{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T20:26:07Z","timestamp":1773260767292,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1995,7,1]],"date-time":"1995-07-01T00:00:00Z","timestamp":804556800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1995,7]]},"DOI":"10.1007\/bf01390768","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T12:14:19Z","timestamp":1112444059000},"page":"21-35","source":"Crossref","is-referenced-by-count":242,"title":["Modular andp-adic cyclic codes"],"prefix":"10.1007","volume":"6","author":[{"given":"A. R.","family":"Calderbank","sequence":"first","affiliation":[]},{"given":"N. J. A.","family":"Sloane","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","unstructured":"E. F. Assmus, Jr., and J. D. Key,Designs and Their Codes, Cambridge Univ. Press (1992).","DOI":"10.1017\/CBO9781316529836"},{"key":"CR2","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/S0021-9800(69)80115-8","volume":"6","author":"E. F. Assmus Jr.","year":"1969","unstructured":"E. F. Assmus, Jr., and H. F. Mattson, Jr., New 5-designs,J. Combinat. Theory, Vol. 6 (1969) pp. 122?151.","journal-title":"J. Combinat. Theory"},{"key":"CR3","volume-title":"Introduction to p-Adic Numbers and Valuation Theory","author":"G. Bachman","year":"1964","unstructured":"G. Bachman,Introduction to p-Adic Numbers and Valuation Theory, Academic Press, New York (1964)."},{"key":"CR4","doi-asserted-by":"crossref","first-page":"1269","DOI":"10.1109\/18.133245","volume":"37","author":"R. E. Blahut","year":"1991","unstructured":"R. E. Blahut, The Gleason-Prange theorem,IEEE Trans. Inform. Theory, Vol. 37 (1991) pp. 1269?1273.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"CR5","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1016\/S0019-9958(72)90223-9","volume":"20","author":"I. F. Blake","year":"1972","unstructured":"I. F. Blake, Codes over certain rings,Inform. Control, Vol. 20 (1972) pp. 396?404.","journal-title":"Inform. Control"},{"key":"CR6","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/S0019-9958(75)80001-5","volume":"29","author":"I. F. Blake","year":"1975","unstructured":"I. F. Blake, Codes over integer residue rings,Inform. Control., Vol. 29 (1975) pp. 295?300.","journal-title":"Inform. Control."},{"key":"CR7","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/3-540-57843-9_20","volume":"781","author":"A. Bonnecaze","year":"1994","unstructured":"A. Bonnecaze and P. Sol\u00e9, Quanternary constructions of formally self-dual binary codes and unimodular lattices,Lect. Notes Computer Sci., Vol. 781 (1994) pp. 194?206.","journal-title":"Lect. Notes Computer Sci."},{"key":"CR8","volume-title":"Number Theory","author":"Z. I. Borevich","year":"1966","unstructured":"Z. I. Borevich and I. R. Shafarevich,Number Theory, Academic Press, New York (1966)."},{"key":"CR9","unstructured":"G. Caire and E. Biglieri, Linear codes over cyclic groups, preprint, Sept., 1993."},{"key":"CR10","volume-title":"Topics in Algebraic Coding Theory","author":"A. R. Calderbank","year":"1980","unstructured":"A. R. Calderbank,Topics in Algebraic Coding Theory, Ph.D. dissertation, California Institute of Technology, Pasadena, Calif., 1980."},{"key":"CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2249-9","volume-title":"Sphere Packings, Lattices and Groups","author":"J. H. Conway","year":"1993","unstructured":"J. H. Conway and N. J. A. Sloane,Sphere Packings, Lattices and Groups, Springer-Verlag, New York, 2nd edition (1993).","edition":"2nd edition"},{"key":"CR12","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/0097-3165(93)90070-O","volume":"62","author":"J. H. Conway","year":"1993","unstructured":"J. H. Conway and N. J. A. Sloane, Self-dual codes over the integers modulo 4,J. Combinat. Theory, Vol. A62 (1993) pp. 30?45.","journal-title":"J. Combinat. Theory"},{"key":"CR13","unstructured":"C. W. Curtis and I. Reiner,Representation Theory of Finite Groups and Associative Algebras, Wiley (1962)."},{"key":"CR14","unstructured":"G. D. Forney, Jr., N. J. A. Sloane and M. Trott, The Nordstrom-Robinson code is the binary image of the octacode, in A. R. Calderbank et al. (eds.),Coding and Quantization: DIMACS\/IEEE Workshop 1992, Amer. Math. Soc. (1993) pp. 19?26."