},"page":"3871-3888","source":"Crossref","is-referenced-by-count":14,"title":["Torsion Limits and Riemann-Roch Systems for Function Fields and Applications"],"prefix":"10.1109","volume":"60","author":[{"given":"Ignacio","family":"Cascudo","sequence":"first","affiliation":[]},{"given":"Ronald","family":"Cramer","sequence":"additional","affiliation":[]},{"given":"Chaoping","family":"Xing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"572","article-title":"Founding cryptography on oblivious transfer-efficiently","author":"ishai","year":"0","journal-title":"Proc 28th Annu IACR CRYPTO LNCS 5157"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2009.56"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31662-3_1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.2001.0513"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78524-8_22"},{"key":"ref30","first-page":"170","article-title":"Codes on algebraic curves","volume":"24","author":"goppa","year":"1981","journal-title":"Soviet Math Dokl"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250794"},{"key":"ref36","first-page":"667","article-title":"Constant-rate OT from noisy channels","author":"ishai","year":"0","journal-title":"Proc 31st Annu IACR CRYPTO LNCS 6842"},{"key":"ref35","first-page":"721","article-title":"Some remarks on the number of rational points of algebraic curves over finite fields","volume":"28","author":"ihara","year":"1981","journal-title":"J Fac Sci Tokyo"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1515\/9781400847419"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/BF01083182","article-title":"Number of points of an algebraic curve","volume":"17","author":"vl?du?","year":"1983","journal-title":"Funct Anal Appl"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/18.904533"},{"key":"ref61","author":"weil","year":"1948","journal-title":"Vari&#x00E9;t&#x00E9;s Ab&#x00E9;liennes et Courbes Alg&#x00E9;briques Paris"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.804111"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF01884295"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838351"},{"key":"ref27","author":"garcia","year":"2007","journal-title":"Topics in Geometry Coding Theory and Cryptography (Algebra and Applications Series)"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/18.979330"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgebra.2006.12.029"},{"key":"ref29","author":"van der geer","year":"2013","journal-title":"ManYPoints&#x2014;Table of Curves with Many Points [Online] Available"},{"key":"ref67","article-title":"Algebraic curves over finite fields with good asymptotic behavior","author":"xing","year":"2010","journal-title":"unpublished"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.847735"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028834"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnt.2007.06.010"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2005.11.045"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_26"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/el:20001324"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.84.7.1739"},{"key":"ref24","first-page":"445","article-title":"Perfectly secure multiparty computation and the computational overhead of cryptography","volume":"lncs 6110","author":"damgaard","year":"0","journal-title":"Proc 29th Annu IACR EUROCRYPT"},{"key":"ref23","first-page":"316","article-title":"General secure multi-party computation from any linear secret sharing scheme","author":"cramer","year":"0","journal-title":"Proc 19th Annu IACR EUROCRYPT LNCS 1807"},{"key":"ref26","first-page":"699","article-title":"Communication complexity of secure computation","author":"franklin","year":"0","journal-title":"Proc ACM STOC"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0006-7"},{"key":"ref50","author":"rosen","year":"2001","journal-title":"Number Theory in Function Fields"},{"key":"ref51","author":"serre","year":"1985","journal-title":"Rational points on curves over finite fields"},{"key":"ref59","first-page":"22","article-title":"An exhaustion bound for algebraic-geometric modular codes","volume":"23","author":"vl?du?","year":"1987","journal-title":"Probl Inf Transmiss"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/mana.19821090103"},{"key":"ref57","doi-asserted-by":"crossref","DOI":"10.1090\/surv\/139","volume":"139","author":"tsfasman","year":"2007","journal-title":"Algebraic Geometric Codes Basic Notions"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480196304246"},{"key":"ref55","author":"stichtenoth","year":"1993","journal-title":"Algebraic Function Fields and Codes"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/18.945244"},{"key":"ref53","first-page":"145","volume":"1518","author":"shparlinski","year":"1992","journal-title":"Curves with Many Points and Multiplication in Finite Fields"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1515\/crll.2005.2005.589.159"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480101384633"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.890722"},{"key":"ref12","article-title":"Berechnung von Zetafunktionen algebraischer Kurven&#x00FC;ber endlichen K&#x00F6;rpern","author":"boettle","year":"2008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/18.705568"},{"key":"ref14","first-page":"466","article-title":"Asymptotically good ideal linear secret sharing with strong multiplication over any finite field","author":"cascudo","year":"0","journal-title":"Proc 29th Ann IACR CRYPTO LNCS 5677"},{"key":"ref15","first-page":"685","article-title":"The torsion-limit for algebraic function fields and its application to arithmetic secret sharing","author":"cascudo","year":"0","journal-title":"Proc 31st Annu IACR CRYPTO LNCS 6842"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2180696"},{"key":"ref17","first-page":"11","article-title":"Multi-party unconditionally secure protocols","author":"chaum","year":"0","journal-title":"Proc STOC"},{"key":"ref18","first-page":"516","article-title":"Algebraic geometric secret sharing schemes and secure multi-party computation over small fields","author":"chen","year":"0","journal-title":"Proc 26th Annu IACR CRYPTO LNCS 4117"},{"key":"ref19","first-page":"329","article-title":"Secure computation from random error correcting codes","author":"chen","year":"0","journal-title":"Proc 26th Annu IACR EUROCRYPT LNCS 4515"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jco.2011.01.008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/9789812793430_0017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00574-010-0026-8"},{"key":"ref5","first-page":"179","article-title":"On the bilinear complexity of the multiplication in finite fields","volume":"11","author":"ballet","year":"2005","journal-title":"Arithmetic Geometry and Coding Theory 4"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"401","DOI":"10.17323\/1609-4514-2008-8-3-401-418","article-title":"A new tower over cubic finite fields","volume":"8","author":"bassa","year":"2008","journal-title":"Moscow Math J"},{"key":"ref7","article-title":"Towers of function fields over non-prime finite fields","author":"bassa","year":"2012","journal-title":"Preprint See"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2237944"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref46","first-page":"1","article-title":"Hecke operators with odd determinant and binary frame-proof codes beyond the probabilistic bound","author":"randriambololona","year":"0","journal-title":"Proc IEEE ITW"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107325951"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11856-012-0126-9"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jco.2012.02.005"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1137\/060674478"},{"key":"ref41","author":"mumford","year":"1970","journal-title":"Abelian Varieties"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1006\/ffta.1996.0016"},{"key":"ref43","author":"niederreiter","year":"2014","journal-title":"Applications to Cryptography"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/6832684\/06779612.pdf?arnumber=6779612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:57:10Z","timestamp":1642006630000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6779612\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":69,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tit.2014.2314099","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7]]}}}