{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T18:16:46Z","timestamp":1772734606244,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,2,3]],"date-time":"2007-02-03T00:00:00Z","timestamp":1170460800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2007,3,5]]},"DOI":"10.1007\/s10623-006-9034-5","type":"journal-article","created":{"date-parts":[[2007,2,4]],"date-time":"2007-02-04T01:42:02Z","timestamp":1170553322000},"page":"273-287","source":"Crossref","is-referenced-by-count":114,"title":["Cyclic codes over the rings Z 2\u00a0+\u00a0uZ 2 and Z 2\u00a0+\u00a0uZ 2\u00a0+\u00a0u 2 Z 2"],"prefix":"10.1007","volume":"42","author":[{"given":"Taher","family":"Abualrub","sequence":"first","affiliation":[]},{"given":"Irfan","family":"Siap","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,2,3]]},"reference":[{"key":"9034_CR1","unstructured":"Abualrub T, Siap I (2006) On the construction of cyclic codes over the ring Z 2\u00a0+\u00a0uZ 2. In: Proceedings, the 9th WSEAS international conference on applied mathematics, Istanbul, Turkey, pp 430\u2013435, May 27\u201329"},{"issue":"12","key":"9034_CR2","doi-asserted-by":"crossref","first-page":"3306","DOI":"10.1109\/TIT.2004.838109","volume":"50","author":"T Abualrub","year":"2004","unstructured":"Abualrub T, Ghrayeb A, Oehmke R (2004) A mass formula and rank of Z4 cyclic codes of Length 2e. IEEE Trans Inf Theory 50(12):3306\u20133312","journal-title":"IEEE Trans Inf Theory"},{"issue":"9","key":"9034_CR3","doi-asserted-by":"crossref","first-page":"2126","DOI":"10.1109\/TIT.2003.815763","volume":"49","author":"T Abualrub","year":"2003","unstructured":"Abualrub T, Oehmke R (2003) On the generators of Z 4 cyclic codes. IEEE Trans Inf Theory 49(9):2126\u20132133","journal-title":"IEEE Trans Inf Theory"},{"key":"9034_CR4","doi-asserted-by":"crossref","unstructured":"Blackford T (2001) Cyclic codes over Z 4 of oddly even length. In: Proceedings of the international workshop on coding and cryptography, 83\u201392. WCC 2001, Paris, France","DOI":"10.1016\/S1571-0653(04)00205-7"},{"issue":"4","key":"9034_CR5","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/18.761278","volume":"45","author":"A Bonnecaze","year":"1999","unstructured":"Bonnecaze A, Udaya P (1999) Cyclic codes and self-dual codes over F 2\u00a0+\u00a0F 2. IEEE Trans Inf Theory 45(4):1250\u20131255","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"9034_CR6","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1109\/18.681315","volume":"4","author":"AR Calderbank","year":"1998","unstructured":"Calderbank AR, Rains EM, Shor PW, Neil J, Sloane A (1998) Quantum error corrections via codes over GF(4). IEEE Trans Inf Theory 4(4):1369\u20131387","journal-title":"IEEE Trans Inf Theory"},{"key":"9034_CR7","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/BF01390768","volume":"6","author":"AR Calderbank","year":"1995","unstructured":"Calderbank AR, Sloane NJA (1995) Modular and p-adic cyclic codes. Des Codes Cryptogr 6:21\u201335","journal-title":"Des Codes Cryptogr"},{"issue":"2","key":"9034_CR8","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/18.75249","volume":"37","author":"G Catagoli","year":"1991","unstructured":"Catagoli G, Massey JL, Schoeller PA, von Seemann N (1991) On repeated-root cyclic codes. IEEE Trans Inf Theory 37(2):337\u2013342","journal-title":"IEEE Trans Inf Theory"},{"key":"9034_CR9","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/0097-3165(93)90070-O","volume":"62","author":"JH Conway","year":"1993","unstructured":"Conway JH, Sloan NJA (1993) Self-dual codes over the integers modulo 4. J Combin Theory Series A 62:30\u201345","journal-title":"J Combin Theory Series A"},{"issue":"1","key":"9034_CR10","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/18.904544","volume":"47","author":"ST Dougherty","year":"2001","unstructured":"Dougherty ST, Shiromoto K (2001) Maximum mistance codes over rings of order 4. IEEE Trans Inf Theory 47(1):400\u2013404","journal-title":"IEEE Trans Inf Theory"},{"key":"9034_CR11","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/18.312154","volume":"40","author":"AR Hammons Jr","year":"1994","unstructured":"Hammons AR Jr, Kumar PV, Calderbank AR, Sloane NJ, Sol\u0117 P (1994) The Z 4\u2212Linearity of Kerdock, Preparata, Goethals, and Related Codes. IEEE Trans Inf Theory 40:301\u2013319","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"9034_CR12","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1109\/18.75250","volume":"37","author":"JH van Lint","year":"1977","unstructured":"van Lint JH (1977) Repeated-root cyclic codes. IEEE Trans Inf Theory 37(2):343\u2013345","journal-title":"IEEE Trans Inf Theory"},{"key":"9034_CR13","volume-title":"The theory of error-correcting codes, Ninth Impression","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams FJ, Sloane NJA (1977) The theory of error-correcting codes, Ninth Impression. North-Holland, Amsterdam"},{"issue":"5","key":"9034_CR14","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1109\/18.532906","volume":"42","author":"V Pless","year":"1996","unstructured":"Pless V, Qian Z (1996) Cyclic codes and quadratic residue codes over Z 4. IEEE Trans Inf Theory 42(5):1594\u20131600","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9034-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-006-9034-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9034-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:07Z","timestamp":1559245807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-006-9034-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,2,3]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,3,5]]}},"alternative-id":["9034"],"URL":"https:\/\/doi.org\/10.1007\/s10623-006-9034-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,2,3]]}}}