{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:32Z","timestamp":1740122552288,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T00:00:00Z","timestamp":1469577600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","award":["NRF-2013R1A1A2005172"],"award-info":[{"award-number":["NRF-2013R1A1A2005172"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10623-016-0253-0","type":"journal-article","created":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T06:53:06Z","timestamp":1469602386000},"page":"589-609","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A projection decoding of a binary extremal self-dual code of length 40"],"prefix":"10.1007","volume":"83","author":[{"given":"Jon-Lark","family":"Kim","sequence":"first","affiliation":[]},{"given":"Nari","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,27]]},"reference":[{"key":"253_CR1","doi-asserted-by":"crossref","unstructured":"Aguilar-Melchor C., Gaborit P., Kim J.-L., Sok L., Sol\u00e9 P.: Classification of extremal and $$s$$ s -extremal binary self-dual codes of length $$38$$ 38 . IEEE Trans. Inf. Theory 58(4), 2253\u20132262 (2012).","DOI":"10.1109\/TIT.2011.2177809"},{"key":"253_CR2","unstructured":"Bachoc C., Gaborit P.: On extremal additive GF $$(4)$$ ( 4 ) -codes of lengths $$10$$ 10 to $$18$$ 18 . J. Th\u00e9or. Nombres Bordx. 12, 225\u2013272 (2000)."},{"key":"253_CR3","doi-asserted-by":"crossref","unstructured":"Betsumiya K., Harada M., Munemasa A.: A complete classification of doubly even self-dual codes of length 40. Electron. J. Comb. 19(3), #P18 (2012).","DOI":"10.37236\/2593"},{"key":"253_CR4","doi-asserted-by":"crossref","unstructured":"Bouyuklieva S., Bouyukliev I., Harada M.: Some extremal self-dual codes and unimodular lattices in dimension 40. Finite Fields Appl. 21, 67\u201383 (2013).","DOI":"10.1016\/j.ffa.2013.01.009"},{"key":"253_CR5","doi-asserted-by":"crossref","unstructured":"Buyuklieva S., Yorgov V.: Singly-even self-dual codes of length 40. Des. Codes Cryptogr. 9, 131\u2013141 (1996).","DOI":"10.1007\/BF00124589"},{"key":"253_CR6","doi-asserted-by":"crossref","unstructured":"Calderbank A.R., Rains E.M., Shor P.W., Sloane N.J.A.: Quantum error correction via codes over GF(4). IEEE Trans. Inf. Theory 44, 1369\u20131387 (1998).","DOI":"10.1109\/18.681315"},{"key":"253_CR7","doi-asserted-by":"crossref","unstructured":"Conway J.H., Sloane N.J.A.: A new upper bound on the minimal distance of self-dual code. IEEE Trans. Inf. Theory 36, 1319\u20131333 (1990).","DOI":"10.1109\/18.59931"},{"key":"253_CR8","doi-asserted-by":"crossref","unstructured":"Danielsen L.E., Parker M.G.: On the classification of all self-dual additive codes over GF(4) of length up to 12. J. Comb. Theory Ser. A 113(7), 1351\u20131367 (2006).","DOI":"10.1016\/j.jcta.2005.12.004"},{"key":"253_CR9","unstructured":"Gaborit P., Huffman W.C., Kim J.-L., Pless V.: On the classification of extremal additive codes over $$GF(4)$$ G F ( 4 ) . In: Proceedings of the 37th Allerton Conference on Communication, Control, and Computing, UIUC, pp. 535\u2013544 (1999)."},{"key":"253_CR10","unstructured":"Gaborit P., Huffman W.C., Kim J.-L., Pless V.: On additive $$GF(4)$$ G F ( 4 ) codes. In: Barg, A., Litsyn, S. (eds.) Proceedings of the DIMACS Workshop on Codes and Association Schemes. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 56, pp. 135\u2013149. American Mathematical Society, Providence (2001)."},{"key":"253_CR11","doi-asserted-by":"crossref","unstructured":"Gaborit P., Kim J.-L., Pless V.: Decoding binary $$R(2,5)$$ R ( 2 , 5 ) by hand. Discret. Math. 264, 55\u201373 (2003).","DOI":"10.1016\/S0012-365X(02)00550-2"},{"key":"253_CR12","doi-asserted-by":"crossref","unstructured":"Harada M., Munemasa A.: Some restrictions on weight enumerators of singly even self-dual codes. IEEE Trans. Inf. Theory 52, 1266\u20131269 (2006).","DOI":"10.1109\/TIT.2005.864416"},{"key":"253_CR13","doi-asserted-by":"crossref","unstructured":"H\u00f6hn G.: Self-dual codes over the Kleinian four group. Math. Ann. 327, 227\u2013255 (2003).","DOI":"10.1007\/s00208-003-0440-y"},{"key":"253_CR14","doi-asserted-by":"crossref","unstructured":"Huffman W.C.: On the classification and enumeration of self-dual codes. Finite Fields Appl. 11, 451\u2013490 (2005).","DOI":"10.1016\/j.ffa.2005.05.012"},{"key":"253_CR15","doi-asserted-by":"crossref","unstructured":"Huffman W.C., Pless V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003).","DOI":"10.1017\/CBO9780511807077"},{"key":"253_CR16","doi-asserted-by":"crossref","unstructured":"Joyner D., Kim J.-L.: Selected Unsolved Problems in Coding Theory. Birkh\u00e4user, Boston (2011).","DOI":"10.1007\/978-0-8176-8256-9"},{"key":"253_CR17","doi-asserted-by":"crossref","unstructured":"Kim J.-L., Mellinger K.E., Pless V.: Projections of binary linear codes onto larger fields. SIAM J. Discret. Math. 16(4), 591\u2013603 (2003).","DOI":"10.1137\/S0895480102404367"},{"key":"253_CR18","doi-asserted-by":"crossref","unstructured":"MacWilliams F.J., Odlyzko A.M., Sloane N.J.A.: Self-dual codes over $$GF(4)$$ G F ( 4 ) . J. Comb. Theory, Ser. A 25, 288\u2013318 (1978).","DOI":"10.1016\/0097-3165(78)90021-3"},{"key":"253_CR19","doi-asserted-by":"crossref","unstructured":"Pless V.: A classification of self-orthogonal codes over GF(2). Discret. Math. 3, 209\u2013246 (1972).","DOI":"10.1016\/0012-365X(72)90034-9"},{"key":"253_CR20","doi-asserted-by":"crossref","unstructured":"Pless V.: Decoding the Golay codes. IEEE Trans. Inf. Theory 32, 561\u2013567 (1986).","DOI":"10.1109\/TIT.1986.1057197"},{"key":"253_CR21","unstructured":"Rains E.M., Sloane N.J.A.: Self-dual codes. In: Pless, V.S., Huffman, W.C. (eds.) Handbook of Coding Theory, pp. 177\u2013294. Elsevier, Amsterdam (1998)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0253-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0253-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0253-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0253-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T10:31:09Z","timestamp":1600943469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0253-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,27]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["253"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0253-0","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2016,7,27]]}}}