{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:44Z","timestamp":1772283704331,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,6,30]],"date-time":"2011-06-30T00:00:00Z","timestamp":1309392000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1007\/s10623-011-9539-4","type":"journal-article","created":{"date-parts":[[2011,6,29]],"date-time":"2011-06-29T14:19:16Z","timestamp":1309357156000},"page":"113-126","source":"Crossref","is-referenced-by-count":30,"title":["Cyclic codes over R k"],"prefix":"10.1007","volume":"63","author":[{"given":"Steven T.","family":"Dougherty","sequence":"first","affiliation":[]},{"given":"Suat","family":"Karadeniz","sequence":"additional","affiliation":[]},{"given":"Bahattin","family":"Yildiz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,30]]},"reference":[{"issue":"9","key":"9539_CR1","doi-asserted-by":"crossref","first-page":"2126","DOI":"10.1109\/TIT.2003.815763","volume":"49","author":"T. Abualrub","year":"2003","unstructured":"Abualrub T., Oehmke R.: On the generators of $${\\mathbb{Z}_4}$$ cyclic codes of length 2 e . IEEE-IT 49(9), 2126\u20132133 (2003)","journal-title":"IEEE-IT"},{"key":"9539_CR2","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s10623-006-9034-5","volume":"42","author":"T. Abualrub","year":"2007","unstructured":"Abualrub T., Siap I.: Cyclic codes over the rings $${\\mathbb{Z}_2+u\\mathbb{Z}_2}$$ and $${\\mathbb{Z}_2+u\\mathbb{Z}_2+u^2\\mathbb{Z}_2}$$ . Des. Codes Cryptogr. 42, 273\u2013287 (2007)","journal-title":"Des. Codes Cryptogr."},{"key":"9539_CR3","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/S0166-218X(02)00434-1","volume":"128","author":"T. Blackford","year":"2003","unstructured":"Blackford T.: Cyclic codes over $${\\mathbb{Z}_4}$$ of oddly even length. Discrete Appl. Math. 128, 27\u201346 (2003)","journal-title":"Discrete Appl. Math."},{"key":"9539_CR4","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/18.761278","volume":"45","author":"A. Bonnecaze","year":"1999","unstructured":"Bonnecaze A., Udaya P.: Cyclic codes and self-dual codes over $${\\mathbb{F}_2+u\\mathbb{F}_2}$$ . IEEE Trans. Inform. Theory 45, 1250\u20131255 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9539_CR5","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/BF01390768","volume":"6","author":"A.R. Calderbank","year":"1995","unstructured":"Calderbank A.R., Sloane N.J.A.: Modular and p-adic cyclic codes. Des. Codes Cryptogr. 6, 21\u201335 (1995)","journal-title":"Des. Codes Cryptogr."},{"key":"9539_CR6","doi-asserted-by":"crossref","first-page":"1728","DOI":"10.1109\/TIT.2004.831789","volume":"50","author":"H. Quang Dinh","year":"2004","unstructured":"Quang Dinh H., Lopez-Perm\u00f3uth S.: Cyclic and negacyclic codes over finite chain rings. IEEE Trans. Inform. Theory 50, 1728\u20131744 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9539_CR7","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/18.746770","volume":"45","author":"S.T. Dougherty","year":"1999","unstructured":"Dougherty S.T., Gaborit P., Harada M., Sol\u00e9 P.: Type II codes over $${\\mathbb{F}_2+u\\mathbb{F}_2}$$ . IEEE Trans. Inform. Theory 45, 32\u201345 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9539_CR8","doi-asserted-by":"crossref","unstructured":"Dougherty S.T., Ling S.: Cyclic codes over $${\\mathbb{Z}_4}$$ of even length, Des. Codes Cryptogr. 127\u2013153 (2006).","DOI":"10.1007\/s10623-005-2773-x"},{"issue":"1","key":"9539_CR9","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.ffa.2005.06.004","volume":"13","author":"S.T. Dougherty","year":"2007","unstructured":"Dougherty S.T., Park Y.H.: On modular cyclic codes. Finite Fields Appl. 13(1), 31\u201357 (2007)","journal-title":"Finite Fields Appl."},{"issue":"3","key":"9539_CR10","first-page":"205","volume":"17","author":"S.T. Dougherty","year":"2011","unstructured":"Dougherty S.T., Yildiz B., Karadeniz S.: Codes over R k . Gray Maps Binary Images 17(3), 205\u2013219 (2011)","journal-title":"Gray Maps Binary Images"},{"key":"9539_CR11","first-page":"319","volume":"3","author":"T. Hurley","year":"2006","unstructured":"Hurley T.: Group rings and rings of matrices. Int. J. Pure Appl. Math. 3, 319\u2013335 (2006)","journal-title":"Int. J. Pure Appl. Math."