{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:59:32Z","timestamp":1772283572223,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,9,17]],"date-time":"2016-09-17T00:00:00Z","timestamp":1474070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100013286","name":"Research Fund for the Doctoral Program of Higher Education of China","doi-asserted-by":"crossref","award":["20120161110017"],"award-info":[{"award-number":["20120161110017"]}],"id":[{"id":"10.13039\/501100013286","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s12095-016-0204-7","type":"journal-article","created":{"date-parts":[[2016,9,17]],"date-time":"2016-09-17T04:08:49Z","timestamp":1474085329000},"page":"599-624","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Cyclic codes of odd length over \u21244 [u] \/ \u2329u k \u232a"],"prefix":"10.1007","volume":"9","author":[{"given":"Yuan","family":"Cao","sequence":"first","affiliation":[]},{"given":"Qingguo","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,17]]},"reference":[{"key":"204_CR1","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s10623-006-9034-5","volume":"42","author":"T Abualrub","year":"2007","unstructured":"Abualrub, T., Siap, I.: Cyclic codes over the ring \u2124 2 + u \u2124 2 $\\mathbb {Z}_{2}+u\\mathbb {Z}_{2}$ and \u2124 2 + u \u2124 2 + u 2 \u2124 2 $\\mathbb {Z}_{2}+u\\mathbb {Z}_{2}+u^2\\mathbb {Z}_{2}$ . Des. Codes Cryptogr. 42, 273\u2013287 (2007)","journal-title":"Des. Codes Cryptogr."},{"key":"204_CR2","unstructured":"Aydin, N., Asamov, T.: The \u2124 4 $\\mathbb {Z}_{4}$ database, Online available at: http:\/\/www.asamov.com\/Z4Codes.Accessedon2016-04-18"},{"issue":"4","key":"204_CR3","first-page":"737","volume":"35","author":"M Al-Ashker","year":"2011","unstructured":"Al-Ashker, M., Hamoudeh, M.: Cyclic codes over Z 2 + u Z 2 + u 2 Z 2 + \u2026 + u k \u2212 1 Z 2 $Z_{2}+uZ_{2}+u^{2}Z_{2}+\\ldots +u^{k}-1Z_{2}$ . Turk. J. Math. 35(4), 737\u2013749 (2011)","journal-title":"Turk. J. Math."},{"key":"204_CR4","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/18.761278","volume":"45","author":"A Bonnecaze","year":"1999","unstructured":"Bonnecaze, A., Udaya, P.: Cyclic codes and self-dual codes over \ud835\udd3d 2 + u \ud835\udd3d 2 $\\mathbb {F}_{2}+u\\mathbb {F}_{2}$ . IEEE Trans. Inform. Theory 45, 1250\u20131255 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"204_CR5","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s00200-011-0145-5","volume":"22","author":"Y Cao","year":"2011","unstructured":"Cao, Y.: Generalized quasi-cyclic codes over Galois rings: structural properties and enumeration. Appl. Algebra Engrg. Comm. Comput. 22, 219\u2013233 (2011)","journal-title":"Appl. Algebra Engrg. Comm. Comput."},{"key":"204_CR6","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s10623-010-9381-0","volume":"58","author":"J Cui","year":"2011","unstructured":"Cui, J., Junying, P.: Quaternary 1-generator quasi-cyclic codes. Des. Codes Cryptogr. 58, 23\u201333 (2011)","journal-title":"Des. Codes Cryptogr."},{"key":"204_CR7","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.ffa.2009.11.004","volume":"16","author":"ST Dougherty","year":"2010","unstructured":"Dougherty, S.T., Kim, J.-L., Kulosman, H., Liu, H.: Self-dual codes over commutative Frobenius rings. Finite Fields Appl. 16, 14\u201326 (2010)","journal-title":"Finite Fields Appl."},{"issue":"9 pages","key":"204_CR8","doi-asserted-by":"crossref","first-page":"1550058","DOI":"10.1142\/S1793830915500585","volume":"7","author":"J Gao","year":"2015","unstructured":"Gao, J., Fu, F.W., Xiao, L., Bandi, R.K.: On cyclic codes and quasi-cyclic codes over \u2124 q + u \u2124 q $\\mathbb {Z}_{q} + u\\mathbb {Z}_{q}$ . Discret. Math. Algorithm Appl. 7(9 pages), 1550058 (2015)","journal-title":"Discret. Math. Algorithm Appl."},{"key":"204_CR9","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/PL00012382","volume":"10","author":"G Norton","year":"2000","unstructured":"Norton, G., S\u0103l\u0103gean-Mandache, A.: On the structure of linear and cyclic codes over finite chain rings. Appl. Algebra Engrg. Comm. Comput. 10, 489\u2013506 (2000)","journal-title":"Appl. Algebra Engrg. Comm. Comput."},{"key":"204_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10623-013-9843-2","volume":"72","author":"AK Singh","year":"2015","unstructured":"Singh, A.K., Kewat, P.K.: On cyclic codes over the ring \u2124 p [ u ] \/ u k \u232a $\\mathbb {Z}_{p}[u]\/u^{k}\\rangle $ . Des. Codes Cryptogr. 72, 1\u201313 (2015)","journal-title":"Des. Codes Cryptogr."},{"key":"204_CR11","doi-asserted-by":"crossref","unstructured":"Wan, Z.-X.: Quaternary codes. World Scientific Publishing Co. Inc (1997)","DOI":"10.1142\/3603"},{"key":"204_CR12","doi-asserted-by":"crossref","unstructured":"Wan, Z.-X.: Lectures on finite fields and Galois rings. World Scientific Publishing Co. Inc (2003)","DOI":"10.1142\/5350"},{"key":"204_CR13","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.ffa.2013.12.007","volume":"27","author":"B Yildiz","year":"2014","unstructured":"Yildiz, B., Karadeniz, S.: Linear codes over \u2124 4 + u \u2124 4 $\\mathbb {Z}_{4}+u\\mathbb {Z}_{4}$ : MacWilliams identities, projections, and formally self-dual codes. Finite Fields Appl. 27, 24\u201340 (2014)","journal-title":"Finite Fields Appl."},{"key":"204_CR14","first-page":"226","volume":"2","author":"B Yildiz","year":"2014","unstructured":"Yildiz, B., Aydin, N.: On cyclic codes over \u2124 4 + u \u2124 4 $\\mathbb {Z}_{4}+ u\\mathbb {Z}_{4}$ and \u2124 4 $\\mathbb {Z}_{4}$ images. Int. J. Inf. 2, 226\u2013237 (2014)","journal-title":"Int. J. Inf."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0204-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-016-0204-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0204-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T05:34:46Z","timestamp":1589693686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-016-0204-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,17]]},"references-count":14,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["204"],"URL":"https:\/\/doi.org\/10.1007\/s12095-016-0204-7","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,17]]}}}