{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:14:43Z","timestamp":1761059683638},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,3,4]],"date-time":"2014-03-04T00:00:00Z","timestamp":1393891200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s10623-014-9946-4","type":"journal-article","created":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T19:21:26Z","timestamp":1393874486000},"page":"269-277","source":"Crossref","is-referenced-by-count":16,"title":["Permutation decoding of $${\\mathbb {Z}}_2{\\mathbb {Z}}_4$$ Z 2 Z 4 -linear codes"],"prefix":"10.1007","volume":"76","author":[{"given":"Jos\u00e9 Joaqu\u00edn","family":"Bernal","sequence":"first","affiliation":[]},{"given":"Joaquim","family":"Borges","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Fern\u00e1ndez-C\u00f3rdoba","sequence":"additional","affiliation":[]},{"given":"Merc\u00e8","family":"Villanueva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,4]]},"reference":[{"key":"9946_CR1","doi-asserted-by":"crossref","unstructured":"Assmus E.F., Key J.D.: Designs and Their Codes. Cambridge University Press, Cambridge (1992).","DOI":"10.1017\/CBO9781316529836"},{"key":"9946_CR2","doi-asserted-by":"crossref","unstructured":"Borges J., Phelps K.T., Rif\u00e0 J.: The rank and kernel of extended 1-perfect $$\\mathbb{Z}_4$$ Z 4 -linear and additive non- $$\\mathbb{Z}_4$$ Z 4 -linear codes. IEEE Trans. Inf. Theory 49(8), 2028\u20132034 (2003).","DOI":"10.1109\/TIT.2003.814490"},{"key":"9946_CR3","doi-asserted-by":"crossref","unstructured":"Borges J., Fern\u00e1ndez-C\u00f3rdoba C., Pujol J., Rif\u00e0 J., Villanueva M.: $$\\mathbb{Z}_2\\mathbb{Z}_4$$ Z 2 Z 4 -linear codes: generator matrices and duality. Des. Codes Cryptogr. 54, 167\u2013179 (2010).","DOI":"10.1007\/s10623-009-9316-9"},{"key":"9946_CR4","unstructured":"Cannon J.J., Bosma W.: Handbook of Magma Functions, 2.13th edn. North-Holland, Amsterdam (2006)."},{"key":"9946_CR5","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-C\u00f3rdoba C., Pujol J., Villanueva M.: $$\\mathbb{Z}_2\\mathbb{Z}_4$$ Z 2 Z 4 -linear codes: rank and kernel. Des. Codes Cryptogr. 56, 43\u201359 (2010).","DOI":"10.1007\/s10623-009-9340-9"},{"key":"9946_CR6","doi-asserted-by":"crossref","unstructured":"Fish W., Key J.D., Mwambene, E.: Partial permutation decoding for simplex codes. Adv. Math. Commun. 6(4), 505\u2013516 (2012).","DOI":"10.3934\/amc.2012.6.505"},{"key":"9946_CR7","doi-asserted-by":"crossref","unstructured":"Krotov D.S.: $$\\mathbb{Z}_4$$ Z 4 -linear Hadamard and extended perfect codes. Electron. Notes Discret. Math. 6, 107\u2013112 (2001).","DOI":"10.1016\/S1571-0653(04)00161-1"},{"key":"9946_CR8","doi-asserted-by":"crossref","unstructured":"MacWilliams F.J.: Permutation decoding of systematic codes. Bell Syst. Tech. J. 43, 485\u2013505 (1964).","DOI":"10.1002\/j.1538-7305.1964.tb04075.x"},{"key":"9946_CR9","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)."},{"key":"9946_CR10","doi-asserted-by":"crossref","unstructured":"Pernas J., Pujol J., Villanueva M.: Characterization of the automorphism group of quaternary linear Hadamard codes. Des. Codes Cryptogr. 70, 105\u2013115 (2014).","DOI":"10.1007\/s10623-012-9678-2"},{"key":"9946_CR11","doi-asserted-by":"crossref","unstructured":"Prange E.: The use of information sets in decoding cyclic codes. IEEE Trans. Inf. Theory 8(5), S5\u2013S9 (1962).","DOI":"10.1109\/TIT.1962.1057777"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9946-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-014-9946-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9946-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:38Z","timestamp":1559231918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-014-9946-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,4]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["9946"],"URL":"https:\/\/doi.org\/10.1007\/s10623-014-9946-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,4]]}}}