{"id":"https://openalex.org/W3135189224","doi":"https://doi.org/10.1007/s12095-021-00472-4","title":"Linear codes of 2-designs as subcodes of the generalized Reed-Muller codes","display_name":"Linear codes of 2-designs as subcodes of the generalized Reed-Muller codes","publication_year":2021,"publication_date":"2021-02-27","ids":{"openalex":"https://openalex.org/W3135189224","doi":"https://doi.org/10.1007/s12095-021-00472-4","mag":"3135189224"},"language":"en","primary_location":{"id":"doi:10.1007/s12095-021-00472-4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12095-021-00472-4","pdf_url":null,"source":{"id":"https://openalex.org/S129219326","display_name":"Cryptography and Communications","issn_l":"1936-2447","issn":["1936-2447","1936-2455"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography and Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101566970","display_name":"Zhiwen He","orcid":"https://orcid.org/0000-0002-0579-5127"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiwen He","raw_affiliation_strings":["School of Mathematical Sciences, Zhejiang University, Hangzhou, 310027, China","School of Mathematical Sciences, Zhejiang University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Zhejiang University, Hangzhou, 310027, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Mathematical Sciences, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101564790","display_name":"Jiejing Wen","orcid":"https://orcid.org/0000-0001-8252-3881"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiejing Wen","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, 266237, China","School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","School of Cyber Science and Technology, Shandong University, Qingdao, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, China"],"raw_orcid":"https://orcid.org/0000-0001-8252-3881","affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, 266237, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101564790"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I4210132990","https://openalex.org/I80143920"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.14,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.52405524,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"13","issue":"3","first_page":"407","last_page":"423"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10849","display_name":"Finite Group Theory Research","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/2607","display_name":"Discrete Mathematics and Combinatorics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.7381147742271423},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.5877510905265808},{"id":"https://openalex.org/keywords/hermitian-matrix","display_name":"Hermitian matrix","score":0.5693286657333374},{"id":"https://openalex.org/keywords/ternary-golay-code","display_name":"Ternary Golay code","score":0.5615759491920471},{"id":"https://openalex.org/keywords/minimum-distance","display_name":"Minimum distance","score":0.5310637950897217},{"id":"https://openalex.org/keywords/ternary-operation","display_name":"Ternary operation","score":0.5278444290161133},{"id":"https://openalex.org/keywords/linear-code","display_name":"Linear code","score":0.5270954370498657},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.505987823009491},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4802175462245941},{"id":"https://openalex.org/keywords/affine-transformation","display_name":"Affine transformation","score":0.471794068813324},{"id":"https://openalex.org/keywords/row","display_name":"Row","score":0.4147747755050659},{"id":"https://openalex.org/keywords/invariant","display_name":"Invariant (physics)","score":0.4116842746734619},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.394687294960022},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.19691187143325806},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1896991729736328},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.14066052436828613},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.1347421109676361}],"concepts":[{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.7381147742271423},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.5877510905265808},{"id":"https://openalex.org/C94940","wikidata":"https://www.wikidata.org/wiki/Q652941","display_name":"Hermitian matrix","level":2,"score":0.5693286657333374},{"id":"https://openalex.org/C108906091","wikidata":"https://www.wikidata.org/wiki/Q7702927","display_name":"Ternary Golay code","level":5,"score":0.5615759491920471},{"id":"https://openalex.org/C3018063660","wikidata":"https://www.wikidata.org/wiki/Q6865448","display_name":"Minimum distance","level":2,"score":0.5310637950897217},{"id":"https://openalex.org/C64452783","wikidata":"https://www.wikidata.org/wiki/Q1524945","display_name":"Ternary operation","level":2,"score":0.5278444290161133},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.5270954370498657},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.505987823009491},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4802175462245941},{"id":"https://openalex.org/C92757383","wikidata":"https://www.wikidata.org/wiki/Q382497","display_name":"Affine transformation","level":2,"score":0.471794068813324},{"id":"https://openalex.org/C135598885","wikidata":"https://www.wikidata.org/wiki/Q1366302","display_name":"Row","level":2,"score":0.4147747755050659},{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.4116842746734619},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.394687294960022},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.19691187143325806},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1896991729736328},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.14066052436828613},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.1347421109676361},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s12095-021-00472-4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12095-021-00472-4","pdf_url":null,"source":{"id":"https://openalex.org/S129219326","display_name":"Cryptography and Communications","issn_l":"1936-2447","issn":["1936-2447","1936-2455"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography and Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W613035838","https://openalex.org/W1556782625","https://openalex.org/W1559343931","https://openalex.org/W2488283090","https://openalex.org/W2808611543","https://openalex.org/W2963030145","https://openalex.org/W2991466664","https://openalex.org/W2996271523","https://openalex.org/W3022561029","https://openalex.org/W3033074304","https://openalex.org/W3064996342","https://openalex.org/W3094527023","https://openalex.org/W4206775542","https://openalex.org/W4211147273"],"related_works":["https://openalex.org/W2035862129","https://openalex.org/W135568846","https://openalex.org/W2460434904","https://openalex.org/W1789159349","https://openalex.org/W2113911300","https://openalex.org/W4244929333","https://openalex.org/W832867880","https://openalex.org/W2147254059","https://openalex.org/W2151857680","https://openalex.org/W2731597386"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
