{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:36:19Z","timestamp":1775608579363,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T00:00:00Z","timestamp":1581033600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T00:00:00Z","timestamp":1581033600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DMS-1855136"],"award-info":[{"award-number":["DMS-1855136"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s10623-020-00726-x","type":"journal-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T13:20:09Z","timestamp":1583500809000},"page":"1673-1685","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Monomial-Cartesian codes and their duals, with applications to LCD codes, quantum codes, and locally recoverable codes"],"prefix":"10.1007","volume":"88","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9832-7145","authenticated-orcid":false,"given":"Hiram H.","family":"L\u00f3pez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gretchen L.","family":"Matthews","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ivan","family":"Soprunov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,2,7]]},"reference":[{"issue":"3","key":"726_CR1","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1109\/TIT.2006.890730","volume":"53","author":"SA Aly","year":"2007","unstructured":"Aly S.A., Klappenecker A., Sarvepalli P.K.: On quantum and classical BCH codes. IEEE Trans. Inf. Theory 53(3), 1183\u20131188 (2007).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"726_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.ffa.2018.01.006","volume":"51","author":"P Beelen","year":"2018","unstructured":"Beelen P., Datta M.: Generalized hamming weights of affine Cartesian codes. Finite Fields Appl. 51, 130\u2013145 (2018).","journal-title":"Finite Fields Appl."},{"issue":"1","key":"726_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3934\/amc.2008.2.15","volume":"2","author":"M Bras-Amor\u00f3s","year":"2008","unstructured":"Bras-Amor\u00f3s M., O\u2019Sullivan M.E.: Duality for some families of correction capability optimized evaluation codes. Adv. Math. Commun. 2(1), 15\u201333 (2008).","journal-title":"Adv. Math. Commun."},{"key":"726_CR4","unstructured":"Bulygin S., Pellikaan R.: Decoding error-correcting codes with Gr\u00f6bner bases. In: Veldhuis, R., Cronie, H., Hoeksema, H. (eds.) Proceedings of the 28th Symposium on Information Theory in the Benelux, WIC 2007, pp. 3\u201310, Enschede, May 24\u201325 2007."},{"key":"726_CR5","doi-asserted-by":"publisher","first-page":"1626","DOI":"10.1016\/j.jsc.2007.12.003","volume":"44","author":"S Bulygin","year":"2009","unstructured":"Bulygin S., Pellikaan R.: Bounded distance decoding of linear error-correcting codes with Gr\u00f6bner bases. J. Symbolic Comput. 44, 1626\u20131643 (2009).","journal-title":"J. Symbolic Comput."},{"key":"726_CR6","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-540-93806-4_21","volume-title":"Gr\u00f6bner Bases, Coding, and Cryptography","author":"S Bulygin","year":"2009","unstructured":"Bulygin S., Pellikaan R.: Decoding linear error-correcting codes up to half the minimum distance with Gr\u00f6bner bases. In: Sala M., Mora T., Perret L., Sakata S., Traverso C. (eds.) Gr\u00f6bner Bases, Coding, and Cryptography, pp. 361\u2013365. Springer, Berlin (2009)."},{"key":"726_CR7","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1142\/9789812837172_0013","volume-title":"Series on Coding Theory and Cryptology, Selected Topics in Information and Coding Theory","author":"S Bulygin","year":"2010","unstructured":"Bulygin S., Pellikaan R.: Decoding and finding the minimum distance with Gr\u00f6bner bases: history and new insights. In: Woungang I., Misra S., Misra S.C. (eds.) Series on Coding Theory and Cryptology, Selected Topics in Information and Coding Theory, vol. 7, pp. 585\u2013622. World Scientific, Singapore (2010)."