{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:23:34Z","timestamp":1772807014571,"version":"3.50.1"},"reference-count":27,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2017]]},"DOI":"10.3934\/amc.2017041","type":"journal-article","created":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T10:06:45Z","timestamp":1504087605000},"page":"503-531","source":"Crossref","is-referenced-by-count":13,"title":["Relative generalized Hamming weights of &lt;i&gt;q&lt;\/i&gt;-ary Reed-Muller codes"],"prefix":"10.3934","volume":"11","author":[{"given":"Olav","family":"Geil","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Martin","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, Aalborg University, Fredrik Bajersvej 7G, DK-9220, Aalborg \u00d8st, Denmark"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2017041-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2006.12.004"},{"key":"key-10.3934\/amc.2017041-2","unstructured":"T. Bains,  <i>Generalized Hamming Weights and Their Applications to Secret Sharing Schemes<\/i> Master's thesis, Univ. Amsterdam, 2008."},{"key":"key-10.3934\/amc.2017041-3","doi-asserted-by":"crossref","unstructured":"S. L. Bezrukov and U. Leck, Macaulay posets <i>Electr. J. Combin. <\/i>  <b>1000<\/b> (2005), DS12.","DOI":"10.37236\/33"},{"key":"key-10.3934\/amc.2017041-4","doi-asserted-by":"publisher","unstructured":"H. Chen, R. Cramer, S. Goldwasser, R. De Haan and V. Vaikuntanathan, Secure computationfrom random error correcting codes, in <i>Adv. Crypt. -EUROCRYPT 2007<\/i>, Springer, 2007, 291\u2013310.","DOI":"10.1007\/978-3-540-72540-4_17"},{"key":"key-10.3934\/amc.2017041-5","doi-asserted-by":"publisher","unstructured":"D. A. Cox, J. Little and D. O'Shea,  <i>Ideals, Varieties and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra<\/i> 3rd edition, Springer, 2012.","DOI":"10.1007\/978-1-4757-2181-2"},{"key":"key-10.3934\/amc.2017041-6","doi-asserted-by":"crossref","unstructured":"I. Duursma and J. Shen, Multiplicative secret sharing schemes from Reed-Muller type codes, in <i>Proc. 2012 IEEE Int. Symp. Inf. Theory (ISIT)<\/i>, IEEE, 2012,264\u2013268.","DOI":"10.1109\/ISIT.2012.6283999"},{"key":"key-10.3934\/amc.2017041-7","unstructured":"O. Geil, S. Martin, U. Mart\u00ed nez-Pe\u00f1as, R. Matsumoto and D. Ruano, On asymptotically good ramp secret sharing schemes preprint, arXiv: 1502.05507"},{"key":"key-10.3934\/amc.2017041-8","doi-asserted-by":"publisher","unstructured":"O. Geil, S. Martin, U. Mart\u00ed nez-Pe\u00f1as and D. Ruano, Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoths second tower <i>J. Algebra Comb. Discrete Struct. Appl. <\/i>  to appear.","DOI":"10.13069\/jacodesmath.34390"},{"key":"key-10.3934\/amc.2017041-9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2345375"},{"key":"key-10.3934\/amc.2017041-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2013.03.005"},{"key":"key-10.3934\/amc.2017041-11","unstructured":"P. Heijnen,  <i>Some Classes of Linear Codes<\/i> Ph. D thesis, Technische Universiteit Eindhoven, 1999."},{"key":"key-10.3934\/amc.2017041-12","doi-asserted-by":"publisher","unstructured":"P. Heijnen and R. Pellikaan, Generalized Hamming weights of <i>q<\/i>-ary Reed-Muller codes in <i>IEEE Trans. Inform. Theory<\/i> Citeseer, 1998.","DOI":"10.1109\/18.651015"},{"key":"key-10.3934\/amc.2017041-13","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(77)90078-4"},{"key":"key-10.3934\/amc.2017041-14","doi-asserted-by":"publisher","unstructured":"T. H\u00f8holdt, On (or in) Dick Blahut's footprint, <i>Codes, Curves and Signals<\/i> (ed. A. Vardy), Kluwer Acad. Publ. , 1998, 3\u20139.","DOI":"10.1007\/978-1-4615-5121-8_1"},{"key":"key-10.3934\/amc.2017041-15","doi-asserted-by":"publisher","unstructured":"J. Katz and L. Trevisan, On the efficiency of local decoding procedures for error-correctingcodes, in <i>Proc. 32nd Ann. ACM Symp. Theory Comp. <\/i> , ACM, 2000, 80\u201386.","DOI":"10.1145\/335305.335315"},{"key":"key-10.3934\/amc.2017041-16","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(78)90114-0"},{"key":"key-10.3934\/amc.2017041-17","doi-asserted-by":"publisher","unstructured":"N. Koblitz,  <i>A Course in Number Theory and Cryptography<\/i> Springer, 1994.","DOI":"10.1007\/978-1-4419-8592-7"},{"key":"key-10.3934\/amc.2017041-18"},{"key":"key-10.3934\/amc.2017041-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2015.02.006"},{"key":"key-10.3934\/amc.2017041-20","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9170-1"},{"key":"key-10.3934\/amc.2017041-21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.842763"},{"key":"key-10.3934\/amc.2017041-22","doi-asserted-by":"publisher","DOI":"10.1109\/18.104317"},{"key":"key-10.3934\/amc.2017041-23","doi-asserted-by":"publisher","unstructured":"M. Tsfasman and S. G. Vladut,  <i>Algebraic-Geometric Codes<\/i> Kluwer Acad. Publ. , 1991.","DOI":"10.1007\/978-94-011-3810-9"},{"key":"key-10.3934\/amc.2017041-24","doi-asserted-by":"publisher","DOI":"10.1109\/18.133259"},{"key":"key-10.3934\/amc.2017041-25","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"key-10.3934\/amc.2017041-26","doi-asserted-by":"publisher","DOI":"10.1561\/0400000030"},{"key":"key-10.3934\/amc.2017041-27","unstructured":"J. Zhang and K. Feng, Relative generalized Hamming weights of cyclic codes preprint, arXiv: 1505.07277"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/aimsciences.org\/download\/files\/1930-5346_2017_3_503.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:01:43Z","timestamp":1772791303000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2017041"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2017041","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}