{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:42:20Z","timestamp":1761061340945,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s12095-021-00471-5","type":"journal-article","created":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T18:21:41Z","timestamp":1614450101000},"page":"425-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Construction of binary Hadamard codes and their s-PD sets"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2124-603X","authenticated-orcid":false,"given":"Briji J.","family":"Chathely","sequence":"first","affiliation":[]},{"given":"Rajendra P.","family":"Deore","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,27]]},"reference":[{"key":"471_CR1","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/S0019-9958(72)90223-9","volume":"20","author":"IF Blake","year":"1972","unstructured":"Blake, I.F.: Codes over certain rings. Inf. Control. 20, 396\u2013404 (1972)","journal-title":"Inf. Control."},{"key":"471_CR2","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0019-9958(75)80001-5","volume":"29","author":"IF Blake","year":"1975","unstructured":"Blake, I.F.: Codes over integer residue rings. Inf. Control. 29, 295\u2013300 (1975)","journal-title":"Inf. Control."},{"issue":"2","key":"471_CR3","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TIT.1979.1056017","volume":"25","author":"C Satyanarayana","year":"1970","unstructured":"Satyanarayana, C.: Lee metric codes over integer residue rings. IEEE Trans. Inf. Theory 25(2), 250\u2013254 (1970)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"471_CR4","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/18.312154","volume":"40","author":"AR Hammons","year":"1994","unstructured":"Hammons, A.R., Kumar, V., Calderbank, A.R., Sloane, N.J.A., Sol\u00e9, P.: The $\\mathbb {Z}_{4}$-linearity of Kerdock, Preparata, Goethals and related codes. IEEE Trans. Inf. Theory 40, 301\u2013319 (1994)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"471_CR5","doi-asserted-by":"publisher","first-page":"2345","DOI":"10.1109\/18.796375","volume":"45","author":"ST Dougherty","year":"1999","unstructured":"Dougherty, S.T., Gabroit, P., Harada, M., Munemasa, A., Sol\u00e9, P., Type, I.V.: Self dual codes over rings. IEEE Trans. Inf. Theory 45(7), 2345\u20132360 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"471_CR6","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/18.746770","volume":"45","author":"B Yildiz","year":"1999","unstructured":"Yildiz, B., Karadeniz, S.: Linear codes over F2 + uF2 + vF2 + uvF2. IEEE Trans, Inf. Theory 45, 32\u201345 (1999)","journal-title":"IEEE Trans, Inf. Theory"},{"key":"471_CR7","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1016\/j.aml.2005.10.011","volume":"19","author":"JF Qian","year":"2006","unstructured":"Qian, J.F., Zhang, L.N., Zhu, S.X.: (1 + u)-constacyclic and cyclic codes over F2 + uF2. Appl. Math. Lett. 19, 820\u2013823 (2006)","journal-title":"Appl. Math. Lett."},{"issue":"6","key":"471_CR8","doi-asserted-by":"publisher","first-page":"1863","DOI":"10.1093\/ietfec\/e89-a.6.1863","volume":"E89-A","author":"Qian JF","year":"2006","unstructured":"Qian JF, Zhang LN, Zhu SX: Constacyclic and cyclic codes over F2 + uF2 + u2F2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E89-A (6), 1863\u20131865 (2006)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"471_CR9","doi-asserted-by":"crossref","unstructured":"Krotov, D.S.: $\\mathbb {Z}_{4}$-linear Hadamard and extended perfect codes. In: Proceedings of the International Workshop on Coding and Cryptography, pp 329\u2013334 (2001)","DOI":"10.1016\/S1571-0653(04)00161-1"},{"issue":"2","key":"471_CR10","doi-asserted-by":"publisher","first-page":"701","DOI":"10.18576\/amis\/100229","volume":"10","author":"M \u00d6zkan","year":"2016","unstructured":"\u00d6zkan, M, \u00d6ke, F.: A relation between Hadamard codes and some special codes over F2 + uF2. Appl. Math. Inf. Sci. 10(2), 701\u2013704 (2016)","journal-title":"Appl. Math. Inf. Sci."},{"issue":"1","key":"471_CR11","first-page":"54","volume":"6","author":"M \u00d6zkan","year":"2018","unstructured":"\u00d6zkan, M, \u00d6ke, F.: Codes generated by special matrices on F2[u]\/ < u3 >. Konuralp J. Math. 6(1), 54\u201356 (2018)","journal-title":"Konuralp J. Math."},{"issue":"1","key":"471_CR12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.36753\/mathenot.421710","volume":"5","author":"M \u00d6zkan","year":"2017","unstructured":"\u00d6zkan, M, \u00d6ke, F.: Codes defined via especial matrices over the rings and Hadamard codes. Math. Sci. Appl. E-Notes 5(1), 93\u201398 (2017)","journal-title":"Math. Sci. Appl. E-Notes"},{"key":"471_CR13","doi-asserted-by":"publisher","first-page":"01046","DOI":"10.1051\/itmconf\/20182201046","volume":"22","author":"M \u00d6zkan","year":"2018","unstructured":"\u00d6zkan, M, \u00d6ke, F: Extensions of Hadamard codes defined on rings. ITM Web Conf.