{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:59:54Z","timestamp":1772283594364,"version":"3.50.1"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1995,9,1]],"date-time":"1995-09-01T00:00:00Z","timestamp":809913600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1995,9]]},"DOI":"10.1007\/bf01398008","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T19:56:49Z","timestamp":1112471809000},"page":"97-106","source":"Crossref","is-referenced-by-count":16,"title":["The existence of extremal self-dual [50,25,10] codes and quasi-symmetric 2-(49,9,6) designs"],"prefix":"10.1007","volume":"6","author":[{"given":"W. Cary","family":"Huffman","sequence":"first","affiliation":[]},{"given":"Vladimir D.","family":"Tonchev","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","unstructured":"Th. Beth, D. Jungnickel, and H. Lenz,Design Theory, Cambridge University Press (1986)."},{"key":"CR2","unstructured":"Blokhuis and A. R. Calderbank, Extremal self-dual [50,25,10] codes and quasi-symmetric 2-(49,9,6) designs, manuscript."},{"key":"CR3","doi-asserted-by":"crossref","unstructured":"P.J. Cameron and J. H. van Lint, Graphs, Codes and Designs,LMS Lecture Note Ser., Vol. 43, Cambridge (1980).","DOI":"10.1017\/CBO9780511662140"},{"key":"CR4","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1109\/18.59931","volume":"36","author":"J. H. Conway","year":"1990","unstructured":"J. H. Conway and N. J. A. Sloane, A new upper bound on the minimal distance of self-dual codes,IEEE Trans. Information Theory, Vol. 36 (1990) pp. 1319?1333.","journal-title":"IEEE Trans. Information Theory"},{"key":"CR5","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1109\/18.6028","volume":"34","author":"W. C. Huffman","year":"1988","unstructured":"W. C. Huffman, On the [24,12,10] quaternary code and binary codes with an automorphism having two cycles,IEEE Trans. Inform. Theory, Vol. IT-34 (1988) pp. 486?493.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"CR6","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1109\/18.54885","volume":"36","author":"W. C. Huffman","year":"1990","unstructured":"W. C. Huffman, On extremal self-dual quaternary codes of lengths 18 to 28, I,IEEE Trans. Inform. Theory, Vol. IT-36 (1990) pp. 651?660.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"CR7","volume-title":"The Theory of Error-Correcting Codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane,The Theory of Error-Correcting Codes, North-Holland, New York (1977)."},{"key":"CR8","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/0012-365X(72)90034-9","volume":"3","author":"V. S. Pless","year":"1972","unstructured":"V. S. Pless, A classification of self-orthogonal codes over GF(2),Discrete Math., Vol. 3 (1972) pp. 209?246.","journal-title":"Discrete Math."},{"key":"CR9","doi-asserted-by":"crossref","unstructured":"M. S. Shrikhande and S. S. Sane, ?Quasi-symmetric designs,LMS Lecture Note Ser., Vol. 164, Cambridge (1991).","DOI":"10.1017\/CBO9780511665615"},{"key":"CR10","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1090\/conm\/111\/1079749","volume":"111","author":"V. D. Tonchev","year":"1990","unstructured":"V. D. Tonchev, Self-orthogonal designs,Contemporary Math. Vol. 111 (1990) pp. 219?235.","journal-title":"Contemporary Math."},{"key":"CR11","volume-title":"Combinatorial Configurations","author":"V. D. Tonchev","year":"1988","unstructured":"V. D. Tonchev,Combinatorial Configurations, Longman, Wiley, New York (1988)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01398008.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01398008\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01398008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T16:51:48Z","timestamp":1556815908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01398008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,9]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1995,9]]}},"alternative-id":["BF01398008"],"URL":"https:\/\/doi.org\/10.1007\/bf01398008","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,9]]}}}