{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:24:33Z","timestamp":1775053473838,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1998,2,1]],"date-time":"1998-02-01T00:00:00Z","timestamp":886291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1998,2,1]],"date-time":"1998-02-01T00:00:00Z","timestamp":886291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1998,2]]},"DOI":"10.1023\/a:1008278312966","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T08:47:34Z","timestamp":1040546854000},"page":"165-172","source":"Crossref","is-referenced-by-count":3,"title":["The Nonexistence of Ternary [38, 6, 23] Codes"],"prefix":"10.1007","volume":"13","author":[{"given":"Noboru","family":"Hamada","sequence":"first","affiliation":[]},{"given":"Marijn","family":"Van Eupen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"147890_CR1","unstructured":"G. T. Bogdanova and I. G. Boukliev, Newlinear codes of dimension 5 overGF.3\/, Proceedings of the Fourth International Workshop on Algebraic and Combinatorial Coding Theory, Novgorod, Russia, September (1994) pp. 41-43."},{"key":"147890_CR2","unstructured":"A. E. Brouwer and N. J. A. Sloane, Tables of Codes, in R. Brualdi, W. C. Huffman and V. Pless (eds.), Handbook of Coding Theory, North-Holland, Amsterdam, to appear."},{"key":"147890_CR3","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1109\/18.382031","volume":"41","author":"M. van Eupen","year":"1995","unstructured":"M. van Eupen, Four nonexistence results for ternary linear codes, IEEE Trans. Inform. Theory, Vol. 41 (1995) pp. 800-805.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"147890_CR4","doi-asserted-by":"crossref","first-page":"2048","DOI":"10.1109\/18.476334","volume":"41","author":"M. van Eupen","year":"1995","unstructured":"M. van Eupen, Some new results for ternary linear codes of dimension 5 and 6, IEEE Trans. Inform. Theory, Vol. 41 (1995) pp. 2048-2051.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"147890_CR5","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1018042823954","volume":"7","author":"M. van Eupen","year":"1996","unstructured":"M. van Eupen, N. Hamada and Y. Watamori, The nonexistence of ternary [50; 5; 32] codes, Designs, Codes and Cryptography, Vol. 7 (1996) pp. 235-237.","journal-title":"Designs, Codes and Cryptography"},{"key":"147890_CR6","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/BF01388456","volume":"4","author":"M. van Eupen","year":"1994","unstructured":"M. van Eupen and R. Hill, An optimal ternary [69; 5; 45] code and related codes, Designs, Codes and Cryptography, Vol. 4 (1994) pp. 271-282.","journal-title":"Designs, Codes and Cryptography"},{"key":"147890_CR7","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1023\/A:1008292320488","volume":"10","author":"M. van Eupen","year":"1997","unstructured":"M. van Eupen and P. Lison\u010dk, Classification of some optimal ternary linear codes of small length, Designs, Codes and Cryptography, Vol. 10 (1997) pp. 63-84.","journal-title":"Designs, Codes and Cryptography"},{"key":"147890_CR8","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/0012-365X(93)90404-H","volume":"116","author":"N. Hamada","year":"1993","unstructured":"N. Hamada, A characterization of some [n, k, d; q]-codes meeting the Griesmer bound using a minihyper in a finite projective geometry, Discrete Math., Vol. 116 (1993) pp. 229-268.","journal-title":"Discrete Math."},{"key":"147890_CR9","first-page":"161","volume":"18","author":"N. Hamada","year":"1993","unstructured":"N. Hamada, A survey of recent work on characterization of minihypers in PG(t, q) and nonbinary linear codes meeting the Griesmer bound, J. Combin. Inform. Syst. Sci., Vol. 18 (1993) pp. 161-191.","journal-title":"J. Combin. Inform. Syst. Sci."},{"key":"147890_CR10","first-page":"253","volume":"46","author":"N. Hamada","year":"1997","unstructured":"N. Hamada, The nonexistence of ternary [29, 6, 17] codes, Math. Japonica, Vol. 46 (1997) pp. 253-264.","journal-title":"Math. Japonica"},{"key":"147890_CR11","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1090\/conm\/168\/01694","volume":"168","author":"N. Hamada","year":"1994","unstructured":"N. Hamada and T. Helleseth, A characterization of some ternary codes meeting the Griesmer bound, Amer. Math. Soc. Contemp. Math., Vol. 168 (1994) pp. 139-150.","journal-title":"Amer. Math. Soc. Contemp. Math."},{"key":"147890_CR12","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/BF00141966","volume":"2","author":"N. Hamada","year":"1992","unstructured":"N. Hamada, T. Helleseth and \u00f8. Ytrehus, On the construction of [q\n4 + q\n2\u2212 q,5, q\n4 \u2212 q\n3 + q\n2 \u2212 2q; q] codes meeting the Griesmer bound, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 225-229.","journal-title":"Designs, Codes and Cryptography"},{"key":"147890_CR13","first-page":"25","volume":"35","author":"N. Hamada","year":"1993","unstructured":"N. Hamada, T. Helleseth and \u00f8. Ytrehus, The nonexistence of [51, 5, 33; 3] codes, Ars Combin., Vol. 35 (1993) pp. 25-32.","journal-title":"Ars Combin."},{"key":"147890_CR14","first-page":"577","volume":"43","author":"N. Hamada","year":"1996","unstructured":"N. Hamada and Y. Watamori, The nonexistence of some ternary linear codes of dimension 6 and the bounds for n\n3.6, d\/, 1 \u2264 d\u2264 243, Math. Japonica, Vol. 43 (1996) pp. 577-593.","journal-title":"Math. Japonica"},{"key":"147890_CR15","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/0378-3758(95)00126-3","volume":"52","author":"N. Hamada","year":"1996","unstructured":"N. Hamada and Y. Watamori, The nonexistence of [71; 5; 46I 3] codes, J. Statist. Plann. Inference, Vol. 52 (1996) pp. 379-394.","journal-title":"J. Statist. Plann. Inference"},{"key":"147890_CR16","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/BF00124893","volume":"2","author":"R. Hill","year":"1992","unstructured":"R. Hill and D. E. Newton, Optimal ternary linear codes, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 137-157.","journal-title":"Designs, Codes and Cryptography"},{"key":"147890_CR17","unstructured":"I. N. Landgev, The nonexistence of some optimal ternary codes of dimension five, to appear in Designs, Codes and Cryptography."},{"key":"147890_CR18","volume-title":"Finite Fields, Encyclopedia of Mathematics and its Applications","author":"R. Lidl","year":"1983","unstructured":"R. Lidl and H. Niederreiter, Finite Fields, Encyclopedia of Mathematics and its Applications, Vol. 20, Addison-Wesley Publishing Company, Massachusetts (1983)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008278312966.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008278312966\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008278312966.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T04:03:04Z","timestamp":1753761784000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008278312966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,2]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1998,2]]}},"alternative-id":["147890"],"URL":"https:\/\/doi.org\/10.1023\/a:1008278312966","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998,2]]}}}