(CPCI) 22, 01046\u20131\u20135 (2018)","journal-title":"ITM Web Conf.(CPCI)"},{"issue":"5","key":"471_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TIT.1962.1057777","volume":"8","author":"E Prange","year":"1962","unstructured":"Prange, E.: The use of information sets in decoding cyclic codes. IRE Trans. Inf. Theory 8(5), 5\u20139 (1962)","journal-title":"IRE Trans. Inf. Theory"},{"key":"471_CR15","first-page":"275","volume":"330","author":"PJ Lee","year":"1988","unstructured":"Lee, P.J., Brickell, E.F.: An observation on the security of McEliece\u2019s public-key cryptosystem. Work. Theory Appl. Cryptographic Tech. 330, 275\u2013280 (1988)","journal-title":"Work. Theory Appl. Cryptographic Tech."},{"key":"471_CR16","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/BFb0019850","volume":"388","author":"J Stern","year":"1988","unstructured":"Stern, J.: A method for finding codewords of small weight. Coding Theory Appl. 388, 106\u2013113 (1988)","journal-title":"Coding Theory Appl."},{"key":"471_CR17","first-page":"743","volume":"6841","author":"DJ Bernstein","year":"2011","unstructured":"Bernstein, D.J., Lange, T., Peters, C.: Smaller decoding exponents: Ball-collision decoding. Adv. Cryptol. CRYPTO. 6841, 743\u2013760 (2011)","journal-title":"Adv. Cryptol. CRYPTO."},{"key":"471_CR18","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-12929-2_7","volume":"6061","author":"C Peters","year":"2010","unstructured":"Peters, C.: Information-set decoding for linear codes over Fq. Post-Quantum Crypt. Lect. Notes Comput. Sci. 6061, 81\u201394 (2010)","journal-title":"Post-Quantum Crypt. Lect. Notes Comput. Sci."},{"key":"471_CR19","volume-title":"The Theory of Error-Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland Publishing Company, Amsterdam (1977)"},{"issue":"3","key":"471_CR20","doi-asserted-by":"publisher","first-page":"1288","DOI":"10.1109\/18.669412","volume":"44","author":"M Greferath","year":"1998","unstructured":"Greferath, M., Velbinger, U.: Efficient decoding of $\\mathbb {Z}_{p}^{k}$-linear codes. IEEE Trans. Inf. Theory 44(3), 1288\u20131291 (1998)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"471_CR21","doi-asserted-by":"publisher","first-page":"1599","DOI":"10.1109\/18.923743","volume":"47","author":"NS Babu","year":"2001","unstructured":"Babu, N.S., Zimmermann, K.H.: Decoding of linear codes over Galois rings. IEEE Trans. Inf. Theory 47, 1599\u20131603 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"471_CR22","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10623-014-9946-4","volume":"76","author":"JJ Bernal","year":"2015","unstructured":"Bernal, J.J., Borges, J., Fernandez, C., Villanueva, M.: Permutation decoding of $\\mathbb {Z}_{2}\\mathbb {Z}_{4}$-linear codes. Des. Codes Crypt. 76(2), 269\u2013277 (2015)","journal-title":"Des. Codes Crypt."},{"key":"471_CR23","doi-asserted-by":"crossref","unstructured":"Barrolleta, R.D., Villanueva, M.: Partial permutation decoding for binary linear and $\\mathbb {Z}_{4}$-linear Hadamard codes. Des. Codes Cryptogr. 86, 569\u2013586 (2018)","DOI":"10.1007\/s10623-017-0342-8"},{"key":"471_CR24","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1002\/j.1538-7305.1964.tb04075.x","volume":"43","author":"FJ MacWilliams","year":"1964","unstructured":"MacWilliams, F.J.: Permutation decoding of systematic codes. Bell Syst. Tech. J. 43, 485\u2013505 (1964)","journal-title":"Bell Syst. Tech. J."},{"key":"471_CR25","doi-asserted-by":"publisher","DOI":"10.1515\/9781400842902","volume-title":"Hadamard Matrices and Their Applications","author":"KJ Horadam","year":"2007","unstructured":"Horadam, K.J.: Hadamard Matrices and Their Applications. Princeton University Press, United States of America (2007)"},{"key":"471_CR26","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1006\/ffta.2001.0333","volume":"8","author":"P Gaborit","year":"2002","unstructured":"Gaborit, P., Type, I.I.: Codes over F4. Finite Fields Appl. 8, 171\u2013183 (2002)","journal-title":"Finite Fields Appl."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00471-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00471-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00471-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T04:47:20Z","timestamp":1697950040000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00471-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,27]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["471"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00471-5","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,2,27]]},"assertion":[{"value":"7 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Briji J. Chathely and Rajendra P. Deore declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}