{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:06:38Z","timestamp":1754161598190,"version":"3.41.2"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1996,3,1]],"date-time":"1996-03-01T00:00:00Z","timestamp":825638400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1996,3,1]],"date-time":"1996-03-01T00:00:00Z","timestamp":825638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1996,3]]},"DOI":"10.1023\/a:1018042823954","type":"journal-article","created":{"date-parts":[[2003,11,3]],"date-time":"2003-11-03T19:30:08Z","timestamp":1067887808000},"page":"235-237","source":"Crossref","is-referenced-by-count":1,"title":["The Nonexistence of Ternary [50,5,32] Codes"],"prefix":"10.1007","volume":"7","author":[{"given":"Marijn","family":"Van Eupen","sequence":"first","affiliation":[]},{"given":"Noboru","family":"Hamada","sequence":"additional","affiliation":[]},{"given":"Yoko","family":"Watamori","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"105395_CR1","first-page":"4143","volume-title":"Proceedings of the Fourth International Workshop on Algebraic and Combinatorial Coding Theory","author":"G. T. Bogdanova","year":"1994","unstructured":"G. T Bogdanova and I. G. Boukliev, New linear codes of dimension 5 overGF(3), Proceedings of the Fourth International Workshop on Algebraic and Combinatorial Coding Theory, Novgorod, Russia, September (1994) pp. 4143."},{"key":"105395_CR2","unstructured":"M. van Eupen, Some new results for ternary linear codes of dimension 5 and 6, IEEE Trans. Inform. Theory to appear."},{"key":"105395_CR3","first-page":"161 191","volume":"18","author":"N. Hamada","year":"1993","unstructured":"N. Hamada, A survey ot recent work on characterization of minihypers in PG(t, q) and nonbinary linear codes meeting the Griesmer bound, J Combin. Inform. Syst. Sci. Vol. 18(1993) pp. 161 191.","journal-title":"J Combin. Inform. Syst. Sci."},{"key":"105395_CR4","unstructured":"N. Hamada, The nonexistence of some quatemary linear codes meeting the Griesmer bound and the bounds for n4(5, d) 1 < d < 256, Math. Japonica Vol. 43(1996), to appear."},{"key":"105395_CR5","first-page":"25 32","volume":"35","author":"N. Hamada","year":"1993","unstructured":"N. Hamada, T. Helleseth and \u00d8. Ytrehus, The nonexistence of [51, 5, 33: 3] codes, Ars Combin. Vol. 35 (1993) pp. 25 32.","journal-title":"Ars Combin"},{"key":"105395_CR6","unstructured":"N. Hamada and Y. Watamori, The nonexistence of [71, 5, 46; 3]-codes, J Statist Plann. Inference to appear."},{"key":"105395_CR7","unstructured":"N. Hamada and Y. Watamori, The noncxistcnsc of some trnary linear codsa of dimension 6 and the bounds for n3(6, d), 1 < d < 243, Math. Japonica Vol. 43(1996), to appear."},{"key":"105395_CR8","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/BF00124893","volume":"2","author":"R. Hill","year":"1992","unstructured":"R. Hill and D. E. Newton, Optimal ternary linear codes, Designs, Codes and Cryptography Vol. 2(1992) pp. 137\u2013157.","journal-title":"Designs, Codes and Cryptography"},{"key":"105395_CR9","volume-title":"Encyclopedia of Mathematics and its Applications","author":"K. Lidl","year":"1983","unstructured":"K. Lidl and H. Niederreter, Finite helds, Encyclopedia of Mathematics and its Applications Vol. 20, Addison-Wesley Publishing Company, Massachusetts, (1983)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1018042823954.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1018042823954\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1018042823954.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:47:43Z","timestamp":1753760863000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1018042823954"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,3]]},"references-count":9,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1996,3]]}},"alternative-id":["105395"],"URL":"https:\/\/doi.org\/10.1023\/a:1018042823954","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1996,3]]}}}