{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T12:29:24Z","timestamp":1649075364281},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T00:00:00Z","timestamp":1352764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s10623-012-9763-6","type":"journal-article","created":{"date-parts":[[2012,11,12]],"date-time":"2012-11-12T00:23:20Z","timestamp":1352679800000},"page":"317-330","source":"Crossref","is-referenced-by-count":0,"title":["A non-cyclic triple-error-correcting BCH-like code and some minimum distance results"],"prefix":"10.1007","volume":"72","author":[{"given":"Carl","family":"Bracken","sequence":"first","affiliation":[]},{"given":"Faruk","family":"G\u00f6lo\u011flu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,13]]},"reference":[{"key":"9763_CR1","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/S0019-9958(70)90399-2","volume":"17","author":"E.R. Berlekamp","year":"1970","unstructured":"Berlekamp E.R.: The weight enumerators for certain subcodes of the second order binary Reed-Muller codes. Inf. Control. 17, 485\u2013500 (1970)","journal-title":"Inf. Control."},{"key":"9763_CR2","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/S0019-9958(60)90287-4","volume":"3","author":"R.C. Bose","year":"1960","unstructured":"Bose R.C., Ray-Chaudhuri D.K.: On a class of error correcting binary group codes. Inf. Control. 3, 68\u201379 (1960)","journal-title":"Inf. Control."},{"key":"9763_CR3","unstructured":"Bracken C., Byrne E., Markin N., McGuire G.: Determining the nonlinearity of a new family of APN functions. In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, vol. 4851 of Lecture Notes in Computer Science, pp. 72\u201379. Springer, Berlin, (2007)."},{"issue":"1\u20134","key":"9763_CR4","first-page":"135","volume":"34","author":"K.A. Browning","year":"2009","unstructured":"Browning K.A., Dillon J.F., Kibler R.E., McQuistan M.T.: APN polynomials and related codes. J. Comb. Inf. Syst. Sci. 34(1\u20134), 135\u2013159 (2009)","journal-title":"J. Comb. Inf. Syst. Sci."},{"key":"9763_CR5","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W. Bosma","year":"1997","unstructured":"Bosma W., Cannon J., Playoust C.: The Magma algebra system. I. The user language. J. Symb. Comput. 24, 235\u2013265 (1997)","journal-title":"J. Symb. Comput."},{"issue":"2","key":"9763_CR6","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C. Carlet","year":"1998","unstructured":"Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998)","journal-title":"Des. Codes Cryptogr."},{"key":"9763_CR7","unstructured":"Canteaut A., Charpin P., Dobbertin H.: Binary m-sequences with three-valued crosscorrelation: a proof of Welch\u2019s conjecture. IEEE Trans. Inf. Theory. 46(1), 4\u20138 (2000)."},{"issue":"2","key":"9763_CR8","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1109\/18.825842","volume":"46","author":"A. Chang","year":"2000","unstructured":"Chang A., Gaal P., Golomb S., Gong G., Helleseth T., Kumar P.V.: On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code. IEEE Trans. Inf. Theory. 46(2), 680\u2013687 (2000)","journal-title":"IEEE Trans. Inf. Theory."},{"key":"9763_CR9","doi-asserted-by":"crossref","unstructured":"Crama Y., Hammer P.L., (eds.): Boolean Models and Methods in Mathematics, Computer science, and Engineering, volume 134 of Encyclopedia of Mathematics and Its Applications. Cambridge University Press, Cambridge (2010).","DOI":"10.1017\/CBO9780511780448"},{"issue":"1\u20133","key":"9763_CR10","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1023\/A:1026475109375","volume":"17","author":"H. Dobbertin","year":"1999","unstructured":"Dobbertin H.: Another proof of Kasami\u2019s theorem. Des. Codes Cryptogr. 17(1\u20133), 177\u2013180 (1999)","journal-title":"Des. Codes Cryptogr."},{"issue":"4","key":"9763_CR11","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.1109\/18.761283","volume":"45","author":"H. Dobbertin","year":"1999","unstructured":"Dobbertin H.: Almost perfect nonlinear power functions on GF(2 n ): the Welch case. IEEE Trans. Inf. Theory. 45(4), 1271\u20131275 (1999)","journal-title":"IEEE Trans. Inf. Theory."},{"issue":"1\u20132","key":"9763_CR12","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1006\/inco.1998.2764","volume":"151","author":"H. Dobbertin","year":"1999","unstructured":"Dobbertin H.: Almost perfect nonlinear power functions on GF(2 n ): the Niho case. Inf. Comput. 151(1\u20132), 57\u201372 (1999)","journal-title":"Inf. Comput."},{"issue":"1","key":"9763_CR13","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3934\/amc.2009.3.59","volume":"3","author":"Y. Edel","year":"2009","unstructured":"Edel Y., Pott A.: A new almost perfect nonlinear function which is not quadratic. Adv. Math. Commun. 3(1), 59\u201381 (2009)","journal-title":"Adv. Math. Commun."},{"issue":"1","key":"9763_CR14","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R. Gold","year":"1968","unstructured":"Gold R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions (corresp.). IEEE Trans. Inf. Theory. 14(1), 154\u2013156 (1968)","journal-title":"Inf. Theory."},{"key":"9763_CR15","first-page":"147","volume":"2","author":"A. Hocquenghem","year":"1959","unstructured":"Hocquenghem A.: Codes correcteurs d\u2019erreurs. Chiffres. 2, 147\u2013156 (1959)","journal-title":"Chiffres."},{"key":"9763_CR16","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/S0019-9958(71)90473-6","volume":"18","author":"T. Kasami","year":"1971","unstructured":"Kasami T.: The weight enumerators for several classes of subcodes of the 2nd order binary Reed-Muller codes. Inf. Control. 18, 369\u2013394 (1971)","journal-title":"Inf. Control."},{"issue":"2","key":"9763_CR17","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.ffa.2011.09.009","volume":"18","author":"G. McGuire","year":"2012","unstructured":"McGuire G.: An alternative proof of a result on the weight divisibility of a cyclic code using supersingular curves. Finite Fields Appl. 18(2), 434\u2013436 (2012)","journal-title":"Finite Fields Appl."},{"key":"9763_CR18","unstructured":"Pless V.S., Huffman W.C., Brualdi R.A., (eds.): Handbook of Coding Theory, vol. I, II. North-Holland, Amsterdam (1998)."},{"key":"9763_CR19","doi-asserted-by":"crossref","unstructured":"Serre J.P.: A Course in Arithmetic. Springer, New York. (Translated from the French, Graduate Texts in Mathematics. No. 7) (1973).","DOI":"10.1007\/978-1-4684-9884-4"},{"issue":"1","key":"9763_CR20","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/TIT.1986.1057134","volume":"32","author":"J.H. Lint van","year":"1986","unstructured":"van Lint J.H., Wilson R.M.: On the minimum distance of cyclic codes. IEEE Trans. Inf. Theory. 32(1), 23\u201340 (1986)","journal-title":"IEEE Trans. Inf. Theory."},{"issue":"1","key":"9763_CR21","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.ffa.2011.06.005","volume":"18","author":"X. Zeng","year":"2012","unstructured":"Zeng X., Shan J., Hu L.: A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions. Finite Fields Appl. 18(1), 70\u201392 (2012)","journal-title":"Finite Fields Appl."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9763-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9763-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9763-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:35Z","timestamp":1559231915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9763-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,13]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["9763"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9763-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,13]]}}}