{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:20:01Z","timestamp":1772281201414,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["12171134"],"award-info":[{"award-number":["12171134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10623-025-01758-x","type":"journal-article","created":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T15:59:09Z","timestamp":1769097549000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The weight distributions and weight hierarchies of two classes of few-weight linear codes"],"prefix":"10.1007","volume":"94","author":[{"given":"Yun","family":"Ding","sequence":"first","affiliation":[]},{"given":"Shixin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,22]]},"reference":[{"issue":"2","key":"1758_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1023\/A:1026421315292","volume":"15","author":"R Anderson","year":"1998","unstructured":"Anderson R., Ding C., Helleseth T., Kl\u00f3ve T.: How to build robust shared control systems. Des. Codes Cryptogr. 15(2), 111\u2013124 (1998).","journal-title":"Des. Codes Cryptogr."},{"issue":"3\u20134","key":"1758_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma W., Cannon J., Playoust C.: The Magma algebra system I: the user language. J. Symb. Comput. 24(3\u20134), 235\u2013265 (1997).","journal-title":"J. Symb. Comput."},{"issue":"4\u20135","key":"1758_CR3","first-page":"143","volume":"39","author":"AR Calderbank","year":"1984","unstructured":"Calderbank A.R., Goethals J.M.: Three-weight codes and association schemes. Philips J. Res. 39(4\u20135), 143\u2013152 (1984).","journal-title":"Philips J. Res."},{"issue":"2","key":"1758_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1112\/blms\/18.2.97","volume":"18","author":"R Calderbank","year":"1986","unstructured":"Calderbank R., Kantor W.M.: The geometry of two-weight codes. Bull. Lond. Math. Soc. 18(2), 97\u2013122 (1986).","journal-title":"Bull. Lond. Math. Soc."},{"issue":"6","key":"1758_CR5","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet C., Ding C., Yuan J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089\u20132102 (2005).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1758_CR6","doi-asserted-by":"publisher","first-page":"2167","DOI":"10.1007\/s10623-017-0442-5","volume":"86","author":"S Chang","year":"2018","unstructured":"Chang S., Hyun J.Y.: Linear codes from simplicial complexes. Des. Codes Cryptogr. 86, 2167\u20132181 (2018).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"1758_CR7","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/18.567718","volume":"43","author":"J Cheng","year":"1997","unstructured":"Cheng J., Chao C.: On generalized Hamming weights of binary primitive BCH codes with minimum distance one less than a power of two. IEEE Trans. Inf. Theory 43(1), 294\u2013299 (1997).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"1758_CR8","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1006\/ffta.2000.0298","volume":"7","author":"JP Cherdieu","year":"2001","unstructured":"Cherdieu J.P., Mercier D.J., Narayaninsamy T.: On the generalized weights of a class of trace codes. Finite Fields Appl. 7(2), 355\u2013371 (2001).","journal-title":"Finite Fields Appl."},{"key":"1758_CR9","doi-asserted-by":"crossref","unstructured":"Chor B., Goldreich O., Hastad J., Friedmann J., Rudish S., Smolesky R.: The bit extraction problem or $$t$$-resilient functions. In: The 26th Annual Symposium on Foundations of Computer Science, 1985, pp. 396\u2013407 (1985).","DOI":"10.1109\/SFCS.1985.55"},{"issue":"11","key":"1758_CR10","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1109\/LCOMM.2014.2361516","volume":"18","author":"K Ding","year":"2014","unstructured":"Ding K., Ding C.: Binary linear codes with three weights. IEEE Commun. Lett. 18(11), 1879\u20131882 (2014).","journal-title":"IEEE Commun. Lett."},{"issue":"6","key":"1758_CR11","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/TIT.2007.896886","volume":"53","author":"C Ding","year":"2007","unstructured":"Ding C., Niederreiter H.: Cyclotomic linear codes of order 3. IEEE Trans. Inf. Theory 53(6), 2274\u20132277 (2007).