{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:41:31Z","timestamp":1775054491133,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T00:00:00Z","timestamp":1536537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007136","name":"Secretar\u00eda de Estado de Investigaci\u00f3n, Desarrollo e Innovaci\u00f3n","doi-asserted-by":"publisher","award":["TIN2016- 77918-P"],"award-info":[{"award-number":["TIN2016- 77918-P"]}],"id":[{"id":"10.13039\/501100007136","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007136","name":"Secretar\u00eda de Estado de Investigaci\u00f3n, Desarrollo e Innovaci\u00f3n","doi-asserted-by":"publisher","award":["MTM2015-69138-REDT"],"award-info":[{"award-number":["MTM2015-69138-REDT"]}],"id":[{"id":"10.13039\/501100007136","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10623-018-0546-6","type":"journal-article","created":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T00:29:40Z","timestamp":1536539380000},"page":"417-435","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["On \n                \n                  \n                \n                $$\\mathbb {Z}_{2^s}$$\n                \n                  \n                    \n                      Z\n                      \n                        2\n                        s\n                      \n                    \n                  \n                \n              -linear Hadamard codes: kernel and partial classification"],"prefix":"10.1007","volume":"87","author":[{"given":"Cristina","family":"Fern\u00e1ndez-C\u00f3rdoba","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3362-8817","authenticated-orcid":false,"given":"Carlos","family":"Vela","sequence":"additional","affiliation":[]},{"given":"Merc\u00e8","family":"Villanueva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,10]]},"reference":[{"key":"546_CR1","doi-asserted-by":"crossref","unstructured":"Assmus E.F., Jr., Key J.D.: Designs and Their Codes. Cambridge University Press, Great Britain (1992).","DOI":"10.1017\/CBO9781316529836"},{"issue":"1","key":"546_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/BF02579339","volume":"3","author":"H Bauer","year":"1983","unstructured":"Bauer H., Ganter B., Hergert F.: Algebraic techniques for nonlinear codes. Combinatorica 3(1), 21\u201333 (1983).","journal-title":"Combinatorica"},{"key":"546_CR3","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0019-9958(75)80001-5","volume":"29","author":"IF Blake","year":"1975","unstructured":"Blake I.F.: Codes over integer residue rings. Inf. Control 29, 295\u2013300 (1975).","journal-title":"Inf. Control"},{"key":"546_CR4","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/S1571-0653(04)00352-X","volume":"10","author":"J Borges","year":"2001","unstructured":"Borges J., Fern\u00e1ndez C., Rif\u00e0 J.: Every \n                    \n                      \n                    \n                    $$\\mathbb{Z}_{2k}$$\n                    \n                      \n                        \n                          Z\n                          \n                            2\n                            k\n                          \n                        \n                      \n                    \n                  -code is a binary propelinear code. Electron. Notes Discret. Math. 10, 100\u2013102 (2001).","journal-title":"Electron. Notes Discret. Math."},{"issue":"2","key":"546_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10623-009-9316-9","volume":"54","author":"J Borges","year":"2010","unstructured":"Borges J., Fern\u00e1ndez-C\u00f3rdoba C., Pujol J., Rif\u00e0 J., Villanueva M.: \n                    \n                      \n                    \n                    $$\\mathbb{Z}_2\\mathbb{Z}_4$$\n                    \n                      \n                        \n                          \n                            Z\n                            2\n                          \n                          \n                            Z\n                            4\n                          \n                        \n                      \n                    \n                  -linear codes: generator matrices and duality. Des. Codes Cryptogr. 54(2), 167\u2013179 (2010).","journal-title":"Des. Codes Cryptogr."},{"key":"546_CR6","unstructured":"Bosma W., Cannon, J.J., Fieker, C., Steel, A.: Handbook of Magma functions, Edn 2.22 (2016). \n                    http:\/\/magma.maths.usyd.edu.au\/magma\/\n                    \n                  ."},{"issue":"4","key":"546_CR7","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1109\/18.681328","volume":"44","author":"C Carlet","year":"1998","unstructured":"Carlet C.: \n                    \n                      \n                    \n                    $$\\mathbb{Z}_{2^k}$$\n                    \n                      \n                        \n                          Z\n                          \n                            2\n                            k\n                          \n                        \n                      \n                    \n                  -linear codes. IEEE Trans. Inf. Theory 44(4), 1543\u20131547 (1998).