{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T01:24:29Z","timestamp":1777512269142,"version":"3.51.4"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T00:00:00Z","timestamp":1537920000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10623-018-0556-4","type":"journal-article","created":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T02:00:36Z","timestamp":1537927236000},"page":"463-480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":72,"title":["Linear codes from weakly regular plateaued functions and their secret sharing schemes"],"prefix":"10.1007","volume":"87","author":[{"given":"Sihem","family":"Mesnager","sequence":"first","affiliation":[]},{"given":"Ferruh","family":"\u00d6zbudak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1071-765X","authenticated-orcid":false,"given":"Ahmet","family":"S\u0131nak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"issue":"5","key":"556_CR1","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.1109\/18.705584","volume":"44","author":"A Ashikhmin","year":"1998","unstructured":"Ashikhmin A., Barg A.: Minimal vectors in linear codes. IEEE Trans. Inform. Theory 44(5), 2010\u20132017 (1998).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"556_CR2","first-page":"313","volume":"48","author":"GR Blakley","year":"1979","unstructured":"Blakley G.R.: Safeguarding cryptographic keys. Proc. Natl. Comput. Conf. 48, 313\u2013317 (1979).","journal-title":"Proc. Natl. Comput. Conf."},{"issue":"3","key":"556_CR3","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma W., Cannon J., Playoust C.: The magma algebra system I: the user language. J. Symb. Comput. 24(3), 235\u2013265 (1997).","journal-title":"J. Symb. Comput."},{"issue":"8","key":"556_CR4","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TIT.2003.814476","volume":"49","author":"A Canteaut","year":"2003","unstructured":"Canteaut A., Charpin P.: Decomposing bent functions. IEEE Trans. Inform. Theory 49(8), 2004\u20132019 (2003).","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"556_CR5","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ffa.2007.02.004","volume":"14","author":"A Canteaut","year":"2008","unstructured":"Canteaut A., Charpin P., Kyureghyan G.M.: A new class of monomial bent functions. Finite Fields Appl. 14(1), 221\u2013241 (2008).","journal-title":"Finite Fields Appl."},{"issue":"6","key":"556_CR6","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet C., Ding C., Yuan J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inform. Theory 51(6), 2089\u20132102 (2005).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"556_CR7","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s10623-012-9686-2","volume":"66","author":"A \u00c7e\u015fmelio\u011flu","year":"2013","unstructured":"\u00c7e\u015fmelio\u011flu A., Meidl W.: A construction of bent functions from plateaued functions. Des. Codes Cryptogr. 66, 231\u2013242 (2013).","journal-title":"Des. Codes Cryptogr."},{"issue":"9","key":"556_CR8","doi-asserted-by":"publisher","first-page":"2288","DOI":"10.1016\/j.disc.2016.03.029","volume":"339","author":"C Ding","year":"2016","unstructured":"Ding C.: A construction of binary linear codes from boolean functions. Discret. Math. 339(9), 2288\u20132303 (2016).","journal-title":"Discret. Math."},{"issue":"11","key":"556_CR9","doi-asserted-by":"publisher","first-page":"5835","DOI":"10.1109\/TIT.2015.2473861","volume":"61","author":"K Ding","year":"2015","unstructured":"Ding K., Ding C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inform. Theory 61(11), 5835\u20135842 (2015).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"556_CR10","first-page":"11","volume":"2731","author":"C Ding","year":"2003","unstructured":"Ding C., Yuan J.: Covering and secret sharing with linear codes. DMTCS 2731, 11\u201325 (2003).","journal-title":"DMTCS"},{"issue":"5","key":"556_CR11","doi-asserted-by":"publisher","first-page":"2018","DOI":"10.1109\/TIT.2006.872854","volume":"52","author":"T Helleseth","year":"2006","unstructured":"Helleseth T., Kholosha A.: Monomial and quadratic bent functions over the finite fields of odd characteristic. IEEE Trans. Inform. Theory 52(5), 2018\u20132032 (2006).