{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:06:28Z","timestamp":1754161588779,"version":"3.41.2"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1023\/a:1008288219580","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T08:47:34Z","timestamp":1040546854000},"page":"41-56","source":"Crossref","is-referenced-by-count":0,"title":["A Necessary and Sufficient Condition for the Existence of Some Ternary [n, k, d] Codes Meeting the Greismer Bound"],"prefix":"10.1007","volume":"10","author":[{"given":"Noboru","family":"Hamada","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"124968_CR1","unstructured":"A. E. Brouwer and N. J. A. Sloane, Tables of Codes, in Handbook of Coding Theory (R. Brualdi, W. C. Huffman and V. Pless, eds.), North-Holland, Amsterdam, to appear."},{"key":"124968_CR2","first-page":"235","volume":"7","author":"M. van Eupen","year":"1996","unstructured":"M. van Eupen, N. Hamada and Y. Watamori, The nonexistence of ternary [50, 5, 32] codes, Designs, Codes and Cryptography, vol. 7 (1996), pp. 235\u2013237.","journal-title":"Designs, Codes and Cryptography"},{"key":"124968_CR3","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/BF01388456","volume":"4","author":"M. van Eupen","year":"1994","unstructured":"M. van Eupen and R. Hill, An optimal ternary [69, 5, 45] code and related codes, Designs, Codes and Cryptography, Vol. 4 (1994) pp. 271\u2013282.","journal-title":"Designs, Codes and Cryptography"},{"key":"124968_CR4","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1147\/rd.45.0532","volume":"4","author":"J. H. Griesmer","year":"1960","unstructured":"J. H. Griesmer, A bound for error-correcting codes, IBM J. Res. Develop., Vol. 4 (1960) pp. 532\u2013542.","journal-title":"IBM J. Res. Develop."},{"key":"124968_CR5","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/0012-365X(93)90404-H","volume":"116","author":"N. Hamada","year":"1993","unstructured":"N. Hamada, A characterization of some [n, k, d; q]-codes meeting the Griesmer bound using a minihyper in a finite projective geometry, Discrete Math., Vol. 116 (1993) pp. 229\u2013268.","journal-title":"Discrete Math."},{"key":"124968_CR6","first-page":"161","volume":"18","author":"N. Hamada","year":"1993","unstructured":"N. Hamada, A survey of recent work on characterization of minihypers in PG(t, q) and nonbinary linear codes meeting the Griesmer bound, J. Combin. Inform. Syst. Sci., Vol. 18 (1993) pp. 161\u2013191.","journal-title":"J. Combin. Inform. Syst. Sci."},{"key":"124968_CR7","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/0012-365X(92)90625-P","volume":"104","author":"N. Hamada","year":"1992","unstructured":"N. Hamada and T. Helleseth, A characterization of some }2\u03c5\u03b1+1 + \u03c5\u03b3+1, 2\u03c5\u03b1 + \u03c5\u03b3; k \u2212 1, 3{-minihypers and some [n, k, 3\nk\u22121 \u2212 2 \u00b7 3\u03b1 \u2212 3\u03b3; 3]-codes (k \u2265 3, 0 \u2264 \u03b1 < \u03b3 < k \u2212 1) meeting the Griesmer bound, Discrete Math., Vol. 104 (1992) pp. 67\u201381.","journal-title":"Discrete Math."},{"key":"124968_CR8","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1090\/conm\/168\/01694","volume":"168","author":"N. Hamada","year":"1994","unstructured":"N. Hamada and T. Helleseth, A characterization of some ternary codes meeting the Griesmer bound, AMS series Contemp. Math., Vol. 168 (1994) pp. 139\u2013150.","journal-title":"AMS series Contemp. Math."},{"key":"124968_CR9","first-page":"253","volume":"43","author":"N. Hamada","year":"1996","unstructured":"N. Hamada and T. Helleseth, A characterization of }3\u03c51 + \u03c54, 3\u03c50 + \u03c53; 4, 3{-minihypers and projective ternary [78, 5, 51] codes, Math. Japonica, Vol. 43 (1996), pp. 253\u2013266.","journal-title":"Math. Japonica"},{"key":"124968_CR10","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/BF00141966","volume":"2","author":"N. Hamada","year":"1992","unstructured":"N. Hamada, T. Helleseth and \u00f8. Ytrehus, On the construction of [q\n4 + q\n2 \u2212 q, 5, q\n4 \u2212 q\n3 + q\n2 \u2212 2q; q]-codes meeting the Griesmer bound, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 225\u2013229.","journal-title":"Designs, Codes and Cryptography"},{"key":"124968_CR11","first-page":"25","volume":"35","author":"N. Hamada","year":"1993","unstructured":"N. Hamada, T. Helleseth and \u00f8. Ytrehus, The nonexistence of [51, 5, 33; 3]-codes, Ars Combin., Vol. 35 (1993) pp. 25\u201332.","journal-title":"Ars Combin."},{"key":"124968_CR12","first-page":"577","volume":"43","author":"N. Hamada","year":"1996","unstructured":"N. Hamada and Y. Watamori, The nonexistence of some ternary linear codes of dimension 6 and the bounds for n\n3 (6, d), 1 \u2264 d \u2264 243, Math. Japonica, Vol. 43 (1996), pp. 577\u2013593.","journal-title":"Math. Japonica"},{"key":"124968_CR13","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/0378-3758(95)00126-3","volume":"52","author":"N. Hamada","year":"1996","unstructured":"N. Hamada and Y. Watamori, The nonexistence of [71, 5, 46; 3]-codes, J. Statist. Plann. Inference, vol. 52 (1996) pp. 379\u2013394.","journal-title":"J. Statist. Plann. Inference"},{"key":"124968_CR14","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/S0019-9958(81)90184-4","volume":"50","author":"T. Helleseth","year":"1981","unstructured":"T. Helleseth, A characterization of codes meeting the Griesmer bound, Inform. and Control, Vol. 50 (1981) pp. 128\u2013159.","journal-title":"Inform. and Control"},{"key":"124968_CR15","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/0012-365X(78)90120-6","volume":"22","author":"R. Hill","year":"1978","unstructured":"R. Hill, Caps and codes, Discrete Math., Vol. 22 (1978) pp. 111\u2013137.","journal-title":"Discrete Math."},{"key":"124968_CR16","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/BF00124893","volume":"2","author":"R. Hill","year":"1992","unstructured":"R. Hill and D. E. Newton, Optimal ternary linear codes, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 137\u2013157.","journal-title":"Designs, Codes and Cryptography"},{"key":"124968_CR17","volume-title":"The Theory of Error-Correcting Codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, Vol. 16, North-Holland and Mathematical Library, Amsterdam, (1977)."},{"key":"124968_CR18","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/S0019-9958(65)90080-X","volume":"8","author":"G. Solomon","year":"1965","unstructured":"G. Solomon and J. J. Stiffler, Algebraically punctured cyclic codes, Inform. and Control, Vol. 8 (1965) pp. 170\u2013179.","journal-title":"Inform. and Control"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008288219580.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008288219580\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008288219580.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:46:09Z","timestamp":1753760769000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008288219580"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["124968"],"URL":"https:\/\/doi.org\/10.1023\/a:1008288219580","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}