{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:29:28Z","timestamp":1761060568561,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T00:00:00Z","timestamp":1524614400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10623-018-0485-2","type":"journal-article","created":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T02:53:10Z","timestamp":1524624790000},"page":"67-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Phased unitary Golay pairs, Butson Hadamard matrices and a conjecture of Ito\u2019s"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6010-116X","authenticated-orcid":false,"given":"Ronan","family":"Egan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"485_CR1","unstructured":"Arasu K.T.: Sequences and arrays with desirable correlation properties. In: Crnkovi\u0107 D., Tonchev V. (eds.) Information security, coding theory and related combinatorics, NATO Sci. Peace Secur. Ser. D Inf. Commun. Secur., 29, IOS, pp. 136\u2013171. Amsterdam, (2011)."},{"key":"485_CR2","unstructured":"Balonin,N.\u00a0A., \u0110okovi\u0107 D.\u00a0\u017d.: Negaperiodic Golay Pairs and Hadamard Matrices, \n                    arxiv:1508.00640\n                    \n                  , (2015)."},{"key":"485_CR3","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma W., Cannon J., Playoust C.: The Magma algebra system. I. The user language. J. Symb. Comput. 24, 235\u2013265 (1997).","journal-title":"J. Symb. Comput."},{"key":"485_CR4","unstructured":"Bruzda W., Tadej W., \u017byczkowski K.: \n                    http:\/\/chaos.if.uj.edu.pl\/~karol\/hadamard\/\n                    \n                  ."},{"key":"485_CR5","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1090\/S0002-9939-1962-0142557-0","volume":"13","author":"AT Butson","year":"1962","unstructured":"Butson A.T.: Generalized Hadamard matrices. Proc. Am. Math. Soc. 13, 894\u2013898 (1962).","journal-title":"Proc. Am. Math. Soc."},{"key":"485_CR6","unstructured":"Craigen R.: Constructions for orthogonal matrices, PhD thesis, University of Waterloo, March (1991)."},{"key":"485_CR7","first-page":"161","volume":"15","author":"R Craigen","year":"1994","unstructured":"Craigen R.: Complex Golay sequences. J. Combin. Math. Combin. Comput. 15, 161\u2013169 (1994).","journal-title":"J. Combin. Math. Combin. Comput."},{"key":"485_CR8","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/S0012-365X(01)00162-5","volume":"252","author":"R Craigen","year":"2002","unstructured":"Craigen R., Holzmann W., Kharaghani H.: Complex Golay sequences: structure and applications. Discret. Math. 252, 73\u201389 (2002).","journal-title":"Discret. Math."},{"key":"485_CR9","unstructured":"Davis J.\u00a0A., Jedwab J.: Peak-to-Mean Power Control in OFDM, Golay Complementary Sequences and Reed-Muller codes, Techical Report HPL-97-158, HP Laboratories Bristol (1997)."},{"key":"485_CR10","unstructured":"\u0110okovi\u0107 D.\u017d.: Good matrices of order 33, 35 and 127 exist. J. Combin. Math. Combin. Comput. 14, 145\u2013152 (1993)."},{"key":"485_CR11","unstructured":"\u0110okovi\u0107 D.\u017d., Kotsireas I.S.: Periodic Golay pairs of length 72. In: Colbourn C. (ed.) Algebraic Design Theory and Hadamard Matrices, vol. 133, pp. 83\u201392. Springer, NewYork (2015)."},{"issue":"3","key":"485_CR12","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s10623-016-0320-6","volume":"85","author":"R Egan","year":"2017","unstructured":"Egan R.: On equivalence of negaperiodic Golay pairs. Des. Codes Cryptogr. 85(3), 523\u2013532 (2017).","journal-title":"Des. Codes Cryptogr."},{"key":"485_CR13","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-17729-8_8","volume-title":"Algebraic Design Theory and Hadamard Matrices","author":"R Egan","year":"2015","unstructured":"Egan R., Flannery D.L., Cath\u00e1in P.\u00d3.: Classifying cocyclic Butson Hadamard matrices. In: Colbourn C. (ed.) Algebraic Design Theory and Hadamard Matrices, vol. 133, pp. 93\u2013106. Springer, NewYork (2015)."