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"556_CR12","doi-asserted-by":"crossref","unstructured":"Helleseth T., Kholosha A.: New binomial bent functions over the finite fields of odd characteristic. In 2010 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 1277\u20131281. IEEE (2010).","DOI":"10.1109\/ISIT.2010.5513704"},{"key":"556_CR13","doi-asserted-by":"crossref","unstructured":"Heng Z., Ding C., Zhou Z.: Minimal linear codes over finite fields. \n                    arXiv:1803.09988\n                    \n                   (2018).","DOI":"10.1016\/j.ffa.2018.08.010"},{"issue":"12","key":"556_CR14","doi-asserted-by":"publisher","first-page":"7555","DOI":"10.1109\/TIT.2016.2582217","volume":"62","author":"JY Hyun","year":"2016","unstructured":"Hyun J.Y., Lee J., Lee Y.: Explicit criteria for construction of plateaued functions. IEEE Trans. Inform. Theory 62(12), 7555\u20137565 (2016).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"556_CR15","volume-title":"A Classical Introduction to Modern Number Theory","author":"K Ireland","year":"2013","unstructured":"Ireland K., Rosen M.: A Classical Introduction to Modern Number Theory, 84th edn. Springer, Berlin (2013).","edition":"84"},{"issue":"4","key":"556_CR16","doi-asserted-by":"publisher","first-page":"2530","DOI":"10.1137\/16M1108431","volume":"31","author":"S Li","year":"2017","unstructured":"Li S.: The minimum distance of some narrow-sense primitive BCH codes. SIAM J. Discret. Math. 31(4), 2530\u20132569 (2017).","journal-title":"SIAM J. Discret. Math."},{"key":"556_CR17","volume-title":"Finite Tields","author":"R Lidl","year":"1997","unstructured":"Lidl R., Niederreiter H.: Finite Tields, 20th edn. Cambridge University Press, Cambridge (1997).","edition":"20"},{"issue":"9","key":"556_CR18","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"RJ McEliece","year":"1981","unstructured":"McEliece R.J., Sarwate D.V.: On sharing secrets and reed-solomon codes. Commun. ACM 24(9), 583\u2013584 (1981).","journal-title":"Commun. ACM"},{"key":"556_CR19","unstructured":"Mesnager S.: Characterizations of plateaued and bent functions in characteristic p. In: International Conference on Sequences and Their Applications, pp. 72\u201382. Springer, New York (2014)."},{"issue":"1","key":"556_CR20","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s12095-016-0186-5","volume":"9","author":"S Mesnager","year":"2017","unstructured":"Mesnager S.: Linear codes with few weights from weakly regular bent functions based on a generic construction. Cryptogr. Commun. 9(1), 71\u201384 (2017).","journal-title":"Cryptogr. Commun."},{"key":"556_CR21","unstructured":"Mesnager S., \u00d6zbudak F., S\u0131nak A.: Results on characterizations of plateaued functions in arbitrary characteristic. In: International Conference on Cryptography and Information Security in the Balkans, pp. 17\u201330. Springer, New York (2015)."},{"key":"556_CR22","unstructured":"Mesnager S., \u00d6zbudak F., S\u0131nak A.: A new class of three-weight linear codes from weakly regular plateaued functions. In: Proceedings of the Tenth International Workshop on Coding and Cryptography (WCC) (2017)."},{"issue":"3","key":"556_CR23","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus O.S.: On \u201cbent\u201d functions. J. Comb. Theory Ser. A 20(3), 300\u2013305 (1976).","journal-title":"J. Comb. Theory Ser. A"},{"issue":"11","key":"556_CR24","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979).","journal-title":"Commun. ACM"},{"issue":"3","key":"556_CR25","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1109\/TIT.2016.2518678","volume":"62","author":"C Tang","year":"2016","unstructured":"Tang C., Li N., Qi Y., Zhou Z., Helleseth T.: Linear codes with two or three weights from weakly regular bent functions. IEEE Trans. Inform. Theory 62(3), 1166\u20131176 (2016).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"556_CR26","unstructured":"Zheng Y., Zhang X.-M.: Plateaued functions. In: ICICS, vol.\u00a099, pp. 284\u2013300. Springer, New York (1999)."},{"issue":"2","key":"556_CR27","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s10623-015-0144-9","volume":"81","author":"Z Zhou","year":"2016","unstructured":"Zhou Z., Li N., Fan C., Helleseth T.: Linear codes with two or three weights from quadratic bent functions. Des. Codes Cryptogr. 81(2), 283\u2013295 (2016).","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0556-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0556-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0556-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T19:23:27Z","timestamp":1569439407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0556-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,26]]},"references-count":27,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["556"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0556-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,26]]},"assertion":[{"value":"22 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}