{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T21:33:16Z","timestamp":1776720796075,"version":"3.51.2"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T00:00:00Z","timestamp":1667347200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T00:00:00Z","timestamp":1667347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2020K2A9A1A06108874"],"award-info":[{"award-number":["2020K2A9A1A06108874"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2020K2A9A1A06108874"],"award-info":[{"award-number":["2020K2A9A1A06108874"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004410","name":"TUBITAK","doi-asserted-by":"crossref","award":["120N932"],"award-info":[{"award-number":["120N932"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004410","name":"TUBITAK","doi-asserted-by":"crossref","award":["120N932"],"award-info":[{"award-number":["120N932"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12095-022-00612-4","type":"journal-article","created":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T07:02:31Z","timestamp":1667372551000},"page":"469-486","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Optimal Binary Linear Complementary Pairs of Codes"],"prefix":"10.1007","volume":"15","author":[{"given":"Whan-Hyuk","family":"Choi","sequence":"first","affiliation":[]},{"given":"Cem","family":"G\u00fcneri","sequence":"additional","affiliation":[]},{"given":"Jon-Lark","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Ferruh","family":"\u00d6zbudak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,2]]},"reference":[{"key":"612_CR1","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s12095-019-00402-5","volume":"12","author":"M Araya","year":"2020","unstructured":"Araya, M., Harada, M.: On the minimum weights of binary linear complementary dual codes. Cryptogr. Commun. 12, 285\u2013300 (2020)","journal-title":"Cryptogr. Commun."},{"key":"612_CR2","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/s10623-020-00834-8","volume":"89","author":"M Araya","year":"2021","unstructured":"Araya, M., Harada, M., Saito, K.: Characterization and classification of optimal LCD codes. Des. Codes Cryptogr. 89, 617\u2013640 (2021)","journal-title":"Des. Codes Cryptogr."},{"key":"612_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2021.101925","volume":"76","author":"M Araya","year":"2021","unstructured":"Araya, M., Harada, M., Saito, K.: On the minimum weights of binary LCD codes and ternary LCD codes. Finite Fields Appl. 76, 101925 (2021)","journal-title":"Finite Fields Appl."},{"key":"612_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2020.111905","volume":"343","author":"M Borello","year":"2020","unstructured":"Borello, M., de la Cruz, J., Willems, W.: A note on linear complementary pairs of group codes. Discrete Math. 343, 111905 (2020)","journal-title":"Discrete Math."},{"key":"612_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system. I. The user language. J. Symbolic Comput. 24, 235\u2013265 (1997)","journal-title":"J. Symbolic Comput."},{"key":"612_CR6","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1007\/s10623-021-00929-w","volume":"89","author":"S Bouyuklieva","year":"2021","unstructured":"Bouyuklieva, S.: Optimal binary LCD codes. Des. Codes Cryptogr. 89, 2445\u20132461 (2021)","journal-title":"Des. Codes Cryptogr."},{"key":"612_CR7","doi-asserted-by":"crossref","unstructured":"Bringer, J., Carlet, C., Chabanne, H., Guilley, S., Maghrebi, H.: Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks, WISTP, Heraklion, Crete, LNCS, vol. 8501, pp. 40\u201356.\u00a0Springer, Berlin, Heidelberg\u00a0(2014)","DOI":"10.1007\/978-3-662-43826-8_4"},{"key":"612_CR8","doi-asserted-by":"crossref","unstructured":"Carlet, C., Mesnager, S., Tang, C., Qi, Y.: On $$\\sigma$$-LCD codes. IEEE Trans. Inf. Theory. 65, 1694\u20131704 (2019)","DOI":"10.1109\/TIT.2018.2873130"},{"key":"612_CR9","doi-asserted-by":"crossref","unstructured":"Carlet, C., Mesnager, S., Tang, C., Qi, Y., Pellikaan, R.: Linear codes over $$\\mathbb{F}_q$$ are equivalent to LCD codes for $$q>3$$. IEEE Trans. Inf. Theory. 64, 3010\u20133017 (2018)","DOI":"10.1109\/TIT.2018.2789347"},{"key":"612_CR10","doi-asserted-by":"publisher","first-page":"6583","DOI":"10.1109\/TIT.2018.2796125","volume":"64","author":"C Carlet","year":"2018","unstructured":"Carlet, C., G\u00fcneri, C., \u00d6zbudak, F., \u00d6zkaya, B., Sol\u00e9, P.: On linear complementary pairs of codes. IEEE Trans. Inf. Theory. 64, 6583\u20136589 (2018)","journal-title":"IEEE Trans. Inf. Theory."},{"key":"612_CR11","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1504\/IJICOT.2017.083827","volume":"4","author":"ST Dougherty","year":"2017","unstructured":"Dougherty, S.T., Kim, J.-L., \u00d6zkaya, B., Sok, L., Sol\u00e9, P.: The combinatorics of LCD codes: Linear Programming bound and orthogonal matrices. Int. J. Information and Coding Theory. 4, 116\u2013128 (2017)","journal-title":"Int. J. Information and Coding Theory."},{"key":"612_CR12","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s12095-017-0258-1","volume":"10","author":"L Galvez","year":"2018","unstructured":"Galvez, L., Kim, J.-L., Lee, N., Roe, Y.G., Won, B.-S.: Some bounds on binary LCD codes. Cryptogr. Commun. 10, 719\u2013728 (2018)","journal-title":"Cryptogr. Commun."},{"key":"612_CR13","doi-asserted-by":"crossref","unstructured":"G\u00fcneri, C., \u00d6zkaya, B., Say\u0131c\u0131, S.: On linear complementary pair of $$nD$$ cyclic codes. IEEE Commun. Lett. 22, 2404\u20132406 (2018)","DOI":"10.1109\/LCOMM.2018.2872046"},{"key":"612_CR14","doi-asserted-by":"publisher","first-page":"2295","DOI":"10.1007\/s10623-021-00916-1","volume":"89","author":"M Harada","year":"2021","unstructured":"Harada, M.: Construction of binary LCD codes, ternary LCD codes and quaternary Hermitian LCD codes. Des. Codes Cryptogr. 89, 2295\u20132312 (2021)","journal-title":"Des. Codes Cryptogr."},{"key":"612_CR15","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/s12095-018-0319-0","volume":"11","author":"M Harada","year":"2019","unstructured":"Harada, M., Saito, K.: Binary linear complemetary dual codes. Cryptogr. Commun. 11, 677\u2013696 (2019)","journal-title":"Cryptogr. Commun."},{"key":"612_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"WC Huffman","year":"2003","unstructured":"Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"key":"612_CR17","doi-asserted-by":"crossref","unstructured":"Jaffe, D.: Optimal binary linear codes of length $$\\le 30$$. Discrete Math. 223, 135\u2013155 (2000)","DOI":"10.1016\/S0012-365X(99)00135-1"},{"key":"612_CR18","first-page":"82","volume-title":"Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses","author":"XT Ngo","year":"2015","unstructured":"Ngo, X.T., Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses, pp. 82\u201387. IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Washington (2015)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00612-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00612-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00612-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T16:14:14Z","timestamp":1676304854000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00612-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,2]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["612"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00612-4","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,2]]},"assertion":[{"value":"10 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}