{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T18:10:31Z","timestamp":1769969431472,"version":"3.49.0"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T00:00:00Z","timestamp":1543449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672036"],"award-info":[{"award-number":["61672036"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Technology Foundation for Selected Overseas Chinese Scholar, Ministry of Personnel of China","award":["05015133"],"award-info":[{"award-number":["05015133"]}]},{"name":"Excellent Youth Foundation of Natural Science Foundation of Anhui Province","award":["1808085J20"],"award-info":[{"award-number":["1808085J20"]}]},{"name":"the Program of fundamental scientific researches of the Siberian Branch of the Russian Academy of Sciences No.I.1.1","award":["0314-2016-0001"],"award-info":[{"award-number":["0314-2016-0001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10623-018-0586-y","type":"journal-article","created":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T05:22:17Z","timestamp":1543468937000},"page":"1857-1869","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Additive perfect codes in Doob graphs"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4990-6271","authenticated-orcid":false,"given":"Minjia","family":"Shi","sequence":"first","affiliation":[]},{"given":"Daitao","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8516-755X","authenticated-orcid":false,"given":"Denis S.","family":"Krotov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,29]]},"reference":[{"issue":"3","key":"586_CR1","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s10623-016-0323-3","volume":"85","author":"J Borges","year":"2017","unstructured":"Borges J., Fern\u00e1ndez-C\u00f3rdoba C.: There is exactly one \n                    \n                      \n                    \n                    $${Z_2Z_4}$$\n                    \n                      \n                        \n                          \n                            Z\n                            2\n                          \n                          \n                            Z\n                            4\n                          \n                        \n                      \n                    \n                  -cyclic \n                    \n                      \n                    \n                    $$1$$\n                    \n                      \n                        \n                          1\n                        \n                      \n                    \n                  -perfect code. Des. Codes Cryptogr. 85(3), 557\u2013566 (2017). \n                    https:\/\/doi.org\/10.1007\/s10623-016-0323-3\n                    \n                  .","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"586_CR2","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/18.312154","volume":"40","author":"AR Hammons Jr","year":"1994","unstructured":"Hammons Jr. A.R., Kumar P.V., Calderbank A.R., Sloane N.J.A., Sol\u00e9 P.: The \n                    \n                      \n                    \n                    $$Z_4$$\n                    \n                      \n                        \n                          Z\n                          4\n                        \n                      \n                    \n                  -linearity of Kerdock, Preparata, Goethals, and related codes. IEEE Trans. Inf. Theory 40(2), 301\u2013319 (1994). \n                    https:\/\/doi.org\/10.1109\/18.312154\n                    \n                  .","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"586_CR3","first-page":"23","volume":"20","author":"O Heden","year":"2015","unstructured":"Heden O., G\u00fczeltepe M.: On perfect \n                    \n                      \n                    \n                    $$1$$\n                    \n                      \n                        \n                          1\n                        \n                      \n                    \n                  -\n                    \n                      \n                    \n                    $$\\cal{E}$$\n                    \n                      \n                        E\n                      \n                    \n                  -error-correcting codes. Math. Commun. 20(1), 23\u201335 (2015).","journal-title":"Math. Commun."},{"issue":"4","key":"586_CR4","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/S0019-9958(71)90464-5","volume":"18","author":"M Herzog","year":"1971","unstructured":"Herzog M., Sch\u00f6nheim J.: Linear and nonlinear single-error-correcting perfect mixed codes. Inf. Control 18(4), 364\u2013368 (1971). \n                    https:\/\/doi.org\/10.1016\/S0019-9958(71)90464-5\n                    \n                  .","journal-title":"Inf. Control"},{"issue":"2","key":"586_CR5","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/S0378-3758(99)00126-3","volume":"86","author":"JH Koolen","year":"2000","unstructured":"Koolen J.H., Munemasa A.: Tight \n                    \n                      \n                    \n                    $$2$$\n                    \n                      \n                        \n                          2\n                        \n                      \n                    \n                  -designs and perfect \n                    \n                      \n                    \n                    $$1$$\n                    \n                      \n                        \n                          1\n                        \n                      \n                    \n                  -codes in Doob graphs. J. Stat. Plann. Inference 86(2), 505\u2013513 (2000). \n                    https:\/\/doi.org\/10.1016\/S0378-3758(99)00126-3\n                    \n                  .","journal-title":"J. Stat. Plann. Inference"},{"issue":"1","key":"586_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10623-015-0066-6","volume":"80","author":"DS Krotov","year":"2016","unstructured":"Krotov D.S.: Perfect codes in Doob graphs. Des. Codes Cryptogr. 80(1), 91\u2013102 (2016). \n                    https:\/\/doi.org\/10.1007\/s10623-015-0066-6\n                    \n                  .","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"586_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1137\/0124010","volume":"24","author":"A Tiet\u00e4v\u00e4inen","year":"1973","unstructured":"Tiet\u00e4v\u00e4inen A.: On the nonexistence of perfect codes over finite fields. SIAM J. Appl. Math. 24(1), 88\u201396 (1973). \n                    https:\/\/doi.org\/10.1137\/0124010\n                    \n                  .","journal-title":"SIAM J. Appl. Math."},{"key":"586_CR8","doi-asserted-by":"publisher","DOI":"10.1142\/3603","volume-title":"Quaternary Codes, Series on Applied Mathematics","author":"ZX Wan","year":"1997","unstructured":"Wan Z.X.: Quaternary Codes, Series on Applied Mathematics. World Scientific, Singapore (1997). \n                    https:\/\/doi.org\/10.1142\/3603\n                    \n                  ."},{"issue":"2","key":"586_CR9","first-page":"123","volume":"2","author":"V Zinoviev","year":"1973","unstructured":"Zinoviev V., Leontiev V.: The nonexistence of perfect codes over Galois fields. Probl. Control Inf. Theory 2(2), 123\u2013132 (1973).","journal-title":"Probl. Control Inf. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0586-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0586-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0586-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T19:11:45Z","timestamp":1574968305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0586-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,29]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["586"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0586-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,29]]},"assertion":[{"value":"7 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}