{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T20:21:28Z","timestamp":1649103688482},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,5,6]],"date-time":"2014-05-06T00:00:00Z","timestamp":1399334400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s10623-014-9974-0","type":"journal-article","created":{"date-parts":[[2014,5,5]],"date-time":"2014-05-05T21:14:12Z","timestamp":1399324452000},"page":"519-535","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Codes over rings and Hermitian lattices"],"prefix":"10.1007","volume":"76","author":[{"given":"Steven","family":"Dougherty","sequence":"first","affiliation":[]},{"given":"Jon-Lark","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Yoonjin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,6]]},"reference":[{"key":"9974_CR1","doi-asserted-by":"crossref","unstructured":"Bachoc C.: Applications of coding theory to the construction of modular lattices. J. Comb. Theory A 78, 92\u2013119 (1997).","DOI":"10.1006\/jcta.1996.2763"},{"key":"9974_CR2","doi-asserted-by":"crossref","unstructured":"Chua K.S.: Codes over GF(4) and $$F_2\\times F_2$$ F 2 \u00d7 F 2 and hermitian lattices over imaginary quadratic fields. Proc. Am. Math. Soc. 133(3), 661\u2013670 (2004).","DOI":"10.1090\/S0002-9939-04-07724-X"},{"key":"9974_CR3","doi-asserted-by":"crossref","unstructured":"Conway J., Sloane N.J.A.: Sphere Packings, Lattices and Groups, 3rd edn. Springer, New York (1999).","DOI":"10.1007\/978-1-4757-6568-7"},{"key":"9974_CR4","doi-asserted-by":"crossref","unstructured":"Dougherty S.T., Gulliver T.A., Harada M.: Type II self-dual codes over finite rings and even unimodular lattices. J. Algebr. Comb. 9(3), 233\u2013250 (1999).","DOI":"10.1023\/A:1018696102510"},{"key":"9974_CR5","doi-asserted-by":"crossref","unstructured":"Dougherty S.T., Kim J.-L., Kulosman H., Liu H.: Self-dual codes over Frobenius rings. Finite Fields Appl. 16, 14\u201326 (2010).","DOI":"10.1016\/j.ffa.2009.11.004"},{"key":"9974_CR6","doi-asserted-by":"crossref","unstructured":"Dougherty S.T., Kim J.-L., Liu H.: Constructions of self-dual codes over finite commutative chain rings. Int. J. Inf. Coding Theory 1(2), 171\u2013190 (2010).","DOI":"10.1504\/IJICOT.2010.032133"},{"key":"9974_CR7","doi-asserted-by":"crossref","unstructured":"Shaska T., Shor C.: Codes over $$F_{p^2}$$ F p 2 and $$F_p \\times F_p$$ F p \u00d7 F p , lattices, and theta functions. Adv. Coding Theory Cryptogr. 3, 70\u201380 (2007).","DOI":"10.1142\/9789812772022_0005"},{"key":"9974_CR8","doi-asserted-by":"crossref","unstructured":"Shaska T., Wijesiri S.: Codes over rings of size four, hermitian lattices and corresponding theta functions. Proc. Am. Math. Soc. 136(3), 849\u2013857 (2008).","DOI":"10.1090\/S0002-9939-07-09152-6"},{"key":"9974_CR9","doi-asserted-by":"crossref","unstructured":"Shaska T., Shor C., Wijesiri S.: Codes over rings of size $$p^2$$ p 2 and lattices over imaginary quadratic fields. Finite Fields Appl. 16(2), 75\u201387 (2010).","DOI":"10.1016\/j.ffa.2010.01.005"},{"key":"9974_CR10","doi-asserted-by":"crossref","unstructured":"Sol\u00e9 P., Zinoviev D.: Inverse pseudorandom numbers over Galois rings. Eur. J. Comb. 30, 458\u2013467 (2009).","DOI":"10.1016\/j.ejc.2008.04.004"},{"key":"9974_CR11","doi-asserted-by":"crossref","unstructured":"Wan Z.-X.: Lectures on Finite Fields and Galois Rings. World Scientific, Singapore (2003).","DOI":"10.1142\/5350"},{"key":"9974_CR12","doi-asserted-by":"crossref","unstructured":"Wood J.: Duality for modules over finite rings and applications to coding theory. Am. J. Math. 121, 555\u2013575 (1999).","DOI":"10.1353\/ajm.1999.0024"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9974-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-014-9974-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9974-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:39Z","timestamp":1559246319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-014-9974-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,6]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["9974"],"URL":"https:\/\/doi.org\/10.1007\/s10623-014-9974-0","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,6]]}}}