},{"key":"9539_CR12","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/PL00012382","volume":"10","author":"G.H. Norton","year":"2000","unstructured":"Norton G.H., S\u0103l\u0103gean A.: On the structure of linear and cyclic codes over a finite chain ring. Appl. Algebra Engrg. Comm. Comput. 10, 489\u2013506 (2000)","journal-title":"Appl. Algebra Engrg. Comm. Comput."},{"key":"9539_CR13","first-page":"334","volume":"3","author":"P. Konmar","year":"2007","unstructured":"Konmar P., Lopez-Permouth S.K.: Cyclic codes over integers modulo p m . Finite Fields Appl. 3, 334\u2013352 (2007)","journal-title":"Finite Fields Appl."},{"issue":"7","key":"9539_CR14","doi-asserted-by":"crossref","first-page":"2751","DOI":"10.1109\/18.959257","volume":"47","author":"S. Ling","year":"2001","unstructured":"Ling S., Sol\u00e9 P.: On the algebraic structure of quasi-cyclic codes I: finite fields. IEEE-IT 47(7), 2751\u20132760 (2001)","journal-title":"IEEE-IT"},{"key":"9539_CR15","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1023\/A:1024715527805","volume":"30","author":"S. Ling","year":"2003","unstructured":"Ling S., Sol\u00e9 P.: On the algebraic structure of quasi-cyclic codes II: chain rings. Des. Codes Cryptogr. 30, 113\u2013130 (2003)","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"9539_CR16","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1109\/18.532906","volume":"42","author":"V.S. Pless","year":"1996","unstructured":"Pless V.S., Qian Z.: Cyclic codes and quadratic residue codes over Z 4. IEEE-IT 42(5), 1594\u20131600 (1996)","journal-title":"IEEE-IT"},{"key":"9539_CR17","doi-asserted-by":"crossref","first-page":"2148","DOI":"10.1109\/18.782165","volume":"45","author":"P. Udaya","year":"1999","unstructured":"Udaya P., Bonnecaze A.: Decoding of cyclic codes over $${\\mathbb{F}_2+u\\mathbb{F}_2}$$ . IEEE Trans. Inform. Theory 45, 2148\u20132157 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9539_CR18","doi-asserted-by":"crossref","first-page":"2527","DOI":"10.1109\/18.796397","volume":"45","author":"J. Wolfmann","year":"1999","unstructured":"Wolfmann J.: Negacyclic and cyclic codes over $${\\mathbb{Z}_4}$$ . IEEE Trans. Inform. Theory 45, 2527\u20132532 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9539_CR19","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1353\/ajm.1999.0024","volume":"121","author":"J. Wood","year":"1999","unstructured":"Wood J.: Duality for modules over finite rings and applications to coding theory. Am. J. Math. 121, 555\u2013575 (1999)","journal-title":"Am. J. Math."},{"key":"9539_CR20","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s10623-009-9309-8","volume":"54","author":"B. Yildiz","year":"2010","unstructured":"Yildiz B., Karadeniz S.: Linear Codes over $${\\mathbb{F}_2+u\\mathbb{F}_2+v\\mathbb{F}_2+uv\\mathbb{F}_2}$$ . Des. Codes Cryptogr. 54, 61\u201381 (2010)","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"9539_CR21","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/s10623-010-9399-3","volume":"58","author":"B. Yildiz","year":"2011","unstructured":"Yildiz B., Karadeniz S.: Cyclic Codes over $${\\mathbb{F}_2+u\\mathbb{F}_2+v\\mathbb{F}_2+uv\\mathbb{F}_2}$$ . Des. Codes Cryptogr. 58(3), 221\u2013234 (2011)","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9539-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-011-9539-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9539-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T14:11:12Z","timestamp":1560348672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-011-9539-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,30]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,4]]}},"alternative-id":["9539"],"URL":"https:\/\/doi.org\/10.1007\/s10623-011-9539-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,30]]}}}