{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T07:44:11Z","timestamp":1768808651694,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"JSPS KAKENHI","award":["Grant Number 23K25784"],"award-info":[{"award-number":["Grant Number 23K25784"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s12095-024-00733-y","type":"journal-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T07:03:37Z","timestamp":1724137417000},"page":"1539-1558","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On the minimum weights of quaternary Hermitian LCD codes"],"prefix":"10.1007","volume":"16","author":[{"given":"Makoto","family":"Araya","sequence":"first","affiliation":[]},{"given":"Masaaki","family":"Harada","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,20]]},"reference":[{"key":"733_CR1","unstructured":"Araya, M., Harada, M., Ishizuka, K., Tanaka, Y.: Characterizations of the minimum weights of LCD codes of large dimensions (submitted)"},{"key":"733_CR2","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/TIT.2019.2949040","volume":"66","author":"M Araya","year":"2020","unstructured":"Araya, M., Harada, M., Saito, K.: Quaternary Hermitian linear complementary dual codes. IEEE Trans. Inform. Theory 66, 2751\u20132759 (2020)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"733_CR3","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system I: The user language. J. Symbolic Comput. 24, 235\u2013265 (1997)","journal-title":"J. Symbolic Comput."},{"key":"733_CR4","doi-asserted-by":"publisher","first-page":"115","DOI":"10.55630\/sjc.2007.1.115-130","volume":"1","author":"IG Bouyukliev","year":"2007","unstructured":"Bouyukliev, I.G.: What is Q-extension? Serdica J. Comput. 1, 115\u2013130 (2007)","journal-title":"Serdica J. Comput."},{"key":"733_CR5","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.disc.2003.11.003","volume":"281","author":"I Bouyukliev","year":"2004","unstructured":"Bouyukliev, I., Grassl, M., Varbanov, Z.: New bounds for $$n_4(k, d)$$ and classification of some optimal codes over $$\\rm GF (4)$$. Discrete Math. 281, 43\u201366 (2004)","journal-title":"Discrete Math."},{"key":"733_CR6","unstructured":"Brouwer, A.E.: Bounds on the size of linear codes. In: Pless, V.S., Huffman, W.C. (eds.) Handbook of Coding Theory, pp. 295\u2013461. Elsevier, Amsterdam (1998)"},{"key":"733_CR7","doi-asserted-by":"publisher","first-page":"3010","DOI":"10.1109\/TIT.2018.2789347","volume":"64","author":"C Carlet","year":"2018","unstructured":"Carlet, C., Mesnager, S., Tang, C., Qi, Y., Pellikaan, R.: Linear codes over $$\\mathbb{F} _q$$ are equivalent to LCD codes for $$q > 3$$. IEEE Trans. Inform. Theory 64, 3010\u20133017 (2018)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"733_CR8","unstructured":"Grassl, M.: Bounds on the minimum distance of linear codes and quantum codes (2024). Available online at http:\/\/www.codetables.de\/. Accessed 27 Jan 2024"},{"key":"733_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.ffa.2016.07.005","volume":"42","author":"C G\u00fcneri","year":"2016","unstructured":"G\u00fcneri, C., \u00d6zkaya, B., Sol\u00e9, P.: Quasi-cyclic complementary dual codes. Finite Fields Appl. 42, 67\u201380 (2016)","journal-title":"Finite Fields Appl."},{"key":"733_CR10","doi-asserted-by":"crossref","unstructured":"Harada, M.: Some optimal entanglement-assisted quantum codes constructed from quaternary Hermitian linear complementary dual codes. Int. J. Quantum Inf. 17, 1950053, (8 pp.) (2019)","DOI":"10.1142\/S0219749919500539"},{"key":"733_CR11","doi-asserted-by":"publisher","first-page":"2295","DOI":"10.1007\/s10623-021-00916-1","volume":"89","author":"M Harada","year":"2021","unstructured":"Harada, M.: Construction of binary LCD codes, ternary LCD codes and quaternary Hermitian LCD codes. Des. Codes Cryptogr. 89, 2295\u20132312 (2021)","journal-title":"Des. Codes Cryptogr."},{"key":"733_CR12","doi-asserted-by":"crossref","unstructured":"Harada, M., Saito, K.: Remark on subcodes of linear complementary dual codes. Inform. Process. Lett. 159\/160, 105963, (3 pp.) (2020)","DOI":"10.1016\/j.ipl.2020.105963"},{"key":"733_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"WC Huffman","year":"2003","unstructured":"Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"key":"733_CR14","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s12095-022-00614-2","volume":"15","author":"K Ishizuka","year":"2023","unstructured":"Ishizuka, K.: Construction of quaternary Hermitian LCD codes. Cryptogr. Commun. 