{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T07:05:56Z","timestamp":1769238356706,"version":"3.49.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,8,10]],"date-time":"2016-08-10T00:00:00Z","timestamp":1470787200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10623-016-0267-7","type":"journal-article","created":{"date-parts":[[2016,8,10]],"date-time":"2016-08-10T13:48:47Z","timestamp":1470836927000},"page":"691-714","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Linear codes with few weights from inhomogeneous quadratic functions"],"prefix":"10.1007","volume":"83","author":[{"given":"Chunming","family":"Tang","sequence":"first","affiliation":[]},{"given":"Can","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Keqin","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,10]]},"reference":[{"key":"267_CR1","unstructured":"Calderbank A.R., Goethals J.M.: Three-weight codes and association schemes. Philips J. Res. 39, 143\u2013152 (1984)."},{"key":"267_CR2","doi-asserted-by":"crossref","unstructured":"Calderbank A.R., Kantor W.M.: The geometry of two-weight codes. Bull. Lond. Math. Soc. 18, 97\u2013122 (1986).","DOI":"10.1112\/blms\/18.2.97"},{"key":"267_CR3","doi-asserted-by":"crossref","unstructured":"Carlet C., Ding C., Yuan J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089\u20132102 (2005).","DOI":"10.1109\/TIT.2005.847722"},{"key":"267_CR4","doi-asserted-by":"crossref","unstructured":"Ding C.: Linear codes from some 2-designs. IEEE Trans. Inf. Theory 61(6), 3265\u20133275 (2015).","DOI":"10.1109\/TIT.2015.2420118"},{"key":"267_CR5","doi-asserted-by":"crossref","unstructured":"Ding C.: A construction of binary linear codes from Boolean functions. Discret. Math. 339(9), 2288\u20132303 (2016).","DOI":"10.1016\/j.disc.2016.03.029"},{"key":"267_CR6","doi-asserted-by":"crossref","unstructured":"Ding K., Ding C.: Binary linear codes with three weights. IEEE Commun. Lett. 18(11), 1879\u20131882 (2014).","DOI":"10.1109\/LCOMM.2014.2361516"},{"key":"267_CR7","doi-asserted-by":"crossref","unstructured":"Ding K., Ding C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inf. Theory 61(11), 5835\u20135842 (2015).","DOI":"10.1109\/TIT.2015.2473861"},{"key":"267_CR8","doi-asserted-by":"crossref","unstructured":"Ding C., Wang X.: A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330, 81\u201399 (2005).","DOI":"10.1016\/j.tcs.2004.09.011"},{"key":"267_CR9","doi-asserted-by":"crossref","unstructured":"Ding C., Yang J.: Hamming weights in irreducible cyclic codes. Discret. Math. 313(4), 434\u2013446 (2013).","DOI":"10.1016\/j.disc.2012.11.009"},{"key":"267_CR10","doi-asserted-by":"crossref","unstructured":"Ding C., Helleseth T., Klove T., Wang X.: A generic construction of Cartesian authen- tication codes. IEEE Trans. Inf. Theory 53(6), 2229\u20132235 (2007).","DOI":"10.1109\/TIT.2007.896872"},{"key":"267_CR11","doi-asserted-by":"crossref","unstructured":"Ding C., Liu Y., Ma C., Zeng L.: The weight distribution of the duals of cyclic codes with two zeros. IEEE Trans. Inf. Theory 57(12), 8000\u20138006 (2011).","DOI":"10.1109\/TIT.2011.2165314"},{"key":"267_CR12","doi-asserted-by":"crossref","unstructured":"Feng K., Luo J.: Value distribution of exponential sums from perfect nonlinear functions and their applications. IEEE Trans. Inf. Theory 53(9), 3035\u20133041 (2007).","DOI":"10.1109\/TIT.2007.903153"},{"key":"267_CR13","doi-asserted-by":"crossref","unstructured":"Ireland K., Rosen M.: A classical introduction to modern number theory. In: Graduate Texts in Mathematics, vol. 84, 2nd edn. Springer, New York (1990).","DOI":"10.1007\/978-1-4757-2103-4"},{"key":"267_CR14","doi-asserted-by":"crossref","unstructured":"Klve T.: Codes for Error Detection. World Scientific, Hackensack (2007).","DOI":"10.1142\/6400"},{"key":"267_CR15","doi-asserted-by":"crossref","unstructured":"Lidl R., Niederreiter H.: Finite Fields. Cambridge University Press, Cambridge (1997).","DOI":"10.1017\/CBO9780511525926"},{"key":"267_CR16","unstructured":"Li F., Wang Q., Lin D.: A class of three-weight and five-weightlinear codes, arXiv:1509.06242v1 (2015)."},{"key":"267_CR17","unstructured":"Mesnager S.: Linear codes with few weights from weakly regular bent functions based on a generic construction. IACR Cryptol. 2015, 1103 (2015)."},{"key":"267_CR18","doi-asserted-by":"crossref","unstructured":"Qi Y., Tang C., Huang D.: Binary linear codes with few weights. IEEE Commun. Lett. 20(2), 208\u2013211 (2016).","DOI":"10.1109\/LCOMM.2015.2506576"},{"key":"267_CR19","doi-asserted-by":"crossref","unstructured":"Tang C., Li N., Qi Y., Zhou Z., Helleseth T.: Two-weight and three-weight linear codes from weakly regular bent functions. IEEE Trans. Inf. Theory 62(3), 1166\u20131176 (2016).","DOI":"10.1109\/TIT.2016.2518678"},{"key":"267_CR20","doi-asserted-by":"crossref","unstructured":"Tang C., Qi Y., Huang D.: Two-weight and three-weight linear codes from square functions. IEEE Commun. Lett. 20(1), 29\u201332 (2016).","DOI":"10.1109\/LCOMM.2015.2497344"},{"key":"267_CR21","doi-asserted-by":"crossref","unstructured":"Xiang C., Tang C., Feng K.: A class of linear codes with a few weights, arXiv:1512.07103v1 (2015).","DOI":"10.1007\/s12095-016-0200-y"},{"key":"267_CR22","doi-asserted-by":"crossref","unstructured":"Zhou Z., Li N., Fan C., Helleseth T.: Linear codes with two or three weights from quadratic bent functions, Des. Codes Cryptogr. 1\u201313 (2015).","DOI":"10.1007\/s10623-015-0144-9"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0267-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0267-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0267-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0267-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T18:26:21Z","timestamp":1657045581000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0267-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,10]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["267"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0267-7","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,10]]}}}