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"1758_CR12","doi-asserted-by":"publisher","first-page":"5835","DOI":"10.1109\/TIT.2015.2473861","volume":"61","author":"K Ding","year":"2015","unstructured":"Ding K., Ding C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inf. Theory 61(11), 5835\u20135842 (2015).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1758_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.tcs.2004.09.011","volume":"330","author":"C Ding","year":"2005","unstructured":"Ding C., Wang X.: A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330(1), 81\u201399 (2005).","journal-title":"Theor. Comput. Sci."},{"issue":"6","key":"1758_CR14","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/18.340452","volume":"40","author":"GD Forney","year":"1994","unstructured":"Forney G.D.: Dimension\/length profiles and trellis complexity of linear block codes. IEEE Trans. Inf. Theory 40(6), 1741\u20131752 (1994).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"1758_CR15","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1109\/TIT.2003.815776","volume":"49","author":"V Guruswami","year":"2003","unstructured":"Guruswami V.: List decoding from erasures: bounds and code constructions. IEEE Trans. Inf. Theory 49(11), 2826\u20132833 (2003).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1758_CR16","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/18.651015","volume":"44","author":"P Heijnen","year":"1998","unstructured":"Heijnen P., Pellikaan R.: Generalized Hamming weights of $$q$$-ary Reed\u2013Muller codes. IEEE Trans. Inf. Theory 44(1), 181\u2013196 (1998).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"1758_CR17","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/18.370144","volume":"41","author":"T Helleseth","year":"1995","unstructured":"Helleseth T., Kl\u00f3ve T., Levenshtein V.I., Ytrehus O.: Bounds on the minimum support weights. IEEE Trans. Inf. Theory 41(2), 432\u2013440 (1995).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"1758_CR18","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0012-365X(77)90078-4","volume":"18","author":"T Helleseth","year":"1977","unstructured":"Helleseth T., Kl\u00f3ve T., Mykkeltveit J.: The weight distribution of irreducible cyclic codes with block lengths $$n_1((q^l-1)\/N)$$. Discret. Math. 18(2), 179\u2013211 (1977).","journal-title":"Discret. Math."},{"issue":"13","key":"1758_CR19","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/0012-365X(94)00030-M","volume":"145","author":"T Helleseth","year":"1995","unstructured":"Helleseth T., Kumar P.V.: The weight hierarchy of the Kasami codes. Discret. Math. 145(13), 133\u2013143 (1995).","journal-title":"Discret. Math."},{"issue":"9","key":"1758_CR20","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.1109\/LCOMM.2015.2455032","volume":"19","author":"Z Heng","year":"2015","unstructured":"Heng Z., Yue Q.: A class of binary linear codes with at most three weights. IEEE Commun. Lett. 19(9), 1488\u20131491 (2015).","journal-title":"IEEE Commun. Lett."},{"key":"1758_CR21","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ffa.2015.12.002","volume":"38","author":"Z Heng","year":"2016","unstructured":"Heng Z., Yue Q.: Two classes of two-weight linear codes. Finite Fields Appl. 38, 72\u201392 (2016).","journal-title":"Finite Fields Appl."},{"issue":"11","key":"1758_CR22","doi-asserted-by":"publisher","first-page":"2832","DOI":"10.1016\/j.disc.2016.05.033","volume":"339","author":"Z Heng","year":"2016","unstructured":"Heng Z., Yue Q., Li C.: Three classes of linear codes with two or three weights. Discret. Math. 339(11), 2832\u20132847 (2016).","journal-title":"Discret. Math."},{"issue":"7","key":"1758_CR23","doi-asserted-by":"publisher","first-page":"4408","DOI":"10.1109\/TIT.2022.3163651","volume":"68","author":"Z Hu","year":"2022","unstructured":"Hu Z., Li N., Zeng X., Wang L., Tang X.: A subfield-based construction of optimal linear codes over finite fields. IEEE Trans. Inf. Theory 68(7), 4408\u20134421 (2022).