{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T10:10:50Z","timestamp":1769508650779,"version":"3.49.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1998,12,1]],"date-time":"1998-12-01T00:00:00Z","timestamp":912470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1998,12,1]],"date-time":"1998-12-01T00:00:00Z","timestamp":912470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1998,12]]},"DOI":"10.1023\/a:1008317124941","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"245-258","source":"Crossref","is-referenced-by-count":9,"title":["The Nonexistence of Some Optimal Ternary Codes of Dimension Five"],"prefix":"10.1007","volume":"15","author":[{"given":"Ivan N.","family":"Landjev","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"185603_CR1","unstructured":"G. Bogdanova and I. Boukliev, New linear codes of dimension 5 over GF(3), Proc. Fourth Int. Woorcshop on ACCT, Novgorod (1994) pp. 41-43."},{"key":"185603_CR2","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/TIT.1973.1054939","volume":"IT-19","author":"C. D. Baumert","year":"1973","unstructured":"C. D. Baumert and M. J. McEliece, A note on the Griesmer bound, IEEE Trans. Inf. Theory, Vol. IT-19 (1973) pp. 134-135.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"185603_CR3","unstructured":"A. E. Brouwer and M. van Eupen, The correspondence between projective codes and two-weight codes, Designs, Codes and Cryptography, to appear."},{"key":"185603_CR4","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/18.272479","volume":"IT-40","author":"M. van Eupen","year":"1994","unstructured":"M. van Eupen, Four new optimal ternary linear codes, IEEE Trans. Inf. Theory, Vol. IT-40 (1994) p. 193.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"185603_CR5","unstructured":"M. van Eupen, An extension theorem for ternary linear codes, Proc. Int Workshop on Optimal Codes, Sozopol (1995) pp. 137-140."},{"key":"185603_CR6","first-page":"235","volume":"7","author":"M. van Eupen","year":"1996","unstructured":"M. van Eupen, N. Hamada, and Y. Watamori, The nonexistence of ternary [50,5,32] codes, Designs, Codes and Cryptography, Vol. 7 (1996) pp. 235-237.","journal-title":"Designs, Codes and Cryptography"},{"key":"185603_CR7","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/BF01388456","volume":"4","author":"M. van Eupen","year":"1994","unstructured":"M. van Eupen and R. Hill, An optimal ternary [69,5,45] code and related codes, Designs, Codes and Cryptography, Vol. 4 (1994) pp. 271-282.","journal-title":"Designs, Codes and Cryptography"},{"key":"185603_CR8","unstructured":"M. van Eupen and P. Lisonek, Classification of some optimal ternary linear codes of small length, Designs, Codes and Cryptography, to appear."},{"key":"185603_CR9","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1147\/rd.45.0532","volume":"4","author":"J. H. Griesmer","year":"1960","unstructured":"J. H. Griesmer, A bound for error-correcting codes, IBM J. Res. Develop., Vol. 4 (1960) pp. 532-542.","journal-title":"IBM J. Res. Develop."},{"key":"185603_CR10","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/BFb0087992","volume":"1518","author":"N. Hamada","year":"1992","unstructured":"N. Hamada and T. Helleseth, A characterization of some minihypers in PG(t, q)and its applications to error-correcting codes, Lecture Notes in Mathematics, Vol. 1518 (1992) pp. 43-62.","journal-title":"Lecture Notes in Mathematics"},{"key":"185603_CR11","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/BF00141966","volume":"2","author":"N. Hamada","year":"1992","unstructured":"N. Hamada, T. Helleseth, and \u00d8. Ytrehus, On the construction of [q\n4 + q\n2 \u2212 q5q\n4 \u2212 q\n3 + q\n2 \u2212 2q; q] codes meeting the Griesmer bound, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 225-229.","journal-title":"Designs, Codes and Cryptography"},{"key":"185603_CR12","first-page":"25","volume":"35","author":"N. Hamada","year":"1993","unstructured":"N. Hamada, T. Helleseth, and \u00d8. Ytrehus, The nonexistence of [51,5,33;3] codes, Ars Combinatoria, Vol. 35 (1993) pp. 25-32.","journal-title":"Ars Combinatoria"},{"key":"185603_CR13","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/0378-3758(95)00126-3","volume":"52","author":"N. Hamada","year":"1996","unstructured":"N. Hamada and Y. Watamori, The nonexistence of [71,5,46;3] codes, J. Stat. Pl. and Inference, Vol. 52 (1996) pp. 379-394.","journal-title":"J. Stat. Pl. and Inference"},{"key":"185603_CR14","first-page":"75","volume-title":"Proc. 2nd IMA Conference on Cryptography and Coding","author":"R. Hill","year":"1992","unstructured":"R. Hill, Optimal linear codes, Proc. 2nd IMA Conference on Cryptography and Coding, (C. Mitchell ed.), Oxford Univ. Press, Oxford (1992) pp. 75-104."},{"key":"185603_CR15","unstructured":"R. Hill and I. Landjev, On the nonexistence of some quaternary codes, Proc. IMA Conf. on Finite Fields and Applications, IMA Conf. Series 59 (1996), pp. 85-98."},{"key":"185603_CR16","first-page":"345","volume-title":"Proc. Int. Symp. on Inf. Theory","author":"R. Hill","year":"1995","unstructured":"R. Hill and P. Lizak, Extensions of linear codes, Proc. Int. Symp. on Inf. Theory, Whistler, Canada (1995) p. 345."},{"key":"185603_CR17","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/BF00124893","volume":"2","author":"R. Hill","year":"1992","unstructured":"R. Hill, and D. E. Newton, Optimal ternary codes, Designs, Codes and Cryptography, Vol. 2 (1992) p. 137-157.","journal-title":"Designs, Codes and Cryptography"},{"key":"185603_CR18","volume-title":"Projective Geometries over Finite Fields","author":"J. W. P. Hirschfeld","year":"1979","unstructured":"J. W. P. Hirschfeld, Projective Geometries over Finite Fields, Clarendon Press, Oxford (1979)."},{"key":"185603_CR19","unstructured":"I. Landjev, The nonexistence of [143;5;94]3 codes, Proc. Int.Workshop on Optimal Codes, Sozopol (1995) pp. 108-116."},{"key":"185603_CR20","volume-title":"The Theory of Error-Correcting Codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam (1977)."},{"key":"185603_CR21","first-page":"149","volume":"25","author":"G. Pellegrino","year":"1971","unstructured":"G. Pellegrino, Sul massimo ordine della calotte in S\n4,3, Mathematiche, Vol. 25 (1971) pp. 149-157.","journal-title":"Sul massimo ordine della calotte in S4,3, Mathematiche"},{"key":"185603_CR22","unstructured":"B. Qvist, Some remarcs concerning curves of the second degree in a finite plane, Ann. Acad. Sci. Fenn. Ser. A Vol. 134 (1952)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008317124941.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008317124941\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008317124941.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:47:32Z","timestamp":1753760852000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008317124941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,12]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1998,12]]}},"alternative-id":["185603"],"URL":"https:\/\/doi.org\/10.1023\/a:1008317124941","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998,12]]}}}