{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T15:11:28Z","timestamp":1725289888298},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,10,4]],"date-time":"2013-10-04T00:00:00Z","timestamp":1380844800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10623-013-9884-6","type":"journal-article","created":{"date-parts":[[2013,10,3]],"date-time":"2013-10-03T06:35:26Z","timestamp":1380782126000},"page":"673-680","source":"Crossref","is-referenced-by-count":6,"title":["New extremal binary self-dual codes of length 64 from $$R_3$$ R 3 -lifts of the extended binary Hamming code"],"prefix":"10.1007","volume":"74","author":[{"given":"Suat","family":"Karadeniz","sequence":"first","affiliation":[]},{"given":"Bahattin","family":"Yildiz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,4]]},"reference":[{"key":"9884_CR1","unstructured":"Bosma W., Cannon J., Playoust C.: The magma algebra system. I. The user language. J. Symb. Comput. 24, 235\u2013265 (1997)."},{"key":"9884_CR2","doi-asserted-by":"crossref","unstructured":"Bouyuklieva S., Yorgov V.: Singly-even self-dual codes of length 40. Des. Codes Cryptogr. 9, 131\u2013141 (1996).","DOI":"10.1007\/BF00124589"},{"key":"9884_CR3","unstructured":"Bouyuklieva S.: Some optimal self-orthogonal and self-dual codes. J. Discret. Math. 287, 1\u201310 (2004)."},{"key":"9884_CR4","doi-asserted-by":"crossref","unstructured":"Chigira N., Harada M., Kitazume M.: Extremal self-dual codes of length 64 through neighbors and covering radii. Des. Codes Cryptogr. 42, 93\u2013101 (2007).","DOI":"10.1007\/s10623-006-9018-5"},{"key":"9884_CR5","unstructured":"Conway J.H., Sloane N.J.A.: A new upper bound on the minimal distance of self-dual codes. IEEE Trans. Inf. Theory 36(6), 1319\u20131333 (1990)."},{"key":"9884_CR6","unstructured":"Dougherty S.T., Gaborit P., Harada M., Sol\u00e9 P.: Type II codes over $${\\mathbb{F}}_2+u{\\mathbb{F}}_2$$ F 2 + u F 2 . IEEE Trans. Inf. Theory 45(1), 32\u201345 (1999)."},{"key":"9884_CR7","unstructured":"Dougherty S.T., Mesnager S., Sol\u00e9 P.: Secret sharing scehmes based on self-dual codes. In: Proceedings of IEEE Information Theory Workshop, ITW, Porto (2008)."},{"key":"9884_CR8","doi-asserted-by":"crossref","unstructured":"Dougherty S.T., Kim J.L., Kulosman H., Liu H.: Self-dual codes over commutative Frobenius rings. Finite Fields Appl. 16, 14\u201326 (2010).","DOI":"10.1016\/j.ffa.2009.11.004"},{"key":"9884_CR9","doi-asserted-by":"crossref","unstructured":"Dougherty S.T., Yildiz B., Karadeniz S.: Codes over $$R_k$$ R k , gray maps and their binary images. Finite Fields Appl. 17(3), 205\u2013219 (2011).","DOI":"10.1016\/j.ffa.2010.11.002"},{"key":"9884_CR10","unstructured":"Dougherty S., Yildiz B., Karadeniz S.: Self-dual codes over $$R_k$$ R k and binary self-dual codes. Eur. J. Pure Appl. Math. 6(1), 89\u2013106 (2013)."},{"key":"9884_CR11","doi-asserted-by":"crossref","unstructured":"Gaborit P., Otmani A.: Experimental constructions of self-dual codes. Finite Fields Appl. 9, 372\u2013394 (2003).","DOI":"10.1016\/S1071-5797(03)00011-X"},{"key":"9884_CR12","unstructured":"Harada M., Gulliver T.A., Kaneta H.: Classification of extremal double-circulant self-dual codes of length up to 62. Discret. Math. 188, 127\u2013136 (1998)."},{"key":"9884_CR13","doi-asserted-by":"crossref","unstructured":"Harada M., Munemasa A., Tanabe K.: Extremal self-dual [40,20,8] codes with covering radius 7. Finite Fields Appl. 10, 183\u2013197 (2004).","DOI":"10.1016\/j.ffa.2003.08.001"},{"key":"9884_CR14","unstructured":"Harada M., Kiermaier M., Wasserman A., Yorgova R.: New binary singly even self-dual codes. IEEE Trans. Inf. Theory 56(4), 1612\u20131617 (2010)."},{"key":"9884_CR15","doi-asserted-by":"crossref","unstructured":"Karadeniz S., Kaya A.: New extremal binary self-dual codes of length 58 as $$R3$$ R 3 -lifts from the shortened $$[8,4,4]$$ [ 8 , 4 , 4 ] binary Hamming code. J. Franklin Inst. 349(9), 2824\u20132833 (2012).","DOI":"10.1016\/j.jfranklin.2012.08.011"},{"key":"9884_CR16","unstructured":"Karadeniz S., Yildiz B.: Double-circulant and double-bordered-circulant constructions for self-dual codes over $$R_2$$ R 2 . Adv. Math. Commun. 6(2), 193\u2013202 (2012)."},{"key":"9884_CR17","unstructured":"Nishimura T.: A new extremal self-dual code of length 64. IEEE Trans. Inf. Theory 50(9), 2173\u20132174 (2004)."},{"key":"9884_CR18","unstructured":"Rains E.M.: Shadow bounds for self dual codes. IEEE Trans. Inf. Theory 44, 134\u2013139 (1998)."},{"key":"9884_CR19","unstructured":"Tsai H.P., Shih P.Y., Wuh R.Y., Su W.K., Chen C.H.: Construction of self-dual codes. IEEE Trans. Inf. Theory 54(8), 3826\u20133831 (2008)."},{"key":"9884_CR20","doi-asserted-by":"crossref","unstructured":"Wood J.: Duality for modules over finite rings and applications to coding theory. Am. J. Math. 121, 555\u2013575 (1999).","DOI":"10.1353\/ajm.1999.0024"},{"key":"9884_CR21","unstructured":"www.fatih.edu.tr\/~akaya\/NewSD64R3Hamm.txt . Accessed 22 Sep 2013."},{"key":"9884_CR22","doi-asserted-by":"crossref","unstructured":"Yildiz B., Karadeniz S.: Linear codes over $${\\mathbb{F}}_2+u{\\mathbb{F}}_2+v{\\mathbb{F}}_2+uv{\\mathbb{F}}_2$$ F 2 + u F 2 + v F 2 + u v F 2 . Des. Codes Cryptogr. 54(1), 61\u201381 (2010).","DOI":"10.1007\/s10623-009-9309-8"},{"key":"9884_CR23","unstructured":"Yildiz B., Karadeniz S.: Self-dual codes over $${\\mathbb{F}}_2+u{\\mathbb{F}}_2+v{\\mathbb{F}}_2+uv{\\mathbb{F}}_2$$ F 2 + u F 2 + v F 2 + u v F 2 . J. Franklin Inst. 347(10), 1888\u20131894 (2010)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9884-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-013-9884-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9884-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:37Z","timestamp":1559246317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-013-9884-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,4]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["9884"],"URL":"https:\/\/doi.org\/10.1007\/s10623-013-9884-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,4]]}}}