{"id":"https://openalex.org/W7130607691","doi":"https://doi.org/10.48550/arxiv.2602.16207","title":"Cryptographic Applications of Twisted Goppa Codes","display_name":"Cryptographic Applications of Twisted Goppa Codes","publication_year":2026,"publication_date":"2026-02-18","ids":{"openalex":"https://openalex.org/W7130607691","doi":"https://doi.org/10.48550/arxiv.2602.16207"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.16207","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101398493","display_name":"Harshdeep Singh","orcid":"https://orcid.org/0000-0001-8500-9175"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Singh, Harshdeep","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126430203","display_name":"Anuj Kumar Bhagat","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bhagat, Anuj Kumar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035273961","display_name":"Ritumoni Sarma","orcid":"https://orcid.org/0000-0002-8668-1948"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sarma, Ritumoni","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5005200150","display_name":"Indivar Gupta","orcid":"https://orcid.org/0000-0003-2801-0254"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gupta, Indivar","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101398493"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.0010999999940395355,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.0008999999845400453,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5121999979019165},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.4772000014781952},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4625000059604645},{"id":"https://openalex.org/keywords/linear-code","display_name":"Linear code","score":0.45820000767707825},{"id":"https://openalex.org/keywords/dual-polyhedron","display_name":"Dual polyhedron","score":0.453900009393692},{"id":"https://openalex.org/keywords/duality","display_name":"Duality (order theory)","score":0.3619000017642975},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3465999960899353},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.34439998865127563}],"concepts":[{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6190999746322632},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5121999979019165},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.4772000014781952},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4672999978065491},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4625000059604645},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.45820000767707825},{"id":"https://openalex.org/C105313907","wikidata":"https://www.wikidata.org/wiki/Q1053857","display_name":"Dual polyhedron","level":2,"score":0.453900009393692},{"id":"https://openalex.org/C2778023678","wikidata":"https://www.wikidata.org/wiki/Q554403","display_name":"Duality (order theory)","level":2,"score":0.3619000017642975},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.350600004196167},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3465999960899353},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.34439998865127563},{"id":"https://openalex.org/C128151799","wikidata":"https://www.wikidata.org/wiki/Q13563306","display_name":"Luby transform code","level":5,"score":0.3312999904155731},{"id":"https://openalex.org/C118712358","wikidata":"https://www.wikidata.org/wiki/Q782566","display_name":"Automorphism","level":2,"score":0.3264000117778778},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3066999912261963},{"id":"https://openalex.org/C108509264","wikidata":"https://www.wikidata.org/wiki/Q5420758","display_name":"Expander code","level":5,"score":0.29350000619888306},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.29190000891685486},{"id":"https://openalex.org/C78944582","wikidata":"https://www.wikidata.org/wiki/Q5158264","display_name":"Concatenated error correction code","level":4,"score":0.2851000130176544},{"id":"https://openalex.org/C101252705","wikidata":"https://www.wikidata.org/wiki/Q7294373","display_name":"Raptor code","level":5,"score":0.2847999930381775},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.2793999910354614},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.2759000062942505},{"id":"https://openalex.org/C2776196297","wikidata":"https://www.wikidata.org/wiki/Q17138781","display_name":"Twist","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C114504821","wikidata":"https://www.wikidata.org/wiki/Q2164281","display_name":"Turbo code","level":3,"score":0.26350000500679016},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.2619999945163727},{"id":"https://openalex.org/C157899210","wikidata":"https://www.wikidata.org/wiki/Q1395022","display_name":"Convolutional code","level":3,"score":0.25949999690055847}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.16207","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.16207","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.16207","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.16207","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6859307289123535,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,84],"article":[1],"defines":[2],"multi-twisted":[3,13],"Goppa":[4],"(MTG)":[5],"codes":[6,16,69,93,111,131],"as":[7],"subfield":[8],"subcodes":[9],"of":[10,12,29,91],"duals":[11],"Reed-Solomon":[14],"(MTRS)":[15],"and":[17],"examines":[18],"their":[19],"properties.":[20],"We":[21],"show":[22],"that":[23,104],"if":[24],"$t$":[25],"is":[26,40,112],"the":[27,30,61,88,95,105,123],"degree":[28],"MTG":[31,35,68,110,130],"polynomial":[32],"defining":[33],"an":[34],"code,":[36],"its":[37],"minimum":[38],"distance":[39],"at":[41,56,74],"least":[42],"$t":[43],"+":[44],"1$":[45],"under":[46],"certain":[47],"conditions.":[48],"Extending":[49],"earlier":[50],"methods":[51],"limited":[52],"to":[53,65,79],"single":[54,72],"twist":[55,73],"last":[57],"position,":[58,76],"we":[59,102,120],"use":[60],"extended":[62],"Euclidean":[63],"algorithm":[64],"efficiently":[66],"decode":[67],"with":[70],"a":[71,133],"any":[75],"correcting":[77],"up":[78],"$\\left\\lfloor":[80],"\\tfrac{t}{2}":[81],"\\right\\rfloor$":[82],"errors.":[83],"decoding":[85],"method":[86],"highlights":[87],"practical":[89],"potential":[90],"these":[92],"within":[94],"Niederreiter":[96,106],"public":[97,124],"key":[98,116,125],"cryptosystem":[99],"(PKC).":[100],"Furthermore,":[101],"establish":[103],"PKC":[107],"based":[108],"on":[109],"secure":[113],"against":[114],"partial":[115],"recovery":[117],"attacks.":[118],"Additionally,":[119],"also":[121],"reduce":[122],"size":[126],"by":[127],"constructing":[128],"quasi-cyclic":[129],"using":[132],"non-trivial":[134],"automorphism":[135],"group.":[136]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-20T00:00:00"}
