{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T17:45:21Z","timestamp":1744998321605,"version":"3.40.4"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:00:00Z","timestamp":1689724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:00:00Z","timestamp":1689724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s00200-023-00617-3","type":"journal-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T07:05:49Z","timestamp":1689750349000},"page":"471-491","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dihedral codes with 1-dimensional hulls and 1-dimensional linear complementary pairs of dihedral codes"],"prefix":"10.1007","volume":"36","author":[{"given":"S. T.","family":"Dougherty","sequence":"first","affiliation":[]},{"given":"Serap","family":"\u015eahinkaya","sequence":"additional","affiliation":[]},{"given":"Deniz","family":"Ustun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,19]]},"reference":[{"key":"617_CR1","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/0012-365X(90)90003-Z","volume":"83","author":"EF Assmus Jr","year":"1990","unstructured":"Assmus, E.F., Jr., Key, J.D.: Affine and projective planes. Discrete Math. 83, 161\u2013187 (1990)","journal-title":"Discrete Math."},{"key":"617_CR2","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/TIT.2006.876244","volume":"52","author":"LMJ Bazzi","year":"2006","unstructured":"Bazzi, L.M.J., Mitter, S.K.: Some randomized code constructions from group actions. IEEE Trans. Inf. Theory 52, 3210\u20133219 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"617_CR3","first-page":"31","volume":"3","author":"SD Berman","year":"1967","unstructured":"Berman, S.D.: On the theory of group codes. Kibernetika 3(1), 31\u201339 (1967)","journal-title":"Kibernetika"},{"key":"617_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2020.101738","volume":"68","author":"M Borello","year":"2020","unstructured":"Borello, M., Willems, W.: Group codes over fields are asymptotically good. Finite Fields Appl. 68, 101738 (2020)","journal-title":"Finite Fields Appl."},{"key":"617_CR5","doi-asserted-by":"crossref","unstructured":"Borello, M., Jamous, A.: Dihedral codes with prescribed minimum distance. In: Arithmetic of Finite Fields, 8th International Workshop, WAIFI 2020, Rennes, France, July 6\u20138, Revised Selected and Invited Papers (2020)","DOI":"10.1007\/978-3-030-68869-1_8"},{"key":"617_CR6","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.ffa.2015.05.002","volume":"35","author":"FE Brochero Martinez","year":"2015","unstructured":"Brochero Martinez, F.E.: Structure of finite dihedral group algebra. Finite Fields Appl. 35, 204\u2013214 (2015)","journal-title":"Finite Fields Appl."},{"issue":"11","key":"617_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2022.113059","volume":"345","author":"Y Cao","year":"2022","unstructured":"Cao, Y., Cao, Y., Ma, F.: Construction and enumeration of left dihedral codes satisfying certain duality properties. Discrete Math. 345(11), 113059 (2022). https:\/\/doi.org\/10.1016\/j.disc.2022.113059. (ISSN 0012-365X)","journal-title":"Discrete Math."},{"key":"617_CR8","doi-asserted-by":"crossref","unstructured":"Carlet, C., G\u00fcneri, C., Mesnager, S., \u00d6zbudak, F.: Construction of some codes suitable for both side channel and fault injection attacks. In: Proceedings of International Workshop on the Arithmetic of Finite Fields (WAIFI 2018), Bergen (2018)","DOI":"10.1007\/978-3-030-05153-2_5"},{"issue":"10","key":"617_CR9","doi-asserted-by":"publisher","first-page":"6583","DOI":"10.1109\/TIT.2018.2796125","volume":"64","author":"C Claude","year":"2018","unstructured":"Claude, C., Guneri, C., Ozbudak, F., Ozkaya, B., Patrick, S.: On linear complementary pairs of codes. IEEE Trans. Inf. Theory 64(10), 6583\u20136589 (2018)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"617_CR10","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s12095-019-00380-8","volume":"12","author":"ST Dougherty","year":"2019","unstructured":"Dougherty, S.T., Gildea, J., Kaya, A.: Quadruple bordered constructions of self-dual codes from group rings over Frobenius rings. Cryptogr. Commun. 12, 127\u2013146 (2019)","journal-title":"Cryptogr. Commun."},{"key":"617_CR11","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.ffa.2019.02.004","volume":"57","author":"DST Dougherty","year":"2019","unstructured":"Dougherty, D.S.T., Gildea, J., Korban, A., Kaya, A., Tylyshchak, A., Yildiz, B.: Bordered constructions of self-dual codes from group rings and new extremal binary self-dual code. Finite Fields Appl. 57, 108\u2013127 (2019)","journal-title":"Finite Fields Appl."