{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:21:57Z","timestamp":1740122517351,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T00:00:00Z","timestamp":1463097600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s10623-016-0218-3","type":"journal-article","created":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T05:57:36Z","timestamp":1463119056000},"page":"169-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the automorphism groups of the \n                $$Z_2 Z_4$$\n                \n                    \n                                    \n                        \n                            \n                                Z\n                                2\n                            \n                            \n                                Z\n                                4\n                            \n                        \n                    \n                \n            -linear 1-perfect and Preparata-like codes"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8516-755X","authenticated-orcid":false,"given":"Denis S.","family":"Krotov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,13]]},"reference":[{"key":"218_CR1","doi-asserted-by":"publisher","unstructured":"Baker R.D., van Lint J.H., Wilson R.M.: On the Preparata and Goethals codes. IEEE Trans. Inf. Theory 29(3), 342\u2013345 (1983). doi:\n                        10.1109\/TIT.1983.1056675\n                        \n                    .","DOI":"10.1109\/TIT.1983.1056675"},{"key":"218_CR2","doi-asserted-by":"publisher","unstructured":"Berlekamp E.R.: Coding theory and the Mathieu groups. Inf. Control 18(1), 40\u201364 (1971). doi:\n                        10.1016\/S0019-9958(71)90295-6\n                        \n                    .","DOI":"10.1016\/S0019-9958(71)90295-6"},{"key":"218_CR3","doi-asserted-by":"publisher","unstructured":"Bernal J.J., Borges J., Fern\u00e1ndez-C\u00f3rdoba C., Villanueva M.: Permutation decoding of \n                        $$Z_2Z_4$$\n                        \n                            \n                                            \n                                \n                                    \n                                        Z\n                                        2\n                                    \n                                    \n                                        Z\n                                        4\n                                    \n                                \n                            \n                        \n                    -linear codes. Des. Codes Cryptogr. 76(2), 269\u2013277 (2015). doi:\n                        10.1007\/s10623-014-9946-4\n                        \n                    .","DOI":"10.1007\/s10623-014-9946-4"},{"key":"218_CR4","doi-asserted-by":"publisher","unstructured":"Bierbrauer J.: Nordstrom-Robinson code and \n                        $$A_7$$\n                        \n                            \n                                            \n                                \n                                    A\n                                    7\n                                \n                            \n                        \n                    -geometry. Finite Fields Appl. 13(1), 158\u2013170 (2007). doi:\n                        10.1016\/j.ffa.2005.05.004\n                        \n                    .","DOI":"10.1016\/j.ffa.2005.05.004"},{"key":"218_CR5","doi-asserted-by":"publisher","unstructured":"Borges J., Rif\u00e1 J.: A characterization of 1-perfect additive codes. IEEE Trans. Inf. Theory 45(5), 1688\u20131697 (1999). doi:\n                        10.1109\/18.771247\n                        \n                    .","DOI":"10.1109\/18.771247"},{"key":"218_CR6","doi-asserted-by":"publisher","unstructured":"Borges J., Fern\u00e1ndez-C\u00f3rdoba C., Pujol J., Rif\u00e0 J., Villanueva M.: \n                        $${Z}_2{Z}_4$$\n                        \n                            \n                                            \n                                \n                                    \n                                        Z\n                                        2\n                                    \n                                    \n                                        Z\n                                        4\n                                    \n                                \n                            \n                        \n                    -linear codes: Generator matrices and duality. Des. Codes Cryptogr. 54(2), 167\u2013179 (2010). doi:\n                        10.1007\/s10623-009-9316-9\n                        \n                    .","DOI":"10.1007\/s10623-009-9316-9"},{"key":"218_CR7","doi-asserted-by":"publisher","unstructured":"Borges J., Phelps, K.T., Rif\u00e0 J.: The rank and kernel of extended \n                        $$1$$\n                        \n                            \n                                            \n                                \n                                    1\n                                \n                            \n                        \n                    -perfect \n                        $$Z_4$$\n                        \n                            \n                                            \n                                \n                                    Z\n                                    4\n                                \n                            \n                        \n                    -linear and additive non-\n                        $$Z_4$$\n                        \n                            \n                                            \n                                \n                                    Z\n                                    4\n                                \n                            \n                        \n                    -linear codes. IEEE Trans. Inf. Theory 49(8), 2028\u20132034 (2003). doi:\n                        10.1109\/TIT.2003.814490\n                        \n                    .","DOI":"10.1109\/TIT.2003.814490"},{"key":"218_CR8","doi-asserted-by":"publisher","unstructured":"Borges J., Phelps, K.T., Rif\u00e0 J., Zinoviev V.A.: On \n                        $$Z_4$$\n                        \n                            \n                                            \n                                \n                                    Z\n                                    4\n                                \n                            \n                        \n                    -linear Preparata-like and Kerdock-like codes. IEEE Trans. Inf. Theory 49(11), 3834\u20133843 (2003). doi:\n                        10.1109\/TIT.2003.819329\n                        \n                    .","DOI":"10.1109\/TIT.2003.819329"},{"key":"218_CR9","doi-asserted-by":"publisher","unstructured":"Calderbank A.R., Cameron P.J., Kantor W.M., Seidel J.J.: \n                        $$Z_4$$\n                        \n                            \n                                            \n                                \n                                    Z\n                                    4\n                                \n                            \n                        \n                    -Kerdock codes, orthogonal spreads, and extremal Euclidean line-sets. Proc. Lond. Math. Soc. 75(2), 436\u2013480 (1997). doi:\n                        10.1112\/S0024611597000403\n                        \n                    .","DOI":"10.1112\/S0024611597000403"},{"key":"218_CR10","unstructured":"Dumer I.I.: Some new uniformly packed codes. Proc. Moscow Inst. Physics and Technology. Ser. \u201cRadiotekhnika i Elektronika\u201d, pp. 72\u201378 (1976). (In Russian)."