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"546_CR8","doi-asserted-by":"publisher","first-page":"571","DOI":"10.3934\/amc.2011.5.571","volume":"5","author":"ST Dougherty","year":"2011","unstructured":"Dougherty S.T., Fern\u00e1ndez-C\u00f3rdoba C.: Codes over \n                    \n                      \n                    \n                    $$\\mathbb{Z}_{2^ k}$$\n                    \n                      \n                        \n                          Z\n                          \n                            2\n                            k\n                          \n                        \n                      \n                    \n                  , gray map and self-dual codes. Adv. Math. Commun. 5(4), 571\u2013588 (2011).","journal-title":"Adv. Math. Commun."},{"key":"546_CR9","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.endm.2016.09.043","volume":"54","author":"C Fern\u00e1ndez-C\u00f3rdoba","year":"2016","unstructured":"Fern\u00e1ndez-C\u00f3rdoba C., Vela C., Villanueva M.: Construction and classification of the \n                    \n                      \n                    \n                    $$\\mathbb{Z}_{2^s}$$\n                    \n                      \n                        \n                          Z\n                          \n                            2\n                            s\n                          \n                        \n                      \n                    \n                  -linear Hadamard codes. Electron. Notes Discret. Math. 54, 247\u2013252 (2016).","journal-title":"Electron. Notes Discret. Math."},{"key":"546_CR10","unstructured":"Fern\u00e1ndez-C\u00f3rdoba C., Vela C., Villanueva M.: On the Kernel of \n                    \n                      \n                    \n                    $$\\mathbb{Z}_{2^{s}}$$\n                    \n                      \n                        \n                          Z\n                          \n                            2\n                            s\n                          \n                        \n                      \n                    \n                  -linear Hadamard Codes. In: Coding Theory and Applications, ICMCTA 2017. Lecture Notes in Computer Science, vol. 10495, pp. 107\u2013117 (2017)."},{"issue":"3","key":"546_CR11","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s10623-004-1717-1","volume":"36","author":"MK Gupta","year":"2005","unstructured":"Gupta M.K., Bhandari M.C., Lal A.K.: On linear codes over \n                    \n                      \n                    \n                    $$\\mathbb{Z}_{2^s}$$\n                    \n                      \n                        \n                          Z\n                          \n                            2\n                            s\n                          \n                        \n                      \n                    \n                  . Des. Codes Cryptogr. 36(3), 227\u2013244 (2005).","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"546_CR12","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/18.312154","volume":"40","author":"AR Hammons","year":"1994","unstructured":"Hammons A.R., Kumar P.V., Calderbank A.R., Sloane N.J.A., Sol\u00e9 P.: The \n                    \n                      \n                    \n                    $$\\mathbb{Z}_4$$\n                    \n                      \n                        \n                          Z\n                          4\n                        \n                      \n                    \n                  -linearity of Kerdock, preparata, goethals and related codes. IEEE Trans. Inf. Theory 40(2), 301\u2013319 (1994).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"546_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S1571-0653(04)00161-1","volume":"6","author":"DS Krotov","year":"2001","unstructured":"Krotov D.S.: \n                    \n                      \n                    \n                    $$\\mathbb{Z}_4$$\n                    \n                      \n                        \n                          Z\n                          4\n                        \n                      \n                    \n                  -linear Hadamard and extended perfect codes. International workshop on coding and cryptography, ser. Electron. Notes Discret. Math. 6, 107\u2013112 (2001).","journal-title":"Electron. Notes Discret. Math."},{"issue":"4","key":"546_CR14","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1109\/TIT.2007.892787","volume":"53","author":"DS Krotov","year":"2007","unstructured":"Krotov D.S.: On \n                    \n                      \n                    \n                    $$\\mathbb{Z}_{2^k}$$\n                    \n                      \n                        \n                          Z\n                          \n                            2\n                            k\n                          \n                        \n                      \n                    \n                  -dual binary codes. IEEE Trans. Inf. Theory 53(4), 1532\u20131537 (2007).