{"id":"https://openalex.org/W1574541063","doi":"https://doi.org/10.1007/3-540-60693-9_24","title":"A new algorithm for finding minimum-weight words in large linear codes","display_name":"A new algorithm for finding minimum-weight words in large linear codes","publication_year":1995,"publication_date":"1995-01-01","ids":{"openalex":"https://openalex.org/W1574541063","doi":"https://doi.org/10.1007/3-540-60693-9_24","mag":"1574541063"},"language":"en","primary_location":{"id":"doi:10.1007/3-540-60693-9_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-60693-9_24","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050062480","display_name":"Anne Canteaut","orcid":"https://orcid.org/0000-0002-6292-8336"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I201181511","display_name":"\u00c9cole Nationale Sup\u00e9rieure de Techniques Avanc\u00e9es","ror":"https://ror.org/0309cs235","country_code":"FR","type":"education","lineage":["https://openalex.org/I201181511","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Anne Canteaut","raw_affiliation_strings":["Domaine de Voluceau, INRIA Projet Codes, 78153, Le Chesnay Cedex, France","Laboratoire LEI, Ecole Nationale Sup\u00e9rieure de Techniques Avanc\u00e9es, 32 boulevard Victor, 75015, Paris, France","\u00c9cole Nationale Sup\u00e9rieure de Techniques Avanc\u00e9es","INRIA Projet Codes"],"affiliations":[{"raw_affiliation_string":"Domaine de Voluceau, INRIA Projet Codes, 78153, Le Chesnay Cedex, France","institution_ids":["https://openalex.org/I1326498283"]},{"raw_affiliation_string":"Laboratoire LEI, Ecole Nationale Sup\u00e9rieure de Techniques Avanc\u00e9es, 32 boulevard Victor, 75015, Paris, France","institution_ids":["https://openalex.org/I201181511"]},{"raw_affiliation_string":"\u00c9cole Nationale Sup\u00e9rieure de Techniques Avanc\u00e9es","institution_ids":["https://openalex.org/I201181511"]},{"raw_affiliation_string":"INRIA Projet Codes","institution_ids":["https://openalex.org/I1326498283"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5050062480"],"corresponding_institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I201181511"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.17455061,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"205","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.9399790167808533},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.8143953084945679},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7541411519050598},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5528313517570496},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5318441390991211},{"id":"https://openalex.org/keywords/linear-code","display_name":"Linear code","score":0.5016138553619385},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45240598917007446},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4109839200973511},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3690292239189148},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.29818612337112427},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.2902942895889282},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.1899939775466919},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1757323443889618},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1577860414981842},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11384284496307373}],"concepts":[{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.9399790167808533},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.8143953084945679},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7541411519050598},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5528313517570496},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5318441390991211},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.5016138553619385},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45240598917007446},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4109839200973511},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3690292239189148},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.29818612337112427},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.2902942895889282},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.1899939775466919},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1757323443889618},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1577860414981842},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11384284496307373}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/3-540-60693-9_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-60693-9_24","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1501773332","https://openalex.org/W1510132879","https://openalex.org/W1527005907","https://openalex.org/W1536493828","https://openalex.org/W1570866738","https://openalex.org/W2090251262","https://openalex.org/W2093465763","https://openalex.org/W2114423948","https://openalex.org/W2302994590","https://openalex.org/W2986959318","https://openalex.org/W3172550433"],"related_works":["https://openalex.org/W2212229713","https://openalex.org/W2973501904","https://openalex.org/W4389313746","https://openalex.org/W2150802958","https://openalex.org/W4390438323","https://openalex.org/W2567184113","https://openalex.org/W1597779806","https://openalex.org/W1694516557","https://openalex.org/W3150242960","https://openalex.org/W4281771232"],"abstract_inverted_index":null,"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