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"1758_CR24","doi-asserted-by":"publisher","first-page":"1823","DOI":"10.1109\/TIT.2023.3305609","volume":"70","author":"Z Hu","year":"2023","unstructured":"Hu Z., Xu Y., Li N., Zeng X., Wang L., Tang X.: New constructions of optimal linear codes from simplicial complexes. IEEE Trans. Inf. Theory 70(3), 1823\u20131835 (2023).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"1758_CR25","doi-asserted-by":"publisher","first-page":"6762","DOI":"10.1109\/TIT.2020.2993179","volume":"66","author":"JY Hyun","year":"2020","unstructured":"Hyun J.Y., Lee J., Lee Y.: Infinite families of optimal linear codes constructed from simplicial complexes. IEEE Trans. Inf. Theory 66(11), 6762\u20136773 (2020).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1758_CR26","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.ffa.2017.01.001","volume":"45","author":"G Jian","year":"2017","unstructured":"Jian G., Feng R., Wu H.: Generalized Hamming weights of three classes of linear codes. Finite Fields Appl. 45, 341\u2013354 (2017).","journal-title":"Finite Fields Appl."},{"issue":"1","key":"1758_CR27","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1109\/18.179366","volume":"39","author":"T Kasami","year":"1993","unstructured":"Kasami T., Takata T., Fujiwara T., Lin S.: On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes. IEEE Trans. Inf. Theory 39(1), 242\u2013245 (1993).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1758_CR28","doi-asserted-by":"publisher","DOI":"10.1142\/6400","volume-title":"Codes for Error Detection","author":"T Kl\u00f3ve","year":"2007","unstructured":"Kl\u00f3ve T.: Codes for Error Detection. World Scientific, Hackensack (2007)."},{"issue":"2","key":"1758_CR29","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/0012-365X(78)90114-0","volume":"23","author":"T Kl\u00f3ve","year":"1978","unstructured":"Kl\u00f3ve T.: The weight distribution of linear codes over $${\\rm GF}(q^l)$$ having generator matrices over $${\\rm GF}(q)$$. Discret. Math. 23(2), 159\u2013168 (1978).","journal-title":"Discret. Math."},{"key":"1758_CR30","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.ffa.2017.01.002","volume":"45","author":"S Li","year":"2017","unstructured":"Li S.: The weight hierarchy of a family of cyclic codes with arbitrary number of nonzeroes. Finite Fields Appl. 45, 355\u2013371 (2017).","journal-title":"Finite Fields Appl."},{"key":"1758_CR31","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s00200-018-0355-1","volume":"29","author":"F Li","year":"2017","unstructured":"Li F.: A class of cyclotomic linear codes and their generalized Hamming weights. Appl. Algebra Eng. Commun. Comput. 29, 501\u2013511 (2017).","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"1","key":"1758_CR32","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/TIT.2020.3021730","volume":"67","author":"F Li","year":"2021","unstructured":"Li F.: Weight hierarchies of a class of linear codes related to non-degenerate quadratic forms. IEEE Trans. Inf. Theory 67(1), 124\u2013129 (2021).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1758_CR33","doi-asserted-by":"publisher","first-page":"101865","DOI":"10.1016\/j.ffa.2021.101865","volume":"73","author":"F Li","year":"2021","unstructured":"Li F., Li X.: Weight distributions and weight hierarchies of two classes of binary linear codes. Finite Fields Appl. 73, 101865 (2021).","journal-title":"Finite Fields Appl."},{"key":"1758_CR34","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s10623-021-00962-9","volume":"90","author":"F Li","year":"2022","unstructured":"Li F., Li X.: Weight distributions and weight hierarchies of a family of $$p$$-ary linear codes. Des. Codes Cryptogr. 90, 49\u201366 (2022).","journal-title":"Des. Codes Cryptogr."},{"key":"1758_CR35","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1007\/s12095-020-00435-1","volume":"12","author":"N Li","year":"2020","unstructured":"Li N., Mesnager S.: Recent results and problems on constructions of linear codes from cryptographic functions. Cryptogr. Commun. 