{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:59:11Z","timestamp":1775145551344,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,4,13]],"date-time":"2016-04-13T00:00:00Z","timestamp":1460505600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s10623-016-0205-8","type":"journal-article","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T08:20:36Z","timestamp":1460622036000},"page":"83-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Complete weight enumerators of a class of linear codes"],"prefix":"10.1007","volume":"83","author":[{"given":"Jaehyun","family":"Ahn","sequence":"first","affiliation":[]},{"given":"Dongseok","family":"Ka","sequence":"additional","affiliation":[]},{"given":"Chengju","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,13]]},"reference":[{"key":"205_CR1","unstructured":"Bae S., Li C., Yue Q.: Some results on two-weight and three-weight linear codes, preprint (2015)."},{"key":"205_CR2","unstructured":"Berndt B., Evans R., Williams K.: Gauss and Jacobi Sums. Wiley, New York (1997)."},{"key":"205_CR3","unstructured":"Calderbank A.R., Goethals J.M.: Three-weight codes and association schemes. Philips J. Res. 39, 143\u2013152 (1984)."},{"key":"205_CR4","doi-asserted-by":"crossref","unstructured":"Calderbank A.R., Kantor W.M.: The geometry of two-weight codes. Bull. Lond. Math. Soc. 18, 97\u2013122 (1986).","DOI":"10.1112\/blms\/18.2.97"},{"key":"205_CR5","doi-asserted-by":"crossref","unstructured":"Carlet C., Ding C., Yuan J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089\u20132102 (2005).","DOI":"10.1109\/TIT.2005.847722"},{"key":"205_CR6","doi-asserted-by":"crossref","unstructured":"Ding C.: Codes from Difference Sets. World Scientific, Singapore (2014).","DOI":"10.1142\/9283"},{"key":"205_CR7","doi-asserted-by":"crossref","unstructured":"Ding C.: Linear codes from some 2-designs. IEEE Trans. Inf. Theory 61(6), 3265\u20133275 (2015).","DOI":"10.1109\/TIT.2015.2420118"},{"key":"205_CR8","doi-asserted-by":"crossref","unstructured":"Ding K., Ding C.: Binary linear codes with three weights. IEEE Commun. Lett. 18(11), 1879\u20131882 (2014).","DOI":"10.1109\/LCOMM.2014.2361516"},{"key":"205_CR9","doi-asserted-by":"crossref","unstructured":"Ding K., Ding C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inf. Theory 61(11), 5835\u20135842 (2015).","DOI":"10.1109\/TIT.2015.2473861"},{"key":"205_CR10","doi-asserted-by":"crossref","unstructured":"Ding C., Niederreiter H.: Cyclotomic linear codes of order 3. IEEE Trans. Inf. Theory 53(6), 2274\u20132277 (2007).","DOI":"10.1109\/TIT.2007.896886"},{"key":"205_CR11","doi-asserted-by":"crossref","unstructured":"Ding C., Wang X.: A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330(1), 81\u201399 (2005).","DOI":"10.1016\/j.tcs.2004.09.011"},{"key":"205_CR12","doi-asserted-by":"crossref","unstructured":"Ding C., Helleseth T., Kl\u00f8ve T., Wang X.: A general construction of authentication codes. IEEE Trans. Inf. Theory 53(6), 2229\u20132235 (2007).","DOI":"10.1109\/TIT.2007.896872"},{"key":"205_CR13","unstructured":"Ding C., Luo J., Niederreiter H.: Two-weight codes puncturedfrom irreducible cyclic codes. In: Li Y, et al. (eds.) Proceedings of the First Worshop on Coding and Cryptography, pp. 119\u2013124. World Scientific, Singapore (2008)."},{"key":"205_CR14","unstructured":"Lidl R., Niederreiter H.: Finite Fields. Addison-Wesley, Reading (1983)."},{"key":"205_CR15","doi-asserted-by":"crossref","unstructured":"Myerson G.: Period polynomials and gauss sums for finite fields. Acta Arith. 39(3), 251\u2013264 (1981).","DOI":"10.4064\/aa-39-3-251-264"},{"key":"205_CR16","doi-asserted-by":"crossref","unstructured":"Tang C., Li N., Qi Y., Zhou Z., Helleseth T.: Linear codes with two or three weights from weakly regular bent functions. IEEE Trans. Inf. Theory 62(3), 1166\u20131176 (2016).","DOI":"10.1109\/TIT.2016.2518678"},{"key":"205_CR17","doi-asserted-by":"publisher","unstructured":"Yang S., Yao Z.: Complete weight enumerators of a family of three-weight liner codes. Des. Codes Cryptogr. (2016). doi: 10.1007\/s10623-016-0191-x .","DOI":"10.1007\/s10623-016-0191-x"},{"key":"205_CR18","doi-asserted-by":"crossref","unstructured":"Yuan J., Ding C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory 52(1), 206\u2013212 (2006).","DOI":"10.1109\/TIT.2005.860412"},{"key":"205_CR19","doi-asserted-by":"publisher","unstructured":"Zhou Z., Li N., Fan C., Helleseth T.: Linear codes with two or three weights from quadratic Bent functions. Des. Codes Cryptogr. (2015). doi: 10.1007\/s10623-015-0144-9 .","DOI":"10.1007\/s10623-015-0144-9"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0205-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0205-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0205-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0205-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T17:15:34Z","timestamp":1567790134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0205-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,13]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["205"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0205-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,13]]}}}