{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T10:19:56Z","timestamp":1778840396413,"version":"3.51.4"},"reference-count":21,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.3934\/amc.2025017","type":"journal-article","created":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T12:21:36Z","timestamp":1747052496000},"page":"1694-1712","source":"Crossref","is-referenced-by-count":1,"title":["Additive complementary pairs of codes"],"prefix":"10.3934","volume":"19","author":[{"given":"Sanjit","family":"Bhowmick","sequence":"first","affiliation":[]},{"given":"Deepak Kumar","family":"Dalai","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, National Institute of Science Education and Research, An OCC of Homi Bhabha National Institute, Bhubaneswar, Odisha 752050, India"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2025017-1","doi-asserted-by":"crossref","unstructured":"<p>S. Bhowmick, D. K. Dalai and S. Mesnager, On linear complementary pairs of algebraic geometry codes over finite fields, In <i>Discrete Mathematics<\/i>, <b>347<\/b> (2024), 114193, 1-11.<\/p>","DOI":"10.1016\/j.disc.2024.114193"},{"key":"key-10.3934\/amc.2025017-2","doi-asserted-by":"crossref","unstructured":"<p>J. Bringer, C. Carlet, H. Chabanne, S. Guilley and H. Maghrebi, Orthogonal direct sum masking - A smartcard friendly computation paradigm in a code, with built-in protection against side-channel and fault attacks, In <i>Information Security Theory and Practice. Securing the Internet of Things WISTP 2014<\/i>, volume 8501 of <i>Lecture Notes in Computer Science<\/i>. Springer, (2014), 40-56.<\/p>","DOI":"10.1007\/978-3-662-43826-8_4"},{"key":"key-10.3934\/amc.2025017-3","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-015-0257-4"},{"key":"key-10.3934\/amc.2025017-4","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2016.10.131"},{"key":"key-10.3934\/amc.2025017-5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2796125"},{"key":"key-10.3934\/amc.2025017-6","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0463-8"},{"key":"key-10.3934\/amc.2025017-7"},{"key":"key-10.3934\/amc.2025017-8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2789347"},{"key":"key-10.3934\/amc.2025017-9","doi-asserted-by":"crossref","unstructured":"<p>W. H. Choi, C. G\u00fcneri, J. L. Kim and F. \u00d6zbudak, Theory of additive complementary dual codes, constructions and computations, <i>Finite Fileds Appl.<\/i>, <b>92<\/b> (2023), 102303, 1-31.<\/p>","DOI":"10.1016\/j.ffa.2023.102303"},{"key":"key-10.3934\/amc.2025017-10"},{"key":"key-10.3934\/amc.2025017-11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2159040"},{"key":"key-10.3934\/amc.2025017-12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2872046"},{"key":"key-10.3934\/amc.2025017-13"},{"key":"key-10.3934\/amc.2025017-14"},{"key":"key-10.3934\/amc.2025017-15","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(92)90563-U"},{"key":"key-10.3934\/amc.2025017-16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2766075"},{"key":"key-10.3934\/amc.2025017-17","doi-asserted-by":"crossref","unstructured":"<p>X. T. Ngo, S. Bhasin, J. Danger, S. Guilley and Z. Najm, Linear complementary dual code improvement to strengthen encoded circuit against hardware trojan horses, <i>IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May 2015<\/i>, IEEE Computer Society, (2015), 82-87.<\/p>","DOI":"10.1109\/HST.2015.7140242"},{"key":"key-10.3934\/amc.2025017-18","doi-asserted-by":"publisher","DOI":"10.1109\/18.782103"},{"key":"key-10.3934\/amc.2025017-19","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-021-00545-4"},{"key":"key-10.3934\/amc.2025017-20","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-022-01106-3"},{"key":"key-10.3934\/amc.2025017-21","doi-asserted-by":"crossref","unstructured":"<p>M. Shi, S. Liu, F. \u00d6zbudak and P. Sol\u00e9, Additive cyclic complementary dual codes over $ {{ I\\!F}}_4$, <i>Finite Fileds Appl.<\/i>, <b>75<\/b> (2022), 102087, 1-22.<\/p>","DOI":"10.1016\/j.ffa.2022.102087"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T01:35:32Z","timestamp":1750988132000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2025017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":21,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2025017","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}