{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:02:01Z","timestamp":1766466121536,"version":"3.41.2"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1997,2,1]],"date-time":"1997-02-01T00:00:00Z","timestamp":854755200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1997,2,1]],"date-time":"1997-02-01T00:00:00Z","timestamp":854755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1997,2]]},"DOI":"10.1023\/a:1008236218824","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T08:47:34Z","timestamp":1040546854000},"page":"137-143","source":"Crossref","is-referenced-by-count":6,"title":["Check Character Systems Using Chevalley Groups"],"prefix":"10.1007","volume":"10","author":[{"given":"Claudia","family":"Broecker","sequence":"first","affiliation":[]},{"given":"Ralph-Hardo","family":"Schulz","sequence":"additional","affiliation":[]},{"given":"Gernot","family":"Stroth","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"122514_CR1","unstructured":"R. Carter, Simple Groups of Lie Type, Wiley (1972)."},{"key":"122514_CR2","unstructured":"D. Gorenstein, Finite Groups, Harper and Row (1968)."},{"key":"122514_CR3","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1215\/ijm\/1255637483","volume":"7","author":"G. Higman","year":"1963","unstructured":"G. Higman, Suzuki-2-groups, Illinois J. Math., Vol. 7 (1963) pp. 79\u201396.","journal-title":"Illinois J. Math."},{"key":"122514_CR4","volume-title":"Finite Groups II","author":"B. Huppert","year":"1982","unstructured":"B. Huppert and N. Blackburn, Finite Groups II, Springer V., Berlin etc. (1982)."},{"key":"122514_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-67997-1","volume-title":"Finite Groups III","author":"B. Huppert","year":"1982","unstructured":"B. Huppert and N. Blackburn, Finite Groups III, Springer V., Berlin etc. (1982)."},{"key":"122514_CR6","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1006\/jabr.1995.1148","volume":"174","author":"P. Rowley","year":"1995","unstructured":"P. Rowley, Finite groups admitting a fixed point free automorphism group, J. Algebra, Vol. 174 (1995) pp. 724\u2013727.","journal-title":"J. Algebra"},{"issue":"7","key":"122514_CR7","first-page":"303","volume":"10","author":"R. Schauffler","year":"1956","unstructured":"R. Schauffler, \u00dcber die Bildung von Codew\u00f6rtern, Arch. Elektr. \u00dcbertragung, Vol. 10,No. 7 (1956) pp. 303\u2013314.","journal-title":"Arch. Elektr. \u00dcbertragung"},{"key":"122514_CR8","doi-asserted-by":"crossref","unstructured":"R.-H. Schulz, Codierungstheorie, Vieweg Verlag, pp. 58\u201362 (1991).","DOI":"10.1007\/978-3-322-91939-7"},{"key":"122514_CR9","doi-asserted-by":"crossref","unstructured":"R.-H. Schulz, Check character systems over groups and orthogonal Latin squares, Applic. Algebra in Eng., Comm. and Computing, AAECC, Vol. 7 (1996) pp. 125\u2013132.","DOI":"10.1007\/BF01191380"},{"issue":"1","key":"122514_CR10","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2307\/1970423","volume":"75","author":"M. Suzuki","year":"1962","unstructured":"M. Suzuki, On a class of doubly transitive groups, Annals of Math., Vol. 75,No. 1 (1962) pp. 105\u2013145.","journal-title":"Annals of Math."},{"key":"122514_CR11","unstructured":"J. Verhoeff, Error Detecting Decimal Codes, Math. Centre Tracts, Vol. 29, Math. Centrum Amsterdam (1969)."},{"key":"122514_CR12","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/BF01692444","volume":"3","author":"K. Zsigmondy","year":"1892","unstructured":"K. Zsigmondy, Zur Theorie der Potenzreste, Monatsh. Math. Phys., Vol. 3 (1892) pp. 265\u2013284.","journal-title":"Monatsh. Math. Phys."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008236218824.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008236218824\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008236218824.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:48:40Z","timestamp":1753760920000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008236218824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,2]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1997,2]]}},"alternative-id":["122514"],"URL":"https:\/\/doi.org\/10.1023\/a:1008236218824","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1997,2]]}}}