{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:07:39Z","timestamp":1774022859237,"version":"3.50.1"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1999,1]]},"DOI":"10.1023\/a:1008330510348","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"87-92","source":"Crossref","is-referenced-by-count":6,"title":["The Weight Enumerator of Linear Codes over GF q\nm) Having Generator Matrix over GF q"],"prefix":"10.1007","volume":"16","author":[{"given":"Keisuke","family":"Shiromoto","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"189033_CR1","volume-title":"Combinatorial Theory","author":"M. Aiger","year":"1980","unstructured":"M. Aiger, Combinatorial Theory, Springer-Verlag, Berlin-New York (1980)."},{"key":"189033_CR2","doi-asserted-by":"crossref","unstructured":"E. R. Berlekamp, Algebraic Coding Theory, MaGrow-Hill, Series in Systems Science (1970).","DOI":"10.1007\/978-3-7091-4325-4"},{"key":"189033_CR3","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0012-365X(77)90078-4","volume":"18","author":"T. Helleseth","year":"1977","unstructured":"T. Helleseth, T. Kl\u00f8ve, and J. Mykkeltveit, The weight distribution of irreducible cyclic codes with block lengths n1((ql \u2212 1)\/N), Discrete Math, Vol. 18 (1977) pp. 179-211.","journal-title":"Discrete Math"},{"key":"189033_CR4","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/0012-365X(77)90039-5","volume":"20","author":"T. Helleseth","year":"1977","unstructured":"T. Helleseth, The weight enumerator polynomials of some classes of codes with composite parity-check polynomials, Discrete Math, Vol. 20 (1977) pp. 21-31.","journal-title":"Discrete Math"},{"key":"189033_CR5","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/0012-365X(78)90114-0","volume":"23","author":"T. Kl\u00f8ve","year":"1978","unstructured":"T. Kl\u00f8ve, The weight distribution of linear codes over GF(q1) having generator matrix over GF(q), Discrete Math, Vol. 23 (1978) pp. 159-168.","journal-title":"Discrete Math"},{"key":"189033_CR6","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/0012-365X(92)90559-X","volume":"106\/107","author":"T. Kl\u00f8ve","year":"1992","unstructured":"T. Kl\u00f8ve, Support weight distribution of linear codes, Discrete Math, Vol. 106\/107 (1992) pp. 311-316.","journal-title":"Discrete Math"},{"key":"189033_CR7","volume-title":"The Theory of Error-Correcting Codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North Holland, New York (1977)."},{"key":"189033_CR8","volume-title":"Coding and Information Theory","author":"S. Roman","year":"1992","unstructured":"S. Roman, Coding and Information Theory, Springer-Verlag, Berlin-New York, GTM 134, (1992)."},{"key":"189033_CR9","doi-asserted-by":"crossref","first-page":"651","DOI":"10.14492\/hokmj\/1351516754","volume":"25","author":"K. Shiromoto","year":"1996","unstructured":"K. Shiromoto, A new MacWilliams type identity for linear codes, Hokkaido Math. J., Vol. 25 (1996) pp. 651-656.","journal-title":"Hokkaido Math. J."},{"key":"189033_CR10","first-page":"29","volume":"6","author":"T. Yoshida","year":"1993","unstructured":"T. Yoshida, MacWilliams identities for linear codes with group action, Kumamoto Math. J., Vol. 6 (1993) pp. 29-45.","journal-title":"Kumamoto Math. J."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008330510348.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008330510348\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008330510348.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:23:45Z","timestamp":1753759425000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008330510348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,1]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1999,1]]}},"alternative-id":["189033"],"URL":"https:\/\/doi.org\/10.1023\/a:1008330510348","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,1]]}}}