},{"key":"726_CR8","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1103\/PhysRevA.54.1098","volume":"54","author":"AR Calderbank","year":"1996","unstructured":"Calderbank A.R., Shor P.W.: Good quantum error-correcting codes exist. Phys. Rev. A 54, 1098\u20131105 (1996).","journal-title":"Phys. Rev. A"},{"key":"726_CR9","doi-asserted-by":"publisher","first-page":"131","DOI":"10.3934\/amc.2016.10.131","volume":"10","author":"C Carlet","year":"2016","unstructured":"Carlet C., Guilley S.: Complementary dual codes for counter-measures to side-channel attacks. Adv. Math. Commun. 10, 131\u2013150 (2016).","journal-title":"Adv. Math. Commun."},{"issue":"4","key":"726_CR10","doi-asserted-by":"publisher","first-page":"3010","DOI":"10.1109\/TIT.2018.2789347","volume":"64","author":"C Carlet","year":"2018","unstructured":"Carlet C., Mesnager S., Tang C., Qi Y., Pellikaan R.: Linear codes over $${{\\mathbb{F}}}_q$$ are equivalent to LCD codes for $$q > 3$$. IEEE Trans. Inf. Theory 64(4), 3010\u20133017 (2018).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"726_CR11","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ffa.2013.06.004","volume":"24","author":"C Carvalho","year":"2013","unstructured":"Carvalho C.: On the second hamming weight of some Reed-Muller type codes. Finite Fields Appl. 24, 88\u201394 (2013).","journal-title":"Finite Fields Appl."},{"key":"726_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.ffa.2015.09.004","volume":"37","author":"C Carvalho","year":"2016","unstructured":"Carvalho C., Neumann V.G.: Projective Reed-Muller type codes on rational normal scrolls. Finite Fields Appl. 37, 85\u2013107 (2016).","journal-title":"Finite Fields Appl."},{"key":"726_CR13","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.ffa.2016.11.005","volume":"44","author":"C Carvalho","year":"2017","unstructured":"Carvalho C., Neumann V.G.: On the next-to-minimal weight of affine Cartesian codes. Finite Fields Appl. 44, 113\u2013134 (2017).","journal-title":"Finite Fields Appl."},{"key":"726_CR14","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s00574-016-0010-z","volume":"48","author":"C Carvalho","year":"2017","unstructured":"Carvalho C., Neumann V.G., L\u00f3pez H.H.: Projective nested Cartesian codes. Bull. Braz. Math. Soc. New Ser. 48, 283\u2013302 (2017).","journal-title":"Bull. Braz. Math. Soc. New Ser."},{"key":"726_CR15","volume-title":"Ideals, Varieties, and Algorithms, Undergraduate Texts in Mathematics","author":"D Cox","year":"2008","unstructured":"Cox D., Little J., O\u2019Shea D.: Ideals, Varieties, and Algorithms, Undergraduate Texts in Mathematics, 3rd edn. Springer, New York (2008).","edition":"3"},{"key":"726_CR16","volume-title":"Commutative Algebra with a View Toward Algebraic Geometry, Graduate Texts in Mathematics 150","author":"D Eisenbud","year":"1995","unstructured":"Eisenbud D.: Commutative Algebra with a View Toward Algebraic Geometry, Graduate Texts in Mathematics 150. Springer, New York (1995)."},{"key":"726_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1090\/conm\/381\/07088","volume":"381","author":"J Farr","year":"2005","unstructured":"Farr J., Gao S., bases Gr\u00f6bner: Pad\u00e9 approximation, and decoding of linear codes. Contemp. Math. 381, 3\u201318 (2005).","journal-title":"Contemp. Math."},{"issue":"9","key":"726_CR18","doi-asserted-by":"publisher","first-page":"3211","DOI":"10.1007\/s11128-015-1057-2","volume":"14","author":"C Galindo","year":"2015","unstructured":"Galindo C., Hernando F., Ruano D.: Stabilizer quantum codes from J-affine variety codes and a new Steane-like enlargement. Quantum Inf. Process. 14(9), 3211\u20133231 (2015).","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"726_CR19","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s11128-017-1559-1","volume":"16","author":"C Galindo","year":"2017","unstructured":"Galindo C., Geil O., Hernando F., Ruano D.: On the distance of stabilizer quantum codes from $$J$$-affine variety codes. Quantum Inf. Process. 