{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:51Z","timestamp":1740122571807,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-16-1-0011"],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005156","name":"Alexander von Humboldt-Stiftung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005156","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10623-017-0344-6","type":"journal-article","created":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T03:43:34Z","timestamp":1488339814000},"page":"587-610","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Extension sets, affine designs, and Hamada\u2019s conjecture"],"prefix":"10.1007","volume":"86","author":[{"given":"Dieter","family":"Jungnickel","sequence":"first","affiliation":[]},{"given":"Yue","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Vladimir D.","family":"Tonchev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,1]]},"reference":[{"key":"344_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781316529836","volume-title":"Designs and their Codes","author":"EF Assmus Jr","year":"1992","unstructured":"Assmus Jr. E.F., Key J.D.: Designs and their Codes. Cambridge University Press, Cambridge (1992)."},{"key":"344_CR2","volume-title":"Design Theory","author":"T Beth","year":"1999","unstructured":"Beth T., Jungnickel D., Lenz H.: Design Theory, 2nd edn. Cambridge University Press, Cambridge (1999).","edition":"2"},{"key":"344_CR3","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/S0378-3758(00)00281-0","volume":"95","author":"A Blokhuis","year":"2001","unstructured":"Blokhuis A., Haemers W.H.: An infinite family of quasi-symmetric designs. J. Stat. Plan. Inference 95, 117\u2013119 (2001).","journal-title":"J. Stat. Plan. Inference"},{"key":"344_CR4","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.jcta.2010.06.007","volume":"118","author":"DC Clark","year":"2011","unstructured":"Clark D.C., Jungnickel D., Tonchev V.D.: Affine geometry designs, polarities, and Hamada\u2019s conjecture. J. Comb. Theory (A) 118, 231\u2013239 (2011).","journal-title":"J. Comb. Theory (A)"},{"key":"344_CR5","doi-asserted-by":"crossref","first-page":"153","DOI":"10.32917\/hmj\/1206137446","volume":"3","author":"N Hamada","year":"1973","unstructured":"Hamada N.: On the $$p$$ p -rank of the incidence matrix of a balanced or partially balanced incomplete block design and its application to error correcting codes. Hiroshima Math. J. 3, 153\u2013226 (1973).","journal-title":"Hiroshima Math. J."},{"key":"344_CR6","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/0097-3165(75)90001-1","volume":"18","author":"N Hamada","year":"1975","unstructured":"Hamada N., Ohmori H.: On the BIB-design having the minimum $$p$$ p -rank. J. Comb. Theory Ser. A 18, 131\u2013140 (1975).","journal-title":"J. Comb. Theory Ser. A"},{"key":"344_CR7","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s10623-003-4195-y","volume":"34","author":"M Harada","year":"2005","unstructured":"Harada M., Lam C.W.H., Tonchev V.D.: Symmetric (4,4)-nets and generalized Hadamard matrices over groups of order 4. Des. Codes Cryptogr. 34, 71\u201387 (2005).","journal-title":"Des. Codes Cryptogr."},{"key":"344_CR8","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198502951.001.0001","volume-title":"Projective Geometries over Finite Fields","author":"JWP Hirschfeld","year":"1998","unstructured":"Hirschfeld J.W.P.: Projective Geometries over Finite Fields, 2nd edn. Oxford University Press, Oxford (1998).","edition":"2"},{"key":"344_CR9","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/BF00146828","volume":"16","author":"D Jungnickel","year":"1984","unstructured":"Jungnickel D.: The number of designs with classical parameters grows exponentially. Geom. Dedicata 16, 167\u2013178 (1984).","journal-title":"Geom. Dedicata"},{"key":"344_CR10","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s00022-011-0086-y","volume":"101","author":"D Jungnickel","year":"2011","unstructured":"Jungnickel D.: Recent results on designs with classical parameters. J. Geom. 101, 137\u2013155 (2011).","journal-title":"J. Geom."