{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:56:51Z","timestamp":1767992211092,"version":"3.49.0"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,7,29]],"date-time":"2015-07-29T00:00:00Z","timestamp":1438128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10623-015-0118-y","type":"journal-article","created":{"date-parts":[[2015,7,28]],"date-time":"2015-07-28T11:02:12Z","timestamp":1438081332000},"page":"561-576","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["On the lifted Zetterberg code"],"prefix":"10.1007","volume":"80","author":[{"given":"Adel","family":"Alahmadi","sequence":"first","affiliation":[]},{"given":"Hussain","family":"Alhazmi","sequence":"additional","affiliation":[]},{"given":"Tor","family":"Helleseth","sequence":"additional","affiliation":[]},{"given":"Rola","family":"Hijazi","sequence":"additional","affiliation":[]},{"given":"Najat","family":"Muthana","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Sol\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,29]]},"reference":[{"key":"118_CR1","unstructured":"Bierbrauer J.: Introduction to Coding Theory. Chapman and Hall, Boca Raton (2004)."},{"key":"118_CR2","unstructured":"Bierbrauer J., Edel Y.: Construction of digital nets from BCH codes. Springer LNS 127, 221\u2013231 (1997)."},{"key":"118_CR3","doi-asserted-by":"crossref","unstructured":"Chen C.L.: Formulas for the solutions of quadratic equations over $$GF(2^m)$$ G F ( 2 m ) . IEEE Trans. Inf. Theory 28, 792\u2013794 (1982).","DOI":"10.1109\/TIT.1982.1056557"},{"key":"118_CR4","doi-asserted-by":"crossref","unstructured":"Chien R.T.: Cyclic decoding procedures for Bose\u2013Chaudhuri\u2013Hocquenghem codes. IEEE Trans. Inf. Theory 10, 357\u2013363 (1964).","DOI":"10.1109\/TIT.1964.1053699"},{"key":"118_CR5","doi-asserted-by":"crossref","unstructured":"Dodunekov S.M., Nilson J.M.E.: Algebraic decoding of the Zetterberg code. IEEE Trans. Inf. Theory 38, 1570\u20131573 (1992).","DOI":"10.1109\/18.149509"},{"key":"118_CR6","unstructured":"Grassl M.: Codetables, www.codetables.de ."},{"key":"118_CR7","doi-asserted-by":"crossref","unstructured":"Hammons Jr. R., Kumar P.V., Calderbank R., Sloane N., Sol\u00e9 P.: The Z4-linearity of Kerdock, Preparata, Goethals and related codes. IEEE Trans. Inf. Theory 40, 301\u2013319 (1994).","DOI":"10.1109\/18.312154"},{"key":"118_CR8","doi-asserted-by":"crossref","unstructured":"Helleseth T., Kumar P.V.: The algebraic decoding of the Z4-linear Goethals code. IEEE Trans. Inf. Theory 41, 2040\u20132048 (1995).","DOI":"10.1109\/18.476333"},{"key":"118_CR9","doi-asserted-by":"crossref","unstructured":"Honold T., Landjev I.: On maximal arcs in projective Hjelmselv planes over chain rings of even charcteristic. Finite Fields Appl. 11, 292\u2013304 (2005).","DOI":"10.1016\/j.ffa.2004.12.004"},{"key":"118_CR10","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North Holland, Amsterdam (1977)."},{"key":"118_CR11","doi-asserted-by":"crossref","unstructured":"Nechaev A.: The Kerdock code in a cyclic form. Discret. Math. Appl. 1, 365\u2013384 (1991).","DOI":"10.1515\/dma.1991.1.4.365"},{"key":"118_CR12","doi-asserted-by":"crossref","unstructured":"Williams K.S.: Note on Cubics Over $$GF(2^n)$$ G F ( 2 n ) . J. Number Theory 7, 361\u2013365 (1975).","DOI":"10.1016\/0022-314X(75)90038-4"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0118-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-015-0118-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0118-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:40Z","timestamp":1559231920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-015-0118-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,29]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["118"],"URL":"https:\/\/doi.org\/10.1007\/s10623-015-0118-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,29]]}}}