15, 455\u2013467 (2023)","journal-title":"Cryptogr. Commun."},{"key":"733_CR15","volume-title":"Classification Algorithms for Codes and Designs","author":"P Kaski","year":"2006","unstructured":"Kaski, P., \u00d6sterg\u00e5rd, P.R.J.: Classification Algorithms for Codes and Designs. Springer, Berlin (2006)"},{"key":"733_CR16","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1109\/TIT.2017.2711601","volume":"64","author":"C-Y Lai","year":"2018","unstructured":"Lai, C.-Y., Ashikhmin, A.: Linear programming bounds for entanglement-assisted quantum error-correcting codes by split weight enumerators. IEEE Trans. Inform. Theory 64, 622\u2013639 (2018)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"733_CR17","doi-asserted-by":"publisher","first-page":"4427","DOI":"10.1007\/s11128-015-1143-5","volume":"14","author":"R Li","year":"2015","unstructured":"Li, R., Li, X., Guo, L.: On entanglement-assisted quantum codes achieving the entanglement-assisted Griesmer bound. Quantum Inf. Process. 14, 4427\u20134447 (2015)","journal-title":"Quantum Inf. Process."},{"key":"733_CR18","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/s12095-024-00699-x","volume":"16","author":"S Li","year":"2024","unstructured":"Li, S., Shi, M., Liu, H.: Several constructions of optimal LCD codes over small finite fields. Cryptogr. Commun. 16, 779\u2013800 (2024)","journal-title":"Cryptogr. Commun."},{"key":"733_CR19","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, R., Guo, L.: Entanglement-assisted quantum codes from quaternary codes of dimension five. Int. J. Quantum Inf. 15, 1750017, (28 pp.) (2017)","DOI":"10.1142\/S0219749917500174"},{"key":"733_CR20","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s11128-014-0830-y","volume":"14","author":"L Lu","year":"2015","unstructured":"Lu, L., Li, R., Guo, L., Fu, Q.: Maximal entanglement entanglement-assisted quantum codes constructed from linear codes. Quantum Inf. Process. 14, 165\u2013182 (2015)","journal-title":"Quantum Inf. Process."},{"key":"733_CR21","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, R., Ren, Y.: Optimal quaternary Hermitian LCD codes. Entropy 26, 373 (12 pp.) (2024)","DOI":"10.3390\/e26050373"},{"key":"733_CR22","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/0097-3165(78)90021-3","volume":"25","author":"FJ MacWilliams","year":"1978","unstructured":"MacWilliams, F.J., Odlyzko, A.M., Sloane, N.J.A., Ward, H.N.: Self-dual codes over GF(4). J. Combin. Theory Ser. A 25, 288\u2013318 (1978)","journal-title":"J. Combin. Theory Ser. A"},{"key":"733_CR23","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/0012-365X(92)90563-U","volume":"106\/107","author":"JL Massey","year":"1992","unstructured":"Massey, J.L.: Linear codes with complementary duals. Discrete Math. 106\/107, 337\u2013342 (1992)","journal-title":"Discrete Math."},{"key":"733_CR24","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.jsc.2013.09.003","volume":"60","author":"BD McKay","year":"2014","unstructured":"McKay, B.D., Piperno, A.: Practical graph isomorphism, II. J. Symbolic Comput. 60, 94\u2013112 (2014)","journal-title":"J. Symbolic Comput."},{"key":"733_CR25","unstructured":"Shoup, V.: NTL: A Library for doing Number Theory (2024). Available online at https:\/\/libntl.org\/"},{"key":"733_CR26","unstructured":"Tanaka, Y.: Private communication, February 28 (2024)"},{"key":"733_CR27","doi-asserted-by":"crossref","unstructured":"Zhan, X., Li, R., Lu, L., Li, H.: Quaternary Hermitian linear complementary dual codes with small distance. 2020 International Conference on Information Science and Education (ICISE-IE), 38\u201341 (2020)","DOI":"10.1109\/ICISE51755.2020.00016"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00733-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-024-00733-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00733-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T16:27:10Z","timestamp":1737476830000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-024-00733-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,20]]},"references-count":27,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["733"],"URL":"https:\/\/doi.org\/10.1007\/s12095-024-00733-y","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,20]]},"assertion":[{"value":"29 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}