},{"key":"218_CR11","unstructured":"Gorkunov E.V.: The automorphism group of a \n                        $$q$$\n                        \n                            \n                                            \n                                q\n                            \n                        \n                    -ary Hamming code. Diskretn. Anal. Issled. Oper. 17(6), 50\u201366 (2010). (In Russian)."},{"key":"218_CR12","doi-asserted-by":"publisher","unstructured":"Hammons Jr., A.R., Kumar P.V., Calderbank A.R., Sloane N.J.A., Sol\u00e9 P.: The \n                        $$Z_4$$\n                        \n                            \n                                            \n                                \n                                    Z\n                                    4\n                                \n                            \n                        \n                    -linearity of Kerdock, Preparata, Goethals, and related codes. IEEE Trans. Inf. Theory 40(2), 301\u2013319 (1994). doi:\n                        10.1109\/18.312154\n                        \n                    .","DOI":"10.1109\/18.312154"},{"key":"218_CR13","doi-asserted-by":"publisher","unstructured":"Kantor W.M., Williams M.E.: Symplectic semifield planes and \n                        $$Z_4$$\n                        \n                            \n                                            \n                                \n                                    Z\n                                    4\n                                \n                            \n                        \n                    -linear codes. Trans. Am. Math. Soc. 356(3), 895\u2013938 (2004). doi:\n                        10.1090\/S0002-9947-03-03401-9\n                        \n                    .","DOI":"10.1090\/S0002-9947-03-03401-9"},{"key":"218_CR14","unstructured":"Krotov D.S.: \n                        $$Z_4$$\n                        \n                            \n                                            \n                                \n                                    Z\n                                    4\n                                \n                            \n                        \n                    -linear perfect codes. Diskretn. Anal. Issled. Oper., Ser. 1 7(4), 78\u201390 (2000). (In Russian)."},{"key":"218_CR15","unstructured":"Krotov D.S.: \n                        $$Z_4$$\n                        \n                            \n                                            \n                                \n                                    Z\n                                    4\n                                \n                            \n                        \n                    -linear perfect codes. E-print 0710.0198. \n                        arXiv:0710.0198\n                        \n                    . (English translation)."},{"key":"218_CR16","doi-asserted-by":"publisher","unstructured":"Krotov D.S., Villanueva M.: Classification of the \n                        $$Z_2Z_4$$\n                        \n                            \n                                            \n                                \n                                    \n                                        Z\n                                        2\n                                    \n                                    \n                                        Z\n                                        4\n                                    \n                                \n                            \n                        \n                    -linear Hadamard codes and their automorphism groups. IEEE Trans. Inf. Theory 61(2), 887\u2013894 (2015). doi:\n                        10.1109\/TIT.2014.2379644\n                        \n                    .","DOI":"10.1109\/TIT.2014.2379644"},{"key":"218_CR17","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North Holland, Amsterdam (1977)."},{"key":"218_CR18","doi-asserted-by":"publisher","unstructured":"Phelps K.T., Rif\u00e0 J., Villanueva M.: On the additive (\n                        $$Z_4$$\n                        \n                            \n                                            \n                                \n                                    Z\n                                    4\n                                \n                            \n                        \n                    -linear and non-\n                        $$Z_4$$\n                        \n                            \n                                            \n                                \n                                    Z\n                                    4\n                                \n                            \n                        \n                    -linear) Hadamard codes: Rank and kernel. IEEE Trans. Inf. Theory 52(1), 316\u2013319 (2006). doi:\n                        10.1109\/TIT.2005.860464\n                        \n                    .","DOI":"10.1109\/TIT.2005.860464"},{"key":"218_CR19","doi-asserted-by":"publisher","unstructured":"Preparata F.P.: A class of optimum nonlinear double-error correcting codes. Inf. Control 13(4), 378\u2013400 (1968). doi:\n                        10.1016\/S0019-9958(68)90874-7\n                        \n                    .","DOI":"10.1016\/S0019-9958(68)90874-7"},{"key":"218_CR20","doi-asserted-by":"publisher","unstructured":"van Dam E.R., Fon-Der-Flaass D.: Uniformly packed codes and more distance regular graphs from crooked functions. J. Algebra Comb. 12(2), 115\u2013121 (2000). doi:\n                        10.1023\/A:1026583725202\n                        \n                    .","DOI":"10.1023\/A:1026583725202"},{"key":"218_CR21","unstructured":"Zaitsev G.V., Zinoviev V.A., Semakov N.V.: Interrelation of Preparata and Hamming codes and extension of Hamming codes to new double-error-correcting codes. In: P.N. Petrov, F. Csaki (eds.) Proc. 2nd Int. Symp. Information Theory, Tsahkadsor, Armenia, USSR, 1971, pp. 257\u2013264. Akademiai Kiado, Budapest (1973)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0218-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0218-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0218-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0218-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:42Z","timestamp":1559231922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0218-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,13]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["218"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0218-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2016,5,13]]}}}