{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:27Z","timestamp":1740148947842,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12095-024-00709-y","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T05:01:46Z","timestamp":1714366906000},"page":"1013-1032","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ACD codes over skew-symmetric dualities"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4583-5613","authenticated-orcid":false,"given":"Astha","family":"Agrawal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5666-4103","authenticated-orcid":false,"given":"R. K.","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,29]]},"reference":[{"key":"709_CR1","unstructured":"Agrawal, A.: (2023). Available: https:\/\/drive.google.com\/file\/d\/1FsLaVkt8K4k1uQuwVEt5i5iYEqPaIPUj\/view?usp=sharing. Accessed 19 Oct 2023"},{"key":"709_CR2","doi-asserted-by":"publisher","unstructured":"Bierbrauer, J.: Introduction to Coding Theory 2nd (ed.). Chapman and Hall\/CRC. (2017). https:\/\/doi.org\/10.1201\/9781315371993","DOI":"10.1201\/9781315371993"},{"key":"709_CR3","doi-asserted-by":"crossref","unstructured":"Bierbrauer, J., Edel, Y., Faina, G., Marcugini, S., Pambianco, F.: Short additive quaternary codes. IEEE Trans. Inform. Theory 55, 952\u2013954 (2009). https:\/\/api.semanticscholar.org\/CorpusID:9975274","DOI":"10.1109\/TIT.2008.2011447"},{"key":"709_CR4","doi-asserted-by":"publisher","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system. I. The user language. J. Symbolic Comput., 24(3-4), 235\u2013265. Computational algebra and number theory (London, 1993) (1997). https:\/\/doi.org\/10.1006\/jsco.1996.0125","DOI":"10.1006\/jsco.1996.0125"},{"issue":"4","key":"709_CR5","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/18.681315","volume":"44","author":"A Calderbank","year":"1998","unstructured":"Calderbank, A., Rains, E., Shor, P., Sloane, N.: Quantum error correction via codes over GF(4). IEEE Trans. Inf. Theory 44(4), 1369\u20131387 (1998). https:\/\/doi.org\/10.1109\/18.681315","journal-title":"IEEE Trans. Inf. Theory"},{"key":"709_CR6","unstructured":"Delsarte, P.: An algebraic approach to the association schemes of coding theory. Philips Res. Rep. Suppl., 10:vi+97 (1973). https:\/\/cir.nii.ac.jp\/crid\/1570291225098257152"},{"key":"709_CR7","doi-asserted-by":"publisher","unstructured":"Delsarte, P., Levenshtein, V.I.: Association schemes and coding theory. IEEE Trans. Inform. Theory, 44(6), 2477\u20132504 (1998). https:\/\/doi.org\/10.1109\/18.720545","DOI":"10.1109\/18.720545"},{"key":"709_CR8","doi-asserted-by":"publisher","unstructured":"Dougherty, S.T.: Algebraic coding theory over finite commutative rings. SpringerBriefs in Mathematics. Springer, Cham, (2017). https:\/\/doi.org\/10.1007\/978-3-319-59806-2","DOI":"10.1007\/978-3-319-59806-2"},{"key":"709_CR9","doi-asserted-by":"publisher","unstructured":"Dougherty, S.T.: Dualities for codes over finite Abelian groups. Adv. Math. Commun. (2023). https:\/\/doi.org\/10.3934\/amc.2023023","DOI":"10.3934\/amc.2023023"},{"key":"709_CR10","doi-asserted-by":"publisher","unstructured":"Dougherty, S.T., \u015eahinkaya, S., Ustun, D.: Additive complementary dual codes from group characters. IEEE Trans. Inform. Theory 68(7), 4444\u20134452 (2022). https:\/\/doi.org\/10.1109\/TIT.2022.3162181","DOI":"10.1109\/TIT.2022.3162181"},{"key":"709_CR11","doi-asserted-by":"publisher","unstructured":"Dougherty, S.T., Fern\u00e1ndez-C\u00f3rdoba, C.: Additive $$G$$-codes over $$\\mathbb{F}_{q}$$ and their dualities. Finite Fields Appl. 72(101821), 21 (2021). https:\/\/doi.org\/10.1016\/j.ffa.2021.101821","DOI":"10.1016\/j.ffa.2021.101821"},{"issue":"5","key":"709_CR12","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s00200-020-00473-5","volume":"33","author":"ST Dougherty","year":"2022","unstructured":"Dougherty, S.T., Korban, A., \u015eahinkaya, S.: Self-dual additive codes. Appl. Algebra Engrg. Comm. Comput. 