},{"key":"617_CR12","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/BF01418529","volume":"3","author":"ST Dougherty","year":"1993","unstructured":"Dougherty, S.T.: Nets and their codes. Des. Codes Cryptogr. 3, 315\u2013331 (1993)","journal-title":"Des. Codes Cryptogr."},{"key":"617_CR13","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF01578866","volume":"4","author":"ST Dougherty","year":"1994","unstructured":"Dougherty, S.T.: A coding-theoretic solution to the 36 officer problem. Des. Codes Cryptogr. 4, 123\u2013128 (1994)","journal-title":"Des. Codes Cryptogr."},{"key":"617_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59806-2","volume-title":"Algebraic Coding Theory over Finite Commutative Rings","author":"ST Dougherty","year":"2017","unstructured":"Dougherty, S.T.: Algebraic Coding Theory over Finite Commutative Rings. Springer, Verlag (2017)"},{"key":"617_CR15","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1007\/s10623-017-0440-7","volume":"86","author":"ST Dougherty","year":"2018","unstructured":"Dougherty, S.T., Gildea, J., Taylor, R., et al.: Group rings, $$G$$-codes and constructions of self-dual and formally self-dual codes. Des. Codes Cryptogr. 86, 2115\u20132138 (2018)","journal-title":"Des. Codes Cryptogr."},{"key":"617_CR16","first-page":"116","volume":"4","author":"ST Dougherty","year":"2017","unstructured":"Dougherty, S.T., Kim, J.-L., Ozkaya, B., Sok, L., Sol\u00e9, P.: The combinatorics of LCD codes: linear programming bound and orthogonal matrices. Int. J. Inf. Coding Theory 4, 116\u2013128 (2017)","journal-title":"Int. J. Inf. Coding Theory"},{"issue":"4","key":"617_CR17","doi-asserted-by":"publisher","first-page":"677","DOI":"10.3934\/amc.2020037","volume":"14","author":"ST Dougherty","year":"2020","unstructured":"Dougherty, S.T., Gildea, J., Korban, A., Kaya, A.: Composite constructions of self-dual codes from group rings and new extremal self-dual binary codes of lenght 68. Adv. Math. Commun. 14(4), 677\u2013702 (2020)","journal-title":"Adv. Math. Commun."},{"issue":"8","key":"617_CR18","doi-asserted-by":"publisher","first-page":"5016","DOI":"10.1109\/TIT.2021.3088457","volume":"67","author":"Y Fan","year":"2021","unstructured":"Fan, Y., Lin, L.: Dihedral group codes over finite fields. IEEE Trans. Inf. Theory 67(8), 5016\u20135025 (2021). https:\/\/doi.org\/10.1109\/TIT.2021.3088457","journal-title":"IEEE Trans. Inf. Theory"},{"key":"617_CR19","doi-asserted-by":"publisher","unstructured":"Gao, Y., Yue, Q., Wu, Y.: LCD codes and self-orthogonal codes in generalized dihedral groups. Des. Codes Cryptogr. (2020). https:\/\/doi.org\/10.1007\/s10623-020-00778-z","DOI":"10.1007\/s10623-020-00778-z"},{"key":"617_CR20","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s12095-017-0258-1","volume":"10","author":"L Galvez","year":"2018","unstructured":"Galvez, L., Kim, J.-L., Lee, N., Roe, Y.G., Won, B.-S.: Some bounds on binary LCD codes. Cryptogr. Commun. 10, 719\u2013728 (2018)","journal-title":"Cryptogr. Commun."},{"key":"617_CR21","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10623-019-00676-z","volume":"88","author":"K Guenda","year":"2020","unstructured":"Guenda, K., Gulliver, T.A., Jitman, S., Thipworawimon, S.: Linear $$\\ell$$-intersection pairs of codes and their applications. Des. Codes Cryptogr. 88, 133\u2013152 (2020)","journal-title":"Des. Codes Cryptogr."},{"key":"617_CR22","doi-asserted-by":"publisher","first-page":"2404","DOI":"10.1109\/LCOMM.2018.2872046","volume":"22","author":"C G\u00fcneri","year":"2018","unstructured":"G\u00fcneri, C., \u00d6zkaya, B., Say\u0131c\u0131, S.: On linear complementary pair of nD cyclic codes. IEEE Commun. Lett. 22, 2404\u20132406 (2018)","journal-title":"IEEE Commun. Lett."},{"key":"617_CR23","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1109\/TIT.1982.1056498","volume":"28","author":"JS Leon","year":"1982","unstructured":"Leon, J.S.: Computing automorphism groups of error-correcting codes. IEEE Trans. Inf. Theory 28, 496\u2013511 (1982)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"617_CR24","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/S0747-7171(08)80103-4","volume":"12","author":"JS Leon","year":"1991","unstructured":"Leon, J.S.: Permutation group algorithms based on partition, I: theory and algorithms. J. Symb. Comput. 12, 533\u2013583 (1991)","journal-title":"J. Symb. Comput."