},{"key":"CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-22278-2","volume-title":"p-adic Numbers","author":"F. Q. Gouv\u00eaa","year":"1993","unstructured":"F. Q. Gouv\u00eaa,p-adic Numbers, Springer-Verlag, New York (1993)."},{"key":"CR16","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/18.312154","volume":"40","author":"A. R. Hammons Jr.","year":"1994","unstructured":"A. R. Hammons, Jr., P. V. Kumar, A. R. Calderbank, N. J. A. Sloane, and P. Sol\u00e9, The ?4 of Kerdock, Preparata, Goethals and related codes,IEEE Trans. Inform. Theory, Vol. 40 (1994) pp. 301?319.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-0047-2","volume-title":"p-adic Numbers, p-adic Analysis, and Zeta-Functions","author":"N. Koblitz","year":"1977","unstructured":"N. Koblitz,p-adic Numbers, p-adic Analysis, and Zeta-Functions, Springer-Verlag, New York (1977)."},{"key":"CR18","volume-title":"The Theory of Error-Correcting Codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane,The Theory of Error-Correcting Codes, North-Holland, Amsterdam (1977)."},{"key":"CR19","volume-title":"Finite Rings with Identity","author":"B. R. McDonald","year":"1974","unstructured":"B. R. McDonald,Finite Rings with Identity, Dekker, New York (1974)."},{"key":"CR20","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/0012-365X(82)90222-9","volume":"42","author":"D. W. Newhart","year":"1982","unstructured":"D. W. Newhart, Information sets in quadratic residue codes,Discrete Math., Vol. 42 (1982) pp. 251?266.","journal-title":"Discrete Math."},{"key":"CR21","unstructured":"R. M. Roth and P. H. Siegel, A family of BCH codes for the Lee metric, preprint."},{"key":"CR22","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1109\/TIT.1979.1056063","volume":"25","author":"P. Shankar","year":"1979","unstructured":"P. Shankar, On BCH codes over arbitrary integer rings,IEEE Trans. Inform. Theory, Vol. 25 (1979) pp. 480?483.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"CR23","series-title":"Lecture Notes in Computer Science","first-page":"329","volume-title":"Coding Theory and Applications","author":"P. Sol\u00e9","year":"1988","unstructured":"P. Sol\u00e9, Open problem 2: cyclic codes over rings andp-adic fields, in G. Cohen and J. Wolfmann (eds.),Coding Theory and Applications, Lecture Notes in Computer Science, Springer-Verlag, New York, 388, (1988) p. 329."},{"key":"CR24","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/S0019-9958(77)90526-5","volume":"35","author":"E. Spiegel","year":"1977","unstructured":"E. Spiegel, Codes over ? m ,Inform. Control, Vol. 35 (1977) pp. 48?51.","journal-title":"Inform. Control"},{"key":"CR25","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/S0019-9958(78)90461-8","volume":"37","author":"E. Spiegel","year":"1978","unstructured":"E. Spiegel, Codes over ? m , revisited,Inform. Control, Vol. 37 (1978) pp. 100?104.","journal-title":"Inform. Control"},{"key":"CR26","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/TIT.1982.1056433","volume":"28","author":"S. K. Wasan","year":"1982","unstructured":"S. K. Wasan, On codes over ? m ,IEEE Trans. Inform. Theory, Vol. 28 (1982) pp. 117?120.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"CR27","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/BF01787706","volume":"6","author":"M. Yamada","year":"1990","unstructured":"M. Yamada, Distance-regular digraphs of girth 4 over an extension ring of ?\/4?,Graphs and Combinatorics, Vol. 6 (1990) pp. 381?394.","journal-title":"Graphs and Combinatorics"},{"key":"CR28","volume-title":"Commutative Algebra","author":"O. Zariski","year":"1958","unstructured":"O. Zariski and P. Samuel,Commutative Algebra, Van Nostrand, New York, Vol. 1 (1958)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01390768\/fulltext.html","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01390768.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01390768\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01390768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T12:25:44Z","timestamp":1556799944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01390768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,7]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1995,7]]}},"alternative-id":["BF01390768"],"URL":"https:\/\/doi.org\/10.1007\/bf01390768","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,7]]}}}