},{"key":"485_CR14","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/TIT.1980.1056272","volume":"26","author":"RL Frank","year":"1980","unstructured":"Frank R.L.: Polyphase complementary codes. IEEE Trans. Inf. Theory IT 26, 641\u2013647 (1980).","journal-title":"IEEE Trans. Inf. Theory IT"},{"key":"485_CR15","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1364\/JOSA.39.000437","volume":"39","author":"MJE Golay","year":"1949","unstructured":"Golay M.J.E.: Multislit spectrometry. J. Opt. Soc. Am. 39, 437\u2013444 (1949).","journal-title":"J. Opt. Soc. Am."},{"key":"485_CR16","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1006\/jabr.2000.8545","volume":"234","author":"N Ito","year":"2000","unstructured":"Ito N.: On Hadamard groups IV. J. Algebra 234, 651\u2013663 (2000).","journal-title":"J. Algebra"},{"key":"485_CR17","first-page":"139","volume":"18","author":"F Kamali","year":"1998","unstructured":"Kamali F., Kharaghani H.: Dihedral Golay sequences. Aust. J. Combin. 18, 139\u2013145 (1998).","journal-title":"Aust. J. Combin."},{"issue":"1","key":"485_CR18","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1504\/IJICOT.2009.024045","volume":"1","author":"SL Ma","year":"2009","unstructured":"Ma S.L., Ng W.S.: On non-existence of perfect and nearly perfect sequences. Int. J. Inf. Coding Theory 1(1), 15\u201338 (2009).","journal-title":"Int. J. Inf. Coding Theory"},{"issue":"1","key":"485_CR19","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/18.817512","volume":"46","author":"KG Paterson","year":"2000","unstructured":"Paterson K.G.: Generalized Reed-Muller codes and power control in OFDM modulation. IEEE Trans. Inf. Theory 46(1), 104\u2013120 (2000).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"485_CR20","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1023\/A:1008398319853","volume":"17","author":"B Schmidt","year":"1999","unstructured":"Schmidt B.: Williamson matrices and a conjecture of Ito\u2019s. Des. Codes Cryptogr. 17, 61\u201368 (1999).","journal-title":"Des. Codes Cryptogr."},{"key":"485_CR21","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TIT.1978.1055936","volume":"24","author":"R Sivaswamy","year":"1978","unstructured":"Sivaswamy R.: Multiphase complementary codes. IEEE Trans. Inf. Theory IT 24, 564\u2013572 (1978).","journal-title":"IEEE Trans. Inf. Theory IT"},{"issue":"2","key":"485_CR22","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11080-006-8220-2","volume":"13","author":"W Tadej","year":"2006","unstructured":"Tadej W., \u017byczkowski K.: A concise guide to complex Hadamard matrices. Open Syst. Inf. Dyn. 13(2), 133\u2013177 (2006).","journal-title":"Open Syst. Inf. Dyn."},{"key":"485_CR23","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/0097-3165(74)90056-9","volume":"16","author":"RJ Turyn","year":"1974","unstructured":"Turyn R.J.: Hadamard matrices, Baumert-Hall units, four-symbol sequences, pulse compression, and surface wave encodings. J. Combin. Theory A 16, 313\u2013333 (1974).","journal-title":"J. Combin. Theory A"},{"key":"485_CR24","doi-asserted-by":"publisher","first-page":"7081","DOI":"10.1088\/0305-4470\/34\/35\/332","volume":"34","author":"RF Werner","year":"2001","unstructured":"Werner R.F.: All teleportation and dense coding schemes. J. Phys. A 34, 7081\u20137094 (2001).","journal-title":"J. Phys. A"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0485-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0485-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0485-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T19:24:46Z","timestamp":1556133886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0485-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,25]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["485"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0485-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2018,4,25]]},"assertion":[{"value":"4 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}