12, 965\u2013986 (2020).","journal-title":"Cryptogr. Commun."},{"key":"1758_CR36","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s12095-019-00404-3","volume":"12","author":"Z Liu","year":"2020","unstructured":"Liu Z., Wang J.: Notes on generalized Hamming weights of some classes of binary codes. Cryptogr. Commun. 12, 645\u2013657 (2020).","journal-title":"Cryptogr. Commun."},{"issue":"1","key":"1758_CR37","doi-asserted-by":"publisher","first-page":"114240","DOI":"10.1016\/j.disc.2024.114240","volume":"348","author":"C Liu","year":"2025","unstructured":"Liu C., Zheng D., Lu W., Wang X.: The weight hierarchies of linear codes from simplicial complexes. Discret. Math. 348(1), 114240 (2025).","journal-title":"Discret. Math."},{"issue":"9","key":"1758_CR38","doi-asserted-by":"publisher","first-page":"5675","DOI":"10.1109\/TIT.2023.3277454","volume":"69","author":"C Liu","year":"2023","unstructured":"Liu C., Zheng D., Wang X.: Generalized Hamming weights of linear codes from quadratic forms over finite fields of even characteristic. IEEE Trans. Inf. Theory 69(9), 5675\u20135686 (2023).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1758_CR39","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.1007\/s10623-024-01553-0","volume":"93","author":"W Lu","year":"2025","unstructured":"Lu W., Wang Q., Wang X., Zheng D.: The weight hierarchies of three classes of linear codes. Des. Codes Cryptogr. 93, 1337\u20131355 (2025).","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"1758_CR40","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1109\/TIT.2024.3519672","volume":"71","author":"X Pan","year":"2025","unstructured":"Pan X., Chen H., Liu H., Liu S.: Optimal few-SSW linear codes and their subcode support weight distributions. IEEE Trans. Inf. Theory 71(2), 1028\u20131042 (2025).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1758_CR41","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s12095-022-00617-z","volume":"15","author":"V Sagar","year":"2023","unstructured":"Sagar V., Sarma R.: Octanary linear codes using simplicial complexes. Cryptogr. Commun. 15, 599\u2013616 (2023).","journal-title":"Cryptogr. Commun."},{"key":"1758_CR42","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10623-023-01299-1","volume":"92","author":"V Sagar","year":"2024","unstructured":"Sagar V., Sarma R.: Minimal and optimal binary codes obtained using $${\\cal{C} }_{{\\cal{D} }}$$-construction over the non-unital ring $$I$$. Des. Codes Cryptogr. 92, 145\u2013157 (2024).","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"1758_CR43","doi-asserted-by":"publisher","first-page":"3373","DOI":"10.1109\/TIT.2024.3374420","volume":"70","author":"V Sagar","year":"2024","unstructured":"Sagar V., Sarma R.: Codes over the non-unital non-commutative ring $$E$$ using simplicial complexes. IEEE Trans. Inf. Theory 70(5), 3373\u20133384 (2024).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"1758_CR44","doi-asserted-by":"publisher","first-page":"6316","DOI":"10.1109\/TIT.2024.3436923","volume":"70","author":"M Shi","year":"2024","unstructured":"Shi M., Li S., Helleseth T.: The weight enumerator polynomials of the lifted codes of the projective Solomon\u2013Stiffler codes. IEEE Trans. Inf. Theory 70(9), 6316\u20136325 (2024).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"1758_CR45","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/S0019-9958(65)90080-X","volume":"8","author":"G Solomon","year":"1965","unstructured":"Solomon G., Stiffler J.J.: Algebraically punctured cyclic codes. Inf. Control 8(2), 170\u2013179 (1965).","journal-title":"Inf. Control"},{"issue":"2","key":"1758_CR46","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1109\/18.312185","volume":"40","author":"H Stichtenoth","year":"1994","unstructured":"Stichtenoth H., Voss C.: Generalized Hamming weights of trace codes. IEEE Trans. Inf. Theory 40(2), 554\u2013558 (1994).