{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T16:11:20Z","timestamp":1772295080068,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T00:00:00Z","timestamp":1460592000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s12095-016-0186-5","type":"journal-article","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T04:50:34Z","timestamp":1460609434000},"page":"71-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":95,"title":["Linear codes with few weights from weakly regular bent functions based on a generic construction"],"prefix":"10.1007","volume":"9","author":[{"given":"Sihem","family":"Mesnager","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,14]]},"reference":[{"issue":"2","key":"186_CR1","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1023\/A:1026421315292","volume":"15","author":"R Anderson","year":"1998","unstructured":"Anderson, R., Ding, C., Helleseth, T., Kl\u00f8ve, T.: How to build robust shared control systems. J. Des. Codes Crypt. 15(2), 111\u2013124 (1998)","journal-title":"J. Des. Codes Crypt."},{"key":"186_CR2","first-page":"143","volume":"39","author":"AR Calderbank","year":"1984","unstructured":"Calderbank, A.R., Goethals, J.M.: Three-weight codes and association schemes. Philips J. Res. 39, 143\u2013152 (1984)","journal-title":"Philips J. Res."},{"key":"186_CR3","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1112\/blms\/18.2.97","volume":"18","author":"AR Calderbank","year":"1986","unstructured":"Calderbank, A.R., Kantor, W.M.: The geometry of two-weight codes. Bull. London Math. Soc. 18, 97\u2013122 (1986)","journal-title":"Bull. London Math. Soc."},{"key":"186_CR4","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1137\/S0895480198350057","volume":"13","author":"A Canteaut","year":"2000","unstructured":"Canteaut, A., Charpin, P., Dobbertin, H.: Weight divisibility of cyclic codes, highly nonlinear functions on G F(2 m ), and crosscorrelation of maximum-length sequences. SIAM J. Discret. Math. 13, 105\u2013137 (2000)","journal-title":"SIAM J. Discret. Math."},{"key":"186_CR5","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. J. Des. Codes Crypt. 15, 125\u2013156 (1998)","journal-title":"J. Des. Codes Crypt."},{"issue":"6","key":"186_CR6","doi-asserted-by":"crossref","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet, C., Ding, C., Yuan, J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089\u20132102 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"186_CR7","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10623-015-0145-8","volume":"78","author":"C Carlet","year":"2016","unstructured":"Carlet, C., Mesnager, S.: Four decades of research on bent functions. J. Des. Codes Crypt. 78(1), 5\u201350 (2016)","journal-title":"J. Des. Codes Crypt."},{"key":"186_CR8","doi-asserted-by":"crossref","unstructured":"Choi, S.-T., Kim, J.-Y., No, J.-S., Chung, H.: Weight distribution of some cyclic codes. In: Proceedings IEEE international symposium on information theory, pp 2901\u20132903 (2012)","DOI":"10.1109\/ISIT.2012.6284056"},{"key":"186_CR9","doi-asserted-by":"crossref","unstructured":"Cohen, G., Mesnager, S., Patey, A.: On minimal and quasi-minimal linear codes. In: Proceedings of the 14th international conference on cryptography and coding, Oxford, United Kingdom, IMACC 2013, LNCS 8308, pp 85\u201398. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-45239-0_6"},{"key":"186_CR10","unstructured":"Cohen, G., Mesnager, S.: On minimal and almost-minimal linear codes. In: Proceedings of the 21st International Symposium on Mathematical Theory of Networks and Systems (MTNS 2014), Session \u201cCoding theory\u201d, pp 928\u2013931, Groningen (2014)"},{"key":"186_CR11","doi-asserted-by":"crossref","unstructured":"Cohen, G., Mesnager, S.: Variations on minimal linear codes. In: Proceedings of the 4th international castle meeting on coding theory and ApplicationSeries: CIM Series in Mathematical Sciences, vol. 3, pp 125\u2013131. Springer (2015)","DOI":"10.1007\/978-3-319-17296-5_12"},{"issue":"1","key":"186_CR12","doi-asserted-by":"crossref","first-page":"53","DOI":"10.3934\/amc.2016.10.53","volume":"10","author":"G Cohen","year":"2016","unstructured":"Cohen, G., Mesnager, S., Randriambololona, H.: Yet another variation on minimal linear codes. J. Adv. Math. Commun. 