{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T07:10:49Z","timestamp":1724656249190},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T00:00:00Z","timestamp":1713484800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T00:00:00Z","timestamp":1713484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"The Ministry of Science, Technological Development and Innovation of the Republic of Serbia","award":["451-03-47\/2023-01\/200175"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12095-023-00687-7","type":"journal-article","created":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T10:01:43Z","timestamp":1713520903000},"page":"961-974","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integer codes correcting burst errors within one byte and single errors within two bytes"],"prefix":"10.1007","volume":"16","author":[{"given":"Aleksandar","family":"Radonjic","sequence":"first","affiliation":[]},{"given":"Pankaj Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Vujicic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,19]]},"reference":[{"key":"687_CR1","unstructured":"Ono, T, et al.: Bit error statistical analysis of optical transmission systems.In: Faulkner, D.W., Harmer, A.L. (eds.) pp. 43\u201349. IOS Press (2000)"},{"key":"687_CR2","unstructured":"James, L.: Error behaviour in optical networks. Ph.D. dissertation,Dept. Eng., Univ. Cambridge, U.K. (2005)"},{"key":"687_CR3","unstructured":"Anslow, P., Ishida, O.: Error distribution in optical links. IEEE 802.3 HSSG Interim Meeting, Nov. (2007)"},{"issue":"2","key":"687_CR4","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TC.2019.2947425","volume":"69","author":"A Das","year":"2020","unstructured":"Das, A., Touba, N.: A new class of single burst error correcting codes with parallel decoding. IEEE Trans. Comput. 69(2), 253\u2013259 (2020)","journal-title":"IEEE Trans. Comput."},{"key":"687_CR5","doi-asserted-by":"crossref","unstructured":"Wicker, S., Bhargava, V.: Reed-solomon codes and their applications. Wiley, Hoboken, NJ, USA (1999)","DOI":"10.1109\/9780470546345"},{"issue":"6","key":"687_CR6","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1109\/TIT.1987.1057364","volume":"33","author":"W Overveld","year":"1987","unstructured":"Overveld, W.: Multiple-burst error-correcting cyclic product codes. IEEE Trans. Inf. Theory 33(6), 919\u2013923 (1987)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"687_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TCOMM.2019.2948341","volume":"68","author":"L Song","year":"2020","unstructured":"Song, L., Huang, Q., Wang, Z.: Construction of multiple-burst-correction codes in transform domain and its relation to LDPC codes. IEEE Trans. Commun. 68(1), 40\u201354 (2020)","journal-title":"IEEE Trans. Commun."},{"issue":"11","key":"687_CR8","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1049\/el:19760214","volume":"12","author":"A Hashim","year":"1976","unstructured":"Hashim, A.: Linear block codes for nonindependent errors. Electron. Lett. 12(11), 276\u2013277 (1976)","journal-title":"Electron. Lett."},{"issue":"7","key":"687_CR9","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/LCOMM.2011.060111.110338","volume":"15","author":"L Villalba","year":"2011","unstructured":"Villalba, L., et al.: Efficient shortened cyclic codes correcting either random errors or bursts. IEEE Commun. Lett. 15(7), 749\u2013751 (2011)","journal-title":"IEEE Commun. Lett."},{"key":"687_CR10","unstructured":"Giladi, R.: Network processors: Architecture, programming, and implementation. Elsevier, Inc. (2008)"},{"key":"687_CR11","doi-asserted-by":"crossref","unstructured":"Sahu, P.: Optical networks and components: Fundamentals and advances. CRC Press (2020)","DOI":"10.1201\/9780429293764"},{"issue":"2","key":"687_CR12","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TC.2011.243","volume":"62","author":"A Radonjic","year":"2013","unstructured":"Radonjic, A., Vujicic, V.: Integer codes correcting burst errors within a byte. IEEE Trans. Comput. 62(2), 411\u2013415 (2013)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"687_CR13","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1109\/LCOMM.2016.2644661","volume":"21","author":"A Radonjic","year":"2017","unstructured":"Radonjic, A., Vujicic, V.: Integer codes correcting high-density byte asymmetric errors. IEEE Commun. Lett. 21(4), 694\u2013697 (2017)","journal-title":"IEEE Commun. Lett."},{"key":"687_CR14","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.ipl.2017.01.010","volume":"121","author":"A Radonjic","year":"2017","unstructured":"Radonjic, A., Vujicic, V.: Integer codes correcting single errors and burst asymmetric errors within a byte. Inform. Process. Lett. 121, 45\u201350 (2017)","journal-title":"Inform. Process. Lett."},{"issue":"8","key":"687_CR15","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.1109\/TVLSI.2020.2998364","volume":"28","author":"A Radonjic","year":"2020","unstructured":"Radonjic, A.: Integer codes correcting double errors and triple-adjacent errors within a byte. IEEE Trans. VLSI Syst. 28(8), 1901\u20131908 (2020)","journal-title":"IEEE Trans. VLSI Syst."},{"issue":"1","key":"687_CR16","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/s12190-022-01770-7","volume":"69","author":"NK Pokhrel","year":"2023","unstructured":"Pokhrel, N.K., Das, P.K., Radonjic, A.: Integer codes capable of correcting burst asymmetric errors. J. Appl. Math. Comput. 69(1), 711\u2013784 (2023)","journal-title":"J. Appl. Math. Comput."},{"key":"687_CR17","unstructured":"Vinck, A.J.H., Morita, H.: Codes over the ring of integer modulo m. IEICE Trans. Fundam. E81-A(10), 2013\u20132018 (1998)"},{"key":"687_CR18","doi-asserted-by":"crossref","unstructured":"Fossorier, M.: Universal burst error correction. Proc. IEEE Int'l Symp. Inform. Theory (ISIT '06), pp. 1969\u20131973 (2006)","DOI":"10.1109\/ISIT.2006.261893"},{"key":"687_CR19","unstructured":"Tinnirello, C.: Cyclic codes: Low-weight codewords and locators. Ph.D. dissertation, Dept. Math., Univ. Trento, Italy (2016)"},{"key":"687_CR20","doi-asserted-by":"crossref","unstructured":"Radonjic, A., Vujicic, V.: Logarithmic time encoding and decoding of integer error control codes. Eng. Rep. 5(11), e12675 (2023)","DOI":"10.1002\/eng2.12675"},{"issue":"2","key":"687_CR21","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s11265-016-1184-8","volume":"89","author":"Z Wu","year":"2017","unstructured":"Wu, Z., Gong, C., Liu, D.: Computational complexity analysis of FEC decoding on SDR platforms. J. Signal Process. Syst. 89(2), 209\u2013224 (2017)","journal-title":"J. Signal Process. Syst."},{"key":"687_CR22","unstructured":"Fog, A.: The microarchitecture of Intel, AMD and via CPUs: An optimization guide for assembly programmers and compiler makers,\u201d Technical University of Denmark, May 26, 2023. https:\/\/www.agner.org\/optimize\/microarchitecture.pdf"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00687-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-023-00687-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00687-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T06:07:50Z","timestamp":1724652470000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-023-00687-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,19]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["687"],"URL":"https:\/\/doi.org\/10.1007\/s12095-023-00687-7","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2024,4,19]]},"assertion":[{"value":"19 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}