{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T03:24:14Z","timestamp":1777433054908,"version":"3.51.4"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,3,25]],"date-time":"2011-03-25T00:00:00Z","timestamp":1301011200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1007\/s10623-011-9497-x","type":"journal-article","created":{"date-parts":[[2011,3,24]],"date-time":"2011-03-24T09:24:40Z","timestamp":1300958680000},"page":"121-130","source":"Crossref","is-referenced-by-count":6,"title":["A generalized extension theorem for linear codes"],"prefix":"10.1007","volume":"62","author":[{"given":"Tatsuya","family":"Maruta","sequence":"first","affiliation":[]},{"given":"Yuri","family":"Yoshida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,3,25]]},"reference":[{"key":"9497_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511665608","volume-title":"Combinatorics of Finite Geometries","author":"L.M. Batten","year":"1997","unstructured":"Batten L.M.: Combinatorics of Finite Geometries, 2nd edn. Cambridge University Press, Cambridge (1997)","edition":"2"},{"key":"9497_CR2","volume-title":"Introduction to Coding Theory","author":"J. Bierbrauer","year":"2005","unstructured":"Bierbrauer J.: Introduction to Coding Theory. Chapman and Hall, London (2005)"},{"key":"9497_CR3","first-page":"75","volume-title":"Cryptography and Coding II","author":"R. Hill","year":"1992","unstructured":"Hill R.: Optimal linear codes. In: Mitchell, C. (eds) Cryptography and Coding II, pp. 75\u2013104. Oxford University Press, Oxford (1992)"},{"key":"9497_CR4","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1023\/A:1008319024396","volume":"17","author":"R. Hill","year":"1999","unstructured":"Hill R.: An extension theorem for linear codes. Des. Codes Cryptogr. 17, 151\u2013157 (1999)","journal-title":"Des. Codes Cryptogr."},{"key":"9497_CR5","first-page":"127","volume-title":"Combinatorial Designs and their Applications. Research Notes in Mathamatics, vol. 403","author":"R. Hill","year":"1999","unstructured":"Hill R., Kolev E. et\u00a0al.: A survey of recent results on optimal linear codes. In: Holroyd, F.C. (eds) Combinatorial Designs and their Applications. Research Notes in Mathamatics, vol. 403., pp. 127\u2013152. Chapman & Hall, London (1999)"},{"key":"9497_CR6","unstructured":"Hill R., Lizak P.: Extensions of linear codes. In: Proceedings of the IEEE International Symposium on Information Theory, p. 345. Whistler, Canada (1995)."},{"key":"9497_CR7","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198502951.001.0001","volume-title":"Projective Geometries Over Finite Fields","author":"J.W.P. Hirschfeld","year":"1998","unstructured":"Hirschfeld J.W.P.: Projective Geometries Over Finite Fields, 2nd edn. Clarendon Press, Oxford (1998)","edition":"2"},{"key":"9497_CR8","doi-asserted-by":"crossref","first-page":"34","DOI":"10.37236\/521","volume":"18","author":"R. Kanazawa","year":"2011","unstructured":"Kanazawa R., Maruta T.: On optimal linear codes over F8. Electronic J. Combin. 18, 34 (2011)","journal-title":"Electronic J. Combin."},{"key":"9497_CR9","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1134\/S0032946006040041","volume":"42","author":"I. Landjev","year":"2006","unstructured":"Landjev I., Rousseva A.: An extension theorem for arcs and linear codes. Probl. Inform. Transm. 42, 319\u2013329 (2006)","journal-title":"Probl. Inform. Transm."},{"key":"9497_CR10","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1006\/ffta.2001.0296","volume":"7","author":"T. Maruta","year":"2001","unstructured":"Maruta T.: On the extendability of linear codes. Finite Fields Appl. 7, 350\u2013354 (2001)","journal-title":"Finite Fields Appl."},{"key":"9497_CR11","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1016\/j.ffa.2004.02.001","volume":"10","author":"T. Maruta","year":"2004","unstructured":"Maruta T.: A new extension theorem for linear codes. Finite Fields Appl. 10, 674\u2013685 (2004)","journal-title":"Finite Fields Appl."},{"key":"9497_CR12","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s10623-005-6400-7","volume":"35","author":"T. Maruta","year":"2005","unstructured":"Maruta T.: Extendability of ternary linear codes. Des. Codes Cryptogr. 35, 175\u2013190 (2005)","journal-title":"Des. Codes Cryptogr."},{"key":"9497_CR13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10623-003-4191-2","volume":"34","author":"T. Maruta","year":"2005","unstructured":"Maruta T., Landjev I.N., Rousseva A.: On the minimum size of some minihypers and related linear codes. Des. Codes Cryptogr. 34, 5\u201315 (2005)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"9497_CR14","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1006\/jcta.1997.2864","volume":"83","author":"H.N. Ward","year":"1998","unstructured":"Ward H.N.: Divisibility of codes meeting the Griesmer bound. J. Combin. Theory A 83(1), 79\u201393 (1998)","journal-title":"J. Combin. Theory A"},{"key":"9497_CR15","first-page":"117","volume":"48","author":"Y. Yoshida","year":"2010","unstructured":"Yoshida Y., Maruta T.: An extension theorem for [n, k, d] q codes with gcd(d, q)\u00a0=\u00a02. Australas. J. Combin. 48, 117\u2013131 (2010)","journal-title":"Australas. J. Combin."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9497-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-011-9497-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9497-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T11:22:15Z","timestamp":1712316135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-011-9497-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,25]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["9497"],"URL":"https:\/\/doi.org\/10.1007\/s10623-011-9497-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3,25]]}}}