10(1), 53\u201361 (2016)","journal-title":"J. Adv. Math. Commun."},{"key":"186_CR13","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0012-365X(84)90047-5","volume":"50","author":"B Courteau","year":"1984","unstructured":"Courteau, B., Wolfmann, J.: On triple-sum-sets and two or three weights codes. J. Discret. Math. 50, 179\u2013191 (1984)","journal-title":"J. Discret. Math."},{"issue":"5","key":"186_CR14","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1109\/TIT.1975.1055435","volume":"21","author":"P Delsarte","year":"1975","unstructured":"Delsarte, P.: On triple-sum-sets and two or three weights codes. IEEE Trans. Inf. Theory 21(5), 575\u2013576 (1975)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"186_CR15","unstructured":"Dillon, J.: Elementary Hadamard difference sets. PhD thesis, University of Maryland (1974)"},{"issue":"6","key":"186_CR16","doi-asserted-by":"crossref","first-page":"3265","DOI":"10.1109\/TIT.2015.2420118","volume":"61","author":"C Ding","year":"2015","unstructured":"Ding, C.: Linear codes from some 2-Designs. IEEE Trans. Inf. Theory 61(6), 3265\u20133275 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"186_CR17","unstructured":"Ding, C.: A construction of binary linear codes from Boolean functions arXiv: 1511.00321v1 (2015)"},{"issue":"11","key":"186_CR18","doi-asserted-by":"crossref","first-page":"1879","DOI":"10.1109\/LCOMM.2014.2361516","volume":"18","author":"K Ding","year":"2014","unstructured":"Ding, K., Ding, C.: Binary linear codes with three weights. IEEE Commun. Lett. 18(11), 1879\u20131882 (2014)","journal-title":"IEEE Commun. Lett."},{"issue":"11","key":"186_CR19","doi-asserted-by":"crossref","first-page":"5835","DOI":"10.1109\/TIT.2015.2473861","volume":"61","author":"K Ding","year":"2015","unstructured":"Ding, K., Ding, C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inf. Theory 61(11), 5835\u20135842 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"186_CR20","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1016\/j.disc.2015.09.001","volume":"339","author":"C Ding","year":"2016","unstructured":"Ding, C., Li, C., Li, N., Zhou, Z.: Three-weight cyclic codes and their weight distributions. J. Discret. Math. 339(2), 415\u2013427 (2016)","journal-title":"J. Discret. Math."},{"key":"186_CR21","doi-asserted-by":"crossref","unstructured":"Ding, C., Luo, J., Niederreiter, H.: Two weight codes punctured from irreducible cyclic codes. In: Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C., Zhang, S. (eds.) Proceedings of the 1st International Workshop Coding Theory Cryptography, pp 119\u2013124, Singapore (2008)","DOI":"10.1142\/9789812832245_0009"},{"issue":"1","key":"186_CR22","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.tcs.2004.09.011","volume":"330","author":"C Ding","year":"2005","unstructured":"Ding, C., Wang, X.: A coding theory construction of new systematic authentication codes. J. Theor. Comput. Sci. 330(1), 81\u201399 (2005)","journal-title":"J. Theor. Comput. Sci."},{"issue":"9","key":"186_CR23","doi-asserted-by":"crossref","first-page":"3035","DOI":"10.1109\/TIT.2007.903153","volume":"53","author":"K Feng","year":"2007","unstructured":"Feng, K., Luo, J.: Value distribution of exponential sums from perfect nonlinear functions and their applications. IEEE Trans. Inf. Theory 53(9), 3035\u20133041 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"186_CR24","doi-asserted-by":"crossref","first-page":"2018","DOI":"10.1109\