{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T16:06:42Z","timestamp":1769270802509,"version":"3.49.0"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T00:00:00Z","timestamp":1535155200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2016M601991"],"award-info":[{"award-number":["2016M601991"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NNSF of China","award":["61672036"],"award-info":[{"award-number":["61672036"]}]},{"name":"Key Projects of Support Program for Outstanding Young Talents in Colleges and Universities","award":["gxyqZD2016008"],"award-info":[{"award-number":["gxyqZD2016008"]}]},{"name":"Technology Foundation for Selected Overseas Chinese Scholar, Ministry of Personnel of China","award":["05015133"],"award-info":[{"award-number":["05015133"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s10623-018-0542-x","type":"journal-article","created":{"date-parts":[[2018,8,24]],"date-time":"2018-08-24T23:22:33Z","timestamp":1535152953000},"page":"1447-1455","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Trace codes over \n                \n                  \n                \n                $${\\mathbb {Z}}_4,$$\n                \n                  \n                    \n                      \n                        Z\n                        4\n                      \n                      ,\n                    \n                  \n                \n               and Boolean functions"],"prefix":"10.1007","volume":"87","author":[{"given":"Minjia","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hugues","family":"Randriam","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Sok","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Sol\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,25]]},"reference":[{"issue":"6","key":"542_CR1","doi-asserted-by":"publisher","first-page":"3265","DOI":"10.1109\/TIT.2015.2420118","volume":"61","author":"CS Ding","year":"2015","unstructured":"Ding C.S.: Linear codes from some 2-designs. IEEE Trans. Inf. Theory 61(6), 3265\u20133275 (2015).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"542_CR2","unstructured":"Grassl M.: Bounds on the minimum distance of linear codes and quantum codes. \n                    http:\/\/www.codetables.de\n                    \n                  ."},{"issue":"2","key":"542_CR3","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/18.312154","volume":"40","author":"AR Hammons","year":"1994","unstructured":"Hammons A.R., Kumar P.V., Calderbank A.R., Sloane N.J.A., Sol\u00e9 P.: The \n                    \n                      \n                    \n                    $$\\mathbb{Z} _4$$\n                    \n                      \n                        \n                          Z\n                          4\n                        \n                      \n                    \n                  -linearity of Kerdock, Preparata, Goethals, and related codes. IEEE Trans. Inf. Theory 40(2), 301\u2013319 (1994).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"542_CR4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error Correcting Codes","author":"WC Huffman","year":"2003","unstructured":"Huffman W.C., Pless V.: Fundamentals of Error Correcting Codes. Cambridge University Press, Cambridge (2003)."},{"issue":"3","key":"542_CR5","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s10623-011-9554-5","volume":"63","author":"JY Hyun","year":"2012","unstructured":"Hyun J.Y., Lee H., Lee Y.: MacWilliams duality and gleason-type theorem on self-dual bent functions. Des. Codes Cryptogr. 63(3), 295\u2013304 (2012).","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"542_CR6","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s002000050072","volume":"8","author":"PV Kumar","year":"1998","unstructured":"Kumar P.V., Helleseth T.: An expansion for the coordinates of the trace function over Galois rings. AAECC 8(5), 353\u2013361 (1998).","journal-title":"AAECC"},{"key":"542_CR7","volume-title":"Handbook of Coding Theory","author":"VS Pless","year":"1998","unstructured":"Pless V.S., Huffman W.C.: Handbook of Coding Theory. North Holland, Amsterdam (1998)."},{"key":"542_CR8","unstructured":"Sol\u00e9 P., Tokareva N.: Connections between quaternary and binary bent functions. IACR Cryptology Eprint Archive (2009)."},{"key":"542_CR9","doi-asserted-by":"publisher","DOI":"10.1142\/3603","volume-title":"Quaternary Codes","author":"ZX Wan","year":"1997","unstructured":"Wan Z.X.: Quaternary Codes. World Scientific, Singapore (1997)."},{"issue":"5","key":"542_CR10","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1109\/18.532905","volume":"42","author":"K Yang","year":"1996","unstructured":"Yang K., Helleseth T., Kumar P.V., Shanbhag A.G.: On the weight hierarchy of kerdock codes over \n                    \n                      \n                    \n                    $$\\mathbb{Z}_4$$\n                    \n                      \n                        \n                          Z\n                          4\n                        \n                      \n                    \n                  . IEEE Trans. Inf. Theory 42(5), 1587\u20131593 (1996).","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0542-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0542-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0542-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T19:41:32Z","timestamp":1569008492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0542-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,25]]},"references-count":10,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["542"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0542-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,25]]},"assertion":[{"value":"20 July 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}