},{"key":"344_CR11","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s10623-008-9249-8","volume":"51","author":"D Jungnickel","year":"2009","unstructured":"Jungnickel D., Tonchev V.D.: Polarities, quasi-symmetric designs, and Hamada\u2019s conjecture. Des. Codes Cryptogr. 51, 131\u2013140 (2009).","journal-title":"Des. Codes Cryptogr."},{"key":"344_CR12","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/s10623-015-0065-7","volume":"77","author":"D Jungnickel","year":"2015","unstructured":"Jungnickel D., Tonchev V.D.: Maximal arcs and quasi-symmetric designs. Des. Codes Cryptogr. 77, 365\u2013374 (2015).","journal-title":"Des. Codes Cryptogr."},{"key":"344_CR13","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/0021-8693(75)90130-1","volume":"33","author":"WM Kantor","year":"1975","unstructured":"Kantor W.M.: Symplectic groups, symmetric designs and line ovals. J. Algebr. 33, 43\u201358 (1975).","journal-title":"J. Algebr."},{"key":"344_CR14","unstructured":"Kimberley, M.E.: On the construction of certain Hadamard designs. Ph.\u00a0D. thesis, University of London (1968)."},{"key":"344_CR15","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/BF01110942","volume":"119","author":"ME Kimberley","year":"1971","unstructured":"Kimberley M.E.: On the construction of certain Hadamard designs. Math. Z. 119, 41\u201359 (1971).","journal-title":"Math. Z."},{"key":"344_CR16","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/S0378-3758(96)00018-3","volume":"56","author":"C Lam","year":"1996","unstructured":"Lam C., Tonchev V.D.: Classification of affine resolvable 2-(27,9,4) designs. J. Stat. Plan. Inference 56, 187\u2013202 (1996).","journal-title":"J. Stat. Plan. Inference"},{"key":"344_CR17","first-page":"3","volume":"98","author":"L Lunelli","year":"1964","unstructured":"Lunelli L., Sce M.: Considerazioni aritmetiche e resultati sperimentali sui $$\\{K, n\\}_q$$ { K , n } q archi. Ist. Lombardo Accad. Sci. Lett. Rend. A 98, 3\u201352 (1964).","journal-title":"Ist. Lombardo Accad. Sci. Lett. Rend. A"},{"key":"344_CR18","doi-asserted-by":"crossref","first-page":"2742","DOI":"10.1016\/j.disc.2006.06.039","volume":"308","author":"VC Mavron","year":"2008","unstructured":"Mavron V.C., McDonough T.P., Tonchev V.D.: On affine designs and Hadamard designs with line spreads. Discret. Math. 308, 2742\u20132750 (2008).","journal-title":"Discret. Math."},{"key":"344_CR19","unstructured":"Polverino O., Zullo F.: Codes arising from incidence matrices of points and hyperplanes in $$PG(n,q)$$ P G ( n , q ) . arXiv:1606.02222 (2016)."},{"key":"344_CR20","doi-asserted-by":"crossref","first-page":"736","DOI":"10.4153\/CJM-1964-070-1","volume":"16","author":"SS Shrikhande","year":"1964","unstructured":"Shrikhande S.S.: Generalized Hadamard matrices and orthogonal arrays of strength two. Can. J. Math. 16, 736\u2013740 (1964).","journal-title":"Can. J. Math."},{"key":"344_CR21","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/0097-3165(86)90009-9","volume":"42","author":"VD Tonchev","year":"1986","unstructured":"Tonchev V.D.: Quasi-symmetric 2-(31, 7, 7)-designs and a revision of Hamada\u2019s conjecture. J. Comb. Theory Ser. A 42, 104\u2013110 (1986).","journal-title":"J. Comb. Theory Ser. A"},{"key":"344_CR22","volume-title":"Combinatorial Configurations","author":"VD Tonchev","year":"1988","unstructured":"Tonchev V.D.: Combinatorial Configurations. Wiley, New York (1988)."},{"key":"344_CR23","doi-asserted-by":"publisher","unstructured":"Tonchev V.D.: Linearly embeddable designs. Des. Codes Cryptogr. (2016). doi: 10.1007\/s10623-016-0304-6 .","DOI":"10.1007\/s10623-016-0304-6"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-017-0344-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0344-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0344-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T19:13:07Z","timestamp":1719083587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-017-0344-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,1]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["344"],"URL":"https:\/\/doi.org\/10.1007\/s10623-017-0344-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2017,3,1]]}}}