16(4), 111 (2017).","journal-title":"Quantum Inf. Process."},{"issue":"1\u20133","key":"726_CR20","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10623-012-9680-8","volume":"66","author":"O Geil","year":"2013","unstructured":"Geil O., Thomsen C.: Weighted Reed-Muller codes revisited. Des. Codes Cryptogr. 66(1\u20133), 195\u2013220 (2013).","journal-title":"Des. Codes Cryptogr."},{"issue":"4","key":"726_CR21","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/S1071-5797(02)90360-6","volume":"8","author":"M Gonz\u00e1lez-Sarabia","year":"2002","unstructured":"Gonz\u00e1lez-Sarabia M., Renter\u00eda C., Tapia-Recillas H.: Reed-Muller-type codes over the Segre variety. Finite Fields Appl. 8(4), 511\u2013518 (2002).","journal-title":"Finite Fields Appl."},{"key":"726_CR22","volume-title":"Algebraic Geometry. A First Course, Graduate Texts in Mathematics","author":"J Harris","year":"1992","unstructured":"Harris J.: Algebraic Geometry. A First Course, Graduate Texts in Mathematics, vol. 133. Springer, New York (1992)."},{"key":"726_CR23","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-57189-3_12","volume-title":"Toric Surfaces and Error-Correcting Codes, Coding Theory, Cryptography and Related Areas","author":"JP Hansen","year":"2000","unstructured":"Hansen J.P.: Toric Surfaces and Error-Correcting Codes, Coding Theory, Cryptography and Related Areas, pp. 132\u2013142. Springer, Berlin (2000)."},{"key":"726_CR24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"W Huffman","year":"2003","unstructured":"Huffman W., Pless V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)."},{"issue":"1","key":"726_CR25","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s00200-004-0152-x","volume":"15","author":"D Joyner","year":"2004","unstructured":"Joyner D.: Toric codes over finite fields. Appl. Algebra Eng. Commun. Comput. 15(1), 63\u201379 (2004).","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"11","key":"726_CR26","doi-asserted-by":"publisher","first-page":"4892","DOI":"10.1109\/TIT.2006.883612","volume":"52","author":"A Ketkar","year":"2006","unstructured":"Ketkar A., Klappenecker A., Kumar S., Sarvepalli P.K.: Nonbinary stabilizer codes over finite fields. IEEE Trans. Inf. Theory 52(11), 4892\u20134914 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"726_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10623-012-9714-2","volume":"71","author":"HH L\u00f3pez","year":"2014","unstructured":"L\u00f3pez H.H., Renter\u00eda-M\u00e1rquez C., Villarreal R.H.: Affine Cartesian codes. Des. Codes Cryptogr. 71(1), 5\u201319 (2014).","journal-title":"Des. Codes Cryptogr."},{"key":"726_CR28","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ffa.2019.01.004","volume":"57","author":"HH L\u00f3pez","year":"2019","unstructured":"L\u00f3pez H.H., Manganiello F., Matthews G.L.: Affine Cartesian codes with complementary duals. Finite Fields Appl. 57, 13\u201328 (2019).","journal-title":"Finite Fields Appl."},{"key":"726_CR29","volume-title":"The Theory of Error-Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. Elsevier, North-Holland (1977)."},{"key":"726_CR30","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/0012-365X(92)90563-U","volume":"106\u2013107","author":"JL Massey","year":"1992","unstructured":"Massey J.L.: Linear codes with complementary duals. Discret. Math. 106\u2013107, 337\u2013342 (1992).","journal-title":"Discret. Math."},{"key":"726_CR31","unstructured":"Munuera C.: Locally Recoverable Codes with Local Error Detection, https:\/\/arxiv.org\/pdf\/1812.00834.pdf."},{"issue":"2","key":"726_CR32","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1080\/00927879708825862","volume":"25","author":"C Renter\u00eda","year":"1997","unstructured":"Renter\u00eda C., Tapia-Recillas H.: Reed-Muller codes: an ideal theory approach. Commun. Algebra 25(2), 401\u2013413 (1997).","journal-title":"Commun. Algebra"},{"issue":"5","key":"726_CR33","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.jsc.2007.07.018","volume":"44","author":"D Ruano","year":"2009","unstructured":"Ruano D.: On the structure of generalized toric codes. J. Symbolic Comput. 