{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T18:12:42Z","timestamp":1758478362855},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s10623-014-9943-7","type":"journal-article","created":{"date-parts":[[2014,2,28]],"date-time":"2014-02-28T15:24:33Z","timestamp":1393601073000},"page":"217-235","source":"Crossref","is-referenced-by-count":4,"title":["Theta functions and symmetric weight enumerators for codes over imaginary quadratic fields"],"prefix":"10.1007","volume":"76","author":[{"given":"T.","family":"Shaska","sequence":"first","affiliation":[]},{"given":"C.","family":"Shor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,1]]},"reference":[{"key":"9943_CR1","doi-asserted-by":"crossref","unstructured":"Bachoc C.: Applications of coding theory to the construction of modular lattices. J. Comb. Theory Ser. A 78(1), 92\u2013119 (1997).","DOI":"10.1006\/jcta.1996.2763"},{"key":"9943_CR2","doi-asserted-by":"crossref","unstructured":"Chua K.S.: Codes over $$\\rm {GF}(4)$$ GF ( 4 ) and F $$_2\\times $$ 2 \u00d7 F $$_2$$ 2 and Hermitian lattices over imaginary quadratic fields. Proc. Am. Math. Soc. 133(3), 661\u2013670 (2005).","DOI":"10.1090\/S0002-9939-04-07724-X"},{"key":"9943_CR3","unstructured":"Dougherty S., Kim J.-L., Lee Y.: Linear codes, hermitian lattices, and finite rings (in press)."},{"key":"9943_CR4","unstructured":"G\u00fcnther A., Nebe G.: Clifford\u2013Weil groups for finite group rings, some examples. Alban. J. Math. 2(3), 185\u2013198 (2008)."},{"key":"9943_CR5","unstructured":"G\u00fcnther A., Nebe G., Rains E.M.: Clifford\u2013Weil groups of quotient representations. Alban. J. Math. 2(3), 159\u2013169 (2008)."},{"key":"9943_CR6","doi-asserted-by":"crossref","unstructured":"Leech J., Sloane N.J.A.: Sphere packing and error-correcting codes. Can. J. Math. 23, 718\u2013745 (1971).","DOI":"10.4153\/CJM-1971-081-3"},{"key":"9943_CR7","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. II. North-Holland Mathematical Library, vol. 16, pp. 1\u201310, 370\u2013762. North-Holland, Amsterdam (1977)."},{"key":"9943_CR8","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. I. North-Holland Mathematical Library, vol. 16, pp. 1\u201315, 1\u2013369. North-Holland, Amsterdam (1977)."},{"key":"9943_CR9","doi-asserted-by":"crossref","unstructured":"Shaska T., Shor C.: Codes over $$F_{p^2}$$ F p 2 and $$F_p \\times F_p$$ F p \u00d7 F p , lattices, and corresponding theta functions. Adv. Coding Theory Cryptol. 3, 70\u201380 (2007).","DOI":"10.1142\/9789812772022_0005"},{"key":"9943_CR10","doi-asserted-by":"crossref","unstructured":"Shaska T., Wijesiri S.: Codes over rings of size four, Hermitian lattices, and corresponding theta functions. Proc. Am. Math. Soc. 136, 849\u2013960 (2008).","DOI":"10.1090\/S0002-9939-07-09152-6"},{"key":"9943_CR11","doi-asserted-by":"crossref","unstructured":"Shaska T., Shor C., Wijesiri S.: Codes over rings of size $$p^2$$ p 2 and lattices over imaginary quadratic fields. Finite Fields Appl. 16(2), 75\u201387 (2010).","DOI":"10.1016\/j.ffa.2010.01.005"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9943-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-014-9943-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9943-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:38Z","timestamp":1559246318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-014-9943-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,1]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["9943"],"URL":"https:\/\/doi.org\/10.1007\/s10623-014-9943-7","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,1]]}}}