{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:11Z","timestamp":1772283611549,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,12]],"date-time":"2016-01-12T00:00:00Z","timestamp":1452556800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Basic Research Project of China","award":["2011CB302400"],"award-info":[{"award-number":["2011CB302400"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379139"],"award-info":[{"award-number":["61379139"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"strategic Priority Research Program","award":["XDA06010701"],"award-info":[{"award-number":["XDA06010701"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s12095-015-0180-3","type":"journal-article","created":{"date-parts":[[2016,1,12]],"date-time":"2016-01-12T03:42:50Z","timestamp":1452570170000},"page":"315-322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A kind of three-weight linear codes"],"prefix":"10.1007","volume":"9","author":[{"given":"Qiuyan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Kelan","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,12]]},"reference":[{"issue":"2","key":"180_CR1","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1023\/A:1026421315292","volume":"15","author":"AR Anderson","year":"1998","unstructured":"Anderson, A. R., Ding, C., Helleseth, T., Kl\u00f8ve, T.: How to build robust shared control systems. Des. Codes Cryptogr. 15(2), 111\u2013124 (1998)","journal-title":"Des. Codes Cryptogr."},{"key":"180_CR2","first-page":"143","volume":"39","author":"AR Calderbank","year":"1984","unstructured":"Calderbank, A. R., Goethals, J. M.: Three-weight codes and association schemes. Philips J. Res. 39, 143\u2013152 (1984)","journal-title":"Philips J. Res."},{"issue":"6","key":"180_CR3","doi-asserted-by":"crossref","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet, C., Ding, C., Yuan, J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089\u20132102 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"180_CR4","doi-asserted-by":"crossref","unstructured":"Choi, S.-T., Kim, J.-Y., No, J.-S., Chung, H.: Weight distribution of some cyclic codes. In: Proceeding Int. Symp. Inf. Theory, pp. 2911\u20132913 (2012)","DOI":"10.1109\/ISIT.2012.6284056"},{"key":"180_CR5","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0012-365X(84)90047-5","volume":"50","author":"B Courteau","year":"1984","unstructured":"Courteau, B., Wolfmann, J.: On triple\u2013sum\u2013sets and two or three weights codes. Discret. Math. 50, 179\u2013191 (1984)","journal-title":"Discret. Math."},{"issue":"6","key":"180_CR6","doi-asserted-by":"crossref","first-page":"3265","DOI":"10.1109\/TIT.2015.2420118","volume":"61","author":"C Ding","year":"2015","unstructured":"Ding, C.: Linear codes from some 2-designs. IEEE Trans. Inf. Theory 61(6), 3265\u20133275 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"180_CR7","doi-asserted-by":"crossref","first-page":"2229","DOI":"10.1109\/TIT.2007.896872","volume":"53","author":"C Ding","year":"2007","unstructured":"Ding, C., Helleseth, T., Kl\u00f8ve, T., Wang, X.: A general construction of authentication codes. IEEE Trans. Inf. Theory 53(6), 2229\u20132235 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"180_CR8","doi-asserted-by":"crossref","unstructured":"Ding, C., Li, C., Li, N., Zhou, Z.: Three-weight cyclic codes and their weight distributions. Discret. Math. 339(2), 415\u2013427 (2016)","DOI":"10.1016\/j.disc.2015.09.001"},{"issue":"6","key":"180_CR9","doi-asserted-by":"crossref","first-page":"2274","DOI":"10.1109\/TIT.2007.896886","volume":"53","author":"C Ding","year":"2007","unstructured":"Ding, C., Niederreiter, H.: Cyclotomic linear codes of order 3. IEEE Trans. Inf. Theory 53(6), 2274\u20132277 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"180_CR10","doi-asserted-by":"crossref","first-page":"1879","DOI":"10.1109\/LCOMM.2014.2361516","volume":"18","author":"K Ding","year":"2014","unstructured":"Ding, K., Ding, C.: Bianry linear codes with three weights. IEEE Commun. Lett. 18(11), 1879\u20131882 (2014)","journal-title":"IEEE Commun. Lett."},{"issue":"11","key":"180_CR11","doi-asserted-by":"crossref","first-page":"5835","DOI":"10.1109\/TIT.2015.2473861","volume":"61","author":"K Ding","year":"2007","unstructured":"Ding, K., Ding, C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inf. Theory 61(11), 5835\u20135842 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"180_CR12","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.tcs.2004.09.011","volume":"330","author":"C Ding","year":"2005","unstructured":"Ding, C., Wang, X.: A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330(1), 81\u201399 (2005)","journal-title":"Theor. Comput. Sci."