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"546_CR15","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1109\/TIT.2014.2379644","volume":"61","author":"DS Krotov","year":"2015","unstructured":"Krotov D.S., Villanueva M.: Classification of the \n                    \n                      \n                    \n                    $$\\mathbb{Z}_2\\mathbb{Z}_4$$\n                    \n                      \n                        \n                          \n                            Z\n                            2\n                          \n                          \n                            Z\n                            4\n                          \n                        \n                      \n                    \n                  -linear Hadamard codes and their automorphism groups. IEEE Trans. Inf. Theory 61(2), 887\u2013894 (2015).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"546_CR16","volume-title":"The Theory of Error-correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-correcting Codes, vol. 16. Elsevier, Amsterdam (1977)."},{"issue":"3","key":"546_CR17","first-page":"205","volume":"35","author":"AA Nechaev","year":"1999","unstructured":"Nechaev A.A., Khonol\u2019d T.: Weighted modules and representations of codes. Probl. Inf. Transm. 35(3), 205\u2013223 (1999).","journal-title":"Probl. Inf. Transm."},{"issue":"1","key":"546_CR18","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TIT.2005.860464","volume":"52","author":"KT Phelps","year":"2006","unstructured":"Phelps K.T., Rif\u00e0 J., Villanueva M.: On the additive (\n                    \n                      \n                    \n                    $$\\mathbb{Z}_4$$\n                    \n                      \n                        \n                          Z\n                          4\n                        \n                      \n                    \n                  -linear and non-\n                    \n                      \n                    \n                    $$\\mathbb{Z}_4$$\n                    \n                      \n                        \n                          Z\n                          4\n                        \n                      \n                    \n                  -linear) Hadamard codes: rank and kernel. IEEE Trans. Inf. Theory 52(1), 316\u2013319 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"546_CR19","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TIT.1979.1056063","volume":"25","author":"P Shankar","year":"1979","unstructured":"Shankar P.: On BCH codes over arbitrary integer rings. IEEE Trans. Inf. Theory 25(4), 480\u2013483 (1979).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"546_CR20","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1007\/s10623-017-0390-0","volume":"86","author":"M Shi","year":"2018","unstructured":"Shi M., Sepasdar Z., Alahmadi A., Sol\u00e9 P.: On two-weight \n                    \n                      \n                    \n                    $$\\mathbb{Z}_{2^k}$$\n                    \n                      \n                        \n                          Z\n                          \n                            2\n                            k\n                          \n                        \n                      \n                    \n                  -codes. Des. Codes Cryptogr. 86(6), 1201\u20131209 (2018).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"546_CR21","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1137\/S0895480101397219","volume":"17","author":"H Tapia-Recillas","year":"2003","unstructured":"Tapia-Recillas H., Vega G.: On \n                    \n                      \n                    \n                    $$\\mathbb{Z}_{2^k}$$\n                    \n                      \n                        \n                          Z\n                          \n                            2\n                            k\n                          \n                        \n                      \n                    \n                  -linear and quaternary codes. SIAM J. Discret. Math. 17(1), 103\u2013113 (2003).","journal-title":"SIAM J. Discret. Math."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0546-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0546-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0546-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T04:46:38Z","timestamp":1569386798000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0546-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,10]]},"references-count":21,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["546"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0546-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,10]]},"assertion":[{"value":"22 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}