44(5), 499\u2013506 (2009).","journal-title":"J. Symbolic Comput."},{"issue":"2","key":"726_CR34","first-page":"85","volume":"2","author":"I Soprunov","year":"2015","unstructured":"Soprunov I.: Lattice polytopes in coding theory. J. Algebra Combinatorics Discret. Struct. Appl. 2(2), 85\u201394 (2015).","journal-title":"J. Algebra Combinatorics Discret. Struct. Appl."},{"issue":"1","key":"726_CR35","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1137\/080716554","volume":"23","author":"I Soprunov","year":"2009","unstructured":"Soprunov I., Soprunova J.: Toric surface codes and Minkowski length of polygons. SIAM J. Discret. Math. 23(1), 384\u2013400 (2009).","journal-title":"SIAM J. Discret. Math."},{"issue":"2","key":"726_CR36","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1137\/090762592","volume":"24","author":"I Soprunov","year":"2010","unstructured":"Soprunov I., Soprunova J.: Bringing toric codes to the next dimension. SIAM J. Discret. Math. 24(2), 655\u2013665 (2010).","journal-title":"SIAM J. Discret. Math."},{"issue":"1954","key":"726_CR37","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1098\/rspa.1996.0136","volume":"452","author":"AM Steane","year":"1996","unstructured":"Steane A.M.: Multiple-particle interference and quantum error correction. Proc. R. Soc. Lond. Ser. A 452(1954), 2551\u20132577 (1996).","journal-title":"Proc. R. Soc. Lond. Ser. A"},{"issue":"8","key":"726_CR38","doi-asserted-by":"publisher","first-page":"4661","DOI":"10.1109\/TIT.2014.2321280","volume":"60","author":"I Tamo","year":"2014","unstructured":"Tamo I., Barg A.: A family of optimal locally recoverable codes. IEEE Trans. Inf. Theory 60(8), 4661\u20134676 (2014).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"726_CR39","doi-asserted-by":"publisher","DOI":"10.1090\/surv\/139","volume-title":"Algebraic Geometric Codes: Basic Notions, Mathematical Surveys and Monographs","author":"M Tsfasman","year":"2007","unstructured":"Tsfasman M., Vladut S., Nogin D.: Algebraic Geometric Codes: Basic Notions, Mathematical Surveys and Monographs, vol. 139. American Mathematical Society, Providence (2007)."},{"key":"726_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-58575-3","volume-title":"Introduction to coding theory, Third edition, Graduate Texts in Mathematics","author":"JH van Lint","year":"1999","unstructured":"van Lint J.H.: Introduction to coding theory, Third edition, Graduate Texts in Mathematics, vol. 86. Springer, Berlin (1999)."},{"key":"726_CR41","volume-title":"Monomial Algebras, Monographs and and Research Notes in Mathematics","author":"RH Villarreal","year":"2015","unstructured":"Villarreal R.H.: Monomial Algebras, Monographs and and Research Notes in Mathematics, 2nd edn. CRC Press, Boca Raton (2015).","edition":"2"},{"issue":"5","key":"726_CR42","first-page":"1079","volume":"30","author":"VK Wei","year":"1993","unstructured":"Wei V.K., Yang K.: On the generalized hamming weights of product codes. IEEE Trans. Inf. Theory 30(5), 1079\u20131713 (1993).","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-020-00726-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-020-00726-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-020-00726-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T22:28:07Z","timestamp":1612823287000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-020-00726-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,7]]},"references-count":42,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["726"],"URL":"https:\/\/doi.org\/10.1007\/s10623-020-00726-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,7]]},"assertion":[{"value":"27 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}