},{"issue":"4","key":"180_CR13","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.disc.2012.11.009","volume":"313","author":"C Ding","year":"2013","unstructured":"Ding, C., Yang, J.: Hamming weights in irreducible cyclic codes. Discret. Math. 313(4), 434\u2013446 (2013)","journal-title":"Discret. Math."},{"issue":"3","key":"180_CR14","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s10623-011-9514-0","volume":"62","author":"T Feng","year":"2012","unstructured":"Feng, T.: On cyclic codes of length 2 2 r \u2212 1 $2^{2^{r}}-1$ with two zeros whose dual codes have three weights. Des. Codes Cryptogr. 62(3), 253\u2013258 (2012)","journal-title":"Des. Codes Cryptogr."},{"key":"180_CR15","unstructured":"Grassl, M.: Bounds on the minimum distance of linear codes, available online at http:\/\/www.codetables,de"},{"key":"180_CR16","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"WC Huffman","year":"2003","unstructured":"Huffman, W. C., Pless, V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"key":"180_CR17","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.ffa.2014.01.009","volume":"28","author":"C Li","year":"2014","unstructured":"Li, C., Yue, Q., Li, F.: Weight distributions of cyclic codes with respect to pairwise coprime order elements. Finite Fields Appl. 28, 94\u2013114 (2014)","journal-title":"Finite Fields Appl."},{"issue":"7","key":"180_CR18","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1109\/TIT.2014.2317785","volume":"60","author":"C Li","year":"2014","unstructured":"Li, C., Yue, Q., Li, F.: Hamming weights of the duals of cyclic codes with two zeros. IEEE Trans. Inf. Theory 60(7), 3895\u20133902 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"180_CR19","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Cambridge University Press, Cambridge (1997)"},{"key":"180_CR20","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1016\/j.ffa.2009.05.005","volume":"15","author":"M Moisio","year":"2009","unstructured":"Moisio, M.: Explicit evaluation of some exponential sums. Finite Fields Appl. 15, 644\u2013651 (2009)","journal-title":"Finite Fields Appl."},{"issue":"11","key":"180_CR21","first-page":"612","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. Assoc. Comp. Mach. 22(11), 612\u2013613 (1979)","journal-title":"Commun. Assoc. Comp. Mach."},{"issue":"7","key":"180_CR22","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1109\/LCOMM.2015.2431253","volume":"19","author":"Q Wang","year":"2015","unstructured":"Wang, Q., Ding, K., Xue, R.: Binary linear codes with two weights. IEEE Commun. Lett. 19(7), 1097\u20131100 (2015)","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"180_CR23","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s00200-010-0128-y","volume":"21","author":"Y Xia","year":"2010","unstructured":"Xia, Y., Zeng, X., Hu, L.: Further crosscorrelation properties of sequences with the decimation factor d = (p n +1)\/(p+1)+(p n \u22121)\/2,. Appl. Algebra Eng. Commun. Comput. 21(5), 329\u2013342 (2010)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"180_CR24","unstructured":"Xiang, C.: A family of three-weight binary linear codes. arXiv: 1505,07726"},{"issue":"1","key":"180_CR25","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TIT.2005.860412","volume":"52","author":"J Yuan","year":"2006","unstructured":"Yuan, J., Ding, C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory 52(1), 206\u2013212 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"180_CR26","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.ffa.2013.08.005","volume":"25","author":"Z Zhou","year":"2014","unstructured":"Zhou, Z., Ding, C.: A class of three\u2013weight cyclic codes. Finite Fields Appl. 25, 79\u201393 (2014)","journal-title":"Finite Fields Appl."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0180-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-015-0180-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0180-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0180-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T23:54:05Z","timestamp":1559433245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-015-0180-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,12]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["180"],"URL":"https:\/\/doi.org\/10.1007\/s12095-015-0180-3","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,12]]}}}