33(5), 569\u2013586 (2022). https:\/\/doi.org\/10.1007\/s00200-020-00473-5","journal-title":"Appl. Algebra Engrg. Comm. Comput."},{"issue":"4","key":"709_CR13","doi-asserted-by":"publisher","first-page":"555","DOI":"10.2140\/involve.2021.14.555","volume":"14","author":"ST Dougherty","year":"2021","unstructured":"Dougherty, S.T., Myers, S.: Orthogonality from group characters. Involve 14(4), 555\u2013570 (2021). https:\/\/doi.org\/10.2140\/involve.2021.14.555","journal-title":"Orthogonality from group characters. Involve"},{"issue":"8","key":"709_CR14","doi-asserted-by":"publisher","first-page":"5536","DOI":"10.1109\/TIT.2011.2159040","volume":"57","author":"MF Ezerman","year":"2011","unstructured":"Ezerman, M.F., Ling, S., Sole, P.: Additive Asymmetric Quantum codes. IEEE Trans. Inf. Theory 57(8), 5536\u20135550 (2011). https:\/\/doi.org\/10.1109\/TIT.2011.2159040","journal-title":"IEEE Trans. Inf. Theory"},{"key":"709_CR15","doi-asserted-by":"crossref","unstructured":"Harada, M.: New quantum codes constructed from some self-dual additive $$\\mathbb{F} _{4}$$-codes. Inform. Process. Lett. 138, 35\u201338 (2018). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020019018301157","DOI":"10.1016\/j.ipl.2018.05.008"},{"key":"709_CR16","doi-asserted-by":"publisher","unstructured":"Jones, O.: On the geometry of varieties of invertible symmetric and skew-symmetric matrices. Pacific J. Math. 180(1), 89\u2013100 (1997). https:\/\/doi.org\/10.2140\/pjm.1997.180.89","DOI":"10.2140\/pjm.1997.180.89"},{"key":"709_CR17","unstructured":"Lu, L., Zhan, X., Yang, S., Cao, H.: Optimal Quaternary Hermitian LCD codes (2020). arXiv:2010.10166"},{"key":"709_CR18","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/0012-365X(92)90563-U","volume":"106\u2013107","author":"JL Massey","year":"1992","unstructured":"Massey, J.L.: Linear codes with complementary duals. Discret. Math. 106\u2013107, 337\u2013342 (1992). https:\/\/doi.org\/10.1016\/0012-365X(92)90563-U","journal-title":"Discret. Math."},{"issue":"3","key":"709_CR19","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/JCN.2018.000043","volume":"20","author":"DM Nguyen","year":"2018","unstructured":"Nguyen, D.M., Kim, S.: Quantum stabilizer codes construction from Hermitian self-orthogonal codes over GF(4). Journal of Communications and Networks 20(3), 309\u2013315 (2018). https:\/\/doi.org\/10.1109\/JCN.2018.000043","journal-title":"Journal of Communications and Networks"},{"key":"709_CR20","doi-asserted-by":"crossref","unstructured":"Stanley, R., Fomin, S.: Enumerative Combinatorics: Volume 2. Cambridge Studies in Advanced Mathematics. Cambridge University Press, (1999). https:\/\/books.google.co.in\/books?id=cWEhAwAAQBAJ","DOI":"10.1017\/CBO9780511609589"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00709-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-024-00709-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00709-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T06:08:12Z","timestamp":1724652492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-024-00709-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,29]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["709"],"URL":"https:\/\/doi.org\/10.1007\/s12095-024-00709-y","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2024,4,29]]},"assertion":[{"value":"19 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}