},{"issue":"3","key":"617_CR25","doi-asserted-by":"publisher","first-page":"1668","DOI":"10.1109\/TIT.2018.2863693","volume":"65","author":"C Li","year":"2019","unstructured":"Li, C., Zeng, P.: Constructions of linear codes with one-dimensional hulls. IEEE Trans. Inf. Theory 65(3), 1668\u20131676 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"617_CR26","unstructured":"Liangdong, L., Xiuzhen, Z., Sen, Y., Hao, C.: Optimal Quaternary Hermitian LCD codes. arXiv:2010.10166 (2010)"},{"key":"617_CR27","doi-asserted-by":"publisher","unstructured":"Liu, H., Liu, X.S.: LCP of matrix product codes. Linear Multilinear Algebra (2022). https:\/\/doi.org\/10.1080\/03081087.2021.1999889","DOI":"10.1080\/03081087.2021.1999889"},{"key":"617_CR28","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/s11128-023-03932-3","volume":"22","author":"J Liu","year":"2023","unstructured":"Liu, J., Liu, X.: l-LCP of codes and their applications to EAQEC codes. Quantum Inf. Process. 22, 186 (2023). https:\/\/doi.org\/10.1007\/s11128-023-03932-3","journal-title":"Quantum Inf. Process."},{"key":"617_CR29","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10623-011-9530-0","volume":"63","author":"I McLaughlin","year":"2012","unstructured":"McLaughlin, I.: A group ring construction of the $$[48, 24,12]$$ type II linear block code. Des. Codes Cryptogr. 63, 29\u201341 (2012)","journal-title":"Des. Codes Cryptogr."},{"key":"617_CR30","doi-asserted-by":"publisher","first-page":"4381","DOI":"10.1109\/TIT.2008.928260","volume":"54","author":"I McLoughlin","year":"2008","unstructured":"McLoughlin, I., Hurley, T.: A group ring construction of the extended binary Golay code. IEEE Trans. Inf. Theory 54, 4381\u20134383 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"617_CR31","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/0012-365X(92)90563-U","volume":"106\u2013107","author":"JL Massey","year":"1992","unstructured":"Massey, J.L.: Linear codes with complementary duals. Discrete Math. 106\u2013107, 337\u2013342 (1992)","journal-title":"Discrete Math."},{"key":"617_CR32","doi-asserted-by":"crossref","unstructured":"Ngo, X.T., Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 82\u201387( 2015)","DOI":"10.1109\/HST.2015.7140242"},{"key":"617_CR33","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/s12095-019-00417-y","volume":"12","author":"B Pang","year":"2020","unstructured":"Pang, B., Zhu, S., Kai, X.: Some new bounds on LCD codes over finite fields. Cryptogr. Commun. 12, 743\u2013755 (2020)","journal-title":"Cryptogr. Commun."},{"key":"617_CR34","unstructured":"Passman, D. S.: The Algebraic Structure of Group Rings. Robert E. Krieger Publishing Co. Inc., Melbourne, FL, Reprint of the 1977 original (1985)"},{"key":"617_CR35","doi-asserted-by":"publisher","unstructured":"Qian, L.Q., Cao, X.W., Mesnager, S.: Linear codes with one-dimensional hulls associated with Gaussian sums. Cryptogr. Commun. (2020). https:\/\/doi.org\/10.1007\/s12095-020-00462-y","DOI":"10.1007\/s12095-020-00462-y"},{"key":"617_CR36","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1109\/18.850662","volume":"46","author":"N Sendrier","year":"2000","unstructured":"Sendrier, N.: Finding the permutation between equivalent codes: the support splitting algorithm. IEEE Trans. Inf. Theory 46, 1193\u20131203 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"617_CR37","doi-asserted-by":"crossref","unstructured":"Sendrier, N., Skersys, G.: On the computation of the automorphism group of a linear code. In: Proceedings of IEEE ISIT2001, Washington, DC, p. 13 (2001)","DOI":"10.1109\/ISIT.2001.935876"},{"key":"617_CR38","unstructured":"Sahinkaya, S.: available online at https:\/\/sites.google.com\/view\/serap-sahinkaya\/generator-matrices"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-023-00617-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00200-023-00617-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-023-00617-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T11:32:22Z","timestamp":1744371142000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00200-023-00617-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,19]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["617"],"URL":"https:\/\/doi.org\/10.1007\/s00200-023-00617-3","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"type":"print","value":"0938-1279"},{"type":"electronic","value":"1432-0622"}],"subject":[],"published":{"date-parts":[[2023,7,19]]},"assertion":[{"value":"22 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}