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"1758_CR47","doi-asserted-by":"publisher","first-page":"1564","DOI":"10.1109\/18.476213","volume":"41","author":"MA Tsfasman","year":"1995","unstructured":"Tsfasman M.A., Vl\u0103dut S.G.: Geometric approach to higher weights. IEEE Trans. Inf. Theory 41(6), 1564\u20131588 (1995).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"1758_CR48","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1137\/S0895480193243365","volume":"7","author":"G Van der Geer","year":"1994","unstructured":"Van der Geer G., Van der Vlugt M.: Generalized Hamming weights of Melas codes and dual Melas codes. SIAM J. Discret. Math. 7(4), 554\u2013559 (1994).","journal-title":"SIAM J. Discret. Math."},{"issue":"2","key":"1758_CR49","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/18.312183","volume":"40","author":"G Van der Geer","year":"1994","unstructured":"Van der Geer G., Van der Vlugt M.: On generalized Hamming weights of BCH codes. IEEE Trans. Inf. Theory 40(2), 543\u2013546 (1994).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1758_CR50","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1112\/blms\/27.1.82","volume":"27","author":"G Van der Geer","year":"1995","unstructured":"Van der Geer G., Van der Vlugt M.: The second generalized Hamming weight of the dual codes of double-error correcting binary BCH-codes. Bull. Lond. Math. Soc. 27(1), 82\u201386 (1995).","journal-title":"Bull. Lond. Math. Soc."},{"issue":"5","key":"1758_CR51","doi-asserted-by":"publisher","first-page":"1412","DOI":"10.1109\/18.133259","volume":"37","author":"V Wei","year":"1991","unstructured":"Wei V.: Generalized Hamming weights for linear codes. IEEE Trans. Inf. Theory 37(5), 1412\u20131418 (1991).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"12","key":"1758_CR52","doi-asserted-by":"publisher","first-page":"8723","DOI":"10.1109\/TIT.2024.3454959","volume":"70","author":"Y Wu","year":"2024","unstructured":"Wu Y., Li B., Fan W., Xiao F.: Two infinite families of quaternary codes. IEEE Trans. Inf. Theory 70(12), 8723\u20138733 (2024).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"1758_CR53","doi-asserted-by":"publisher","first-page":"3070","DOI":"10.1109\/TIT.2022.3142300","volume":"68","author":"Y Wu","year":"2022","unstructured":"Wu Y., Li C., Xiao F.: Quaternary linear codes and related binary subfield codes. IEEE Trans. Inf. Theory 68(5), 3070\u20133080 (2022).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"1758_CR54","doi-asserted-by":"publisher","first-page":"4071","DOI":"10.1109\/TIT.2016.2570236","volume":"62","author":"M Xiong","year":"2016","unstructured":"Xiong M., Li S., Ge G.: The weight hierarchy of some reducible cyclic codes. IEEE Trans. Inf. Theory 62(7), 4071\u20134080 (2016).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"1758_CR55","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1109\/18.335903","volume":"40","author":"K Yang","year":"1994","unstructured":"Yang K., Kumar P.V., Stichtenoth H.: On the weight hierarchy of geometric Goppa codes. IEEE Trans. Inf. Theory 40(3), 913\u2013920 (1994).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"1758_CR56","doi-asserted-by":"publisher","first-page":"4905","DOI":"10.1109\/TIT.2015.2444013","volume":"61","author":"M Yang","year":"2015","unstructured":"Yang M., Li J., Feng K., Lin D.: Generalized Hamming weights of irreducible cyclic codes. IEEE Trans. Inf. Theory 61(9), 4905\u20134913 (2015).","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01758-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-025-01758-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01758-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T11:36:46Z","timestamp":1772278606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-025-01758-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,22]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1758"],"URL":"https:\/\/doi.org\/10.1007\/s10623-025-01758-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,22]]},"assertion":[{"value":"18 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no possible conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"32"}}