{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:56:23Z","timestamp":1775145383224,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T00:00:00Z","timestamp":1648252800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T00:00:00Z","timestamp":1648252800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001409","name":"Department of Science and Technology, Ministry of Science and Technology","doi-asserted-by":"publisher","award":["DST\/INSPIRE\/03\/2016\/001445"],"award-info":[{"award-number":["DST\/INSPIRE\/03\/2016\/001445"]}],"id":[{"id":"10.13039\/501100001409","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["CRG\/2020\/005927, vide Diary No. SERB\/F\/6780\/ 2020-2021 dated 31 December, 2020"],"award-info":[{"award-number":["CRG\/2020\/005927, vide Diary No. SERB\/F\/6780\/ 2020-2021 dated 31 December, 2020"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s12095-022-00572-9","type":"journal-article","created":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T23:04:00Z","timestamp":1648508640000},"page":"1021-1034","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cyclic codes over $$M_4 (\\mathbb {F}_2+u\\mathbb {F}_2)$$\u00a0\u00a0"],"prefix":"10.1007","volume":"14","author":[{"given":"Shikha","family":"Patel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6512-4229","authenticated-orcid":false,"given":"Om","family":"Prakash","sequence":"additional","affiliation":[]},{"given":"Habibul","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,26]]},"reference":[{"key":"572_CR1","doi-asserted-by":"crossref","unstructured":"Abualrub, T., Siap, I.: Cyclic codes over the ring $$\\mathbb{Z}_2+u\\mathbb{Z}_2$$ and $$\\mathbb{Z}_2+u\\mathbb{Z}_2+u^2\\mathbb{Z}_2$$. Des. Codes Cryptogr. 42(3), 273\u2013287 (2007)","DOI":"10.1007\/s10623-006-9034-5"},{"key":"572_CR2","doi-asserted-by":"crossref","unstructured":"Alahmadi, A., Sboui, H., Sol\u00e9, P., Yemen, O.: Cyclic codes over $$M_2(\\mathbb{F}_2)$$. J. Franklin Inst. 350(9), 2837\u20132847 (2013)","DOI":"10.1016\/j.jfranklin.2013.06.023"},{"issue":"1","key":"572_CR3","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1006\/jcta.1996.2763","volume":"78","author":"C Bachoc","year":"1997","unstructured":"Bachoc, C.: Applications of coding theory to the construction of modular lattices. J. Combin. Theory Ser. A 78(1), 92\u2013119 (1997)","journal-title":"J. Combin. Theory Ser. A"},{"key":"572_CR4","unstructured":"Bhowmick, S., Bagchi S., Bandi, R. K.: Self-dual cyclic codes over $$M _2 (Z_ 4 )$$. arXiv:1807.04913 (2018)"},{"key":"572_CR5","doi-asserted-by":"crossref","unstructured":"Bonnecaze, A., Udaya, P.: Cyclic codes and self-dual codes over $$\\mathbb{F}_2 + u\\mathbb{F}_2$$. IEEE Trans. Inform. Theory 45(4), 1250\u20131255 (1999)","DOI":"10.1109\/18.761278"},{"key":"572_CR6","unstructured":"Bosma, W., Cannon, J.: Handbook of Magma Functions. Univ. of Sydney, Sydney (1995)"},{"key":"572_CR7","unstructured":"Falcunit, D. F., Sison, V. P.: Cyclic codes over matrix ring $$M_2(\\mathbb{F}_p)$$ and their isometric images over $$\\mathbb{F} _{p^2}+u\\mathbb{F}_{p^2}$$. International Zurich Seminar on Communications (IZS), 26\u201328 (2014)"},{"key":"572_CR8","doi-asserted-by":"crossref","unstructured":"Greferath, M., Schmidt, S. E.: Linear codes and rings of matrices. Proceeding of AAECC-13 Hawaii, Springer LNCS , vol. 1719, 160\u2013169 (1999)","DOI":"10.1007\/3-540-46796-3_16"},{"key":"572_CR9","doi-asserted-by":"crossref","unstructured":"Hammons, A.R., Kumar, P.V., Calderbank, A.R., Sloane, N.J.A., Sol\u00e9, P.: The $$\\mathbb{Z}_4$$-linearity of Kerdock, Preparata, Goethals, and related codes. IEEE Trans. Inform. Theory 40(2), 301\u2013319 (1994)","DOI":"10.1109\/18.312154"},{"key":"572_CR10","doi-asserted-by":"crossref","unstructured":"Islam, H., Prakash, O., Bhunia, D.K.: On the structure of cyclic codes over $$M_2(\\mathbb{F}_p+u\\mathbb{F}_p)$$. Indian J. Pure Appl. Math. 53(1), 153\u2013161 (2022)","DOI":"10.1007\/s13226-021-00014-x"},{"key":"572_CR11","doi-asserted-by":"crossref","unstructured":"Luo, R., Udaya, P.: Cyclic codes over $$M_2(\\mathbb{F}_2+u\\mathbb{F}_2)$$. Cryptogr. Commun. 10(6), 1109\u20131117 (2018)","DOI":"10.1007\/s12095-017-0266-1"},{"issue":"2","key":"572_CR12","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TIT.2011.2173732","volume":"58","author":"F Oggier","year":"2012","unstructured":"Oggier, F., Sol\u00e9, P., Belfiore, J.C.: Codes over matrix rings for space-time coded modulations. IEEE Trans. Inform. Theory 58(2), 734\u2013746 (2012)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"572_CR13","doi-asserted-by":"crossref","unstructured":"Pal, J., Bhowmick, S., Bagchi, S.: Cyclic codes over $$M _4 (\\mathbb{F}_ 2)$$. J. Appl. Math. Comput. 60(1\u20132), 749\u2013756 (2019)","DOI":"10.1007\/s12190-018-01235-w"},{"key":"572_CR14","unstructured":"Wisbauer, R.: Foundations of module and ring theory. Gordon and Breach Science Publishers (1991)"},{"issue":"3","key":"572_CR15","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1353\/ajm.1999.0024","volume":"121","author":"J. A. Wood","year":"1999","unstructured":"Wood, J.: Duality for modules over finite rings and applications to coding theory. Amer. J. Math. 121(3), 555\u2013575 (1999)","journal-title":"American J. Math."}],"updated-by":[{"DOI":"10.1007\/s12095-022-00584-5","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T00:00:00Z","timestamp":1653350400000}}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00572-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00572-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00572-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T10:20:57Z","timestamp":1660818057000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00572-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,26]]},"references-count":15,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["572"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00572-9","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s12095-022-00584-5","asserted-by":"object"}]},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,26]]},"assertion":[{"value":"11 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2022","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s12095-022-00584-5","URL":"https:\/\/doi.org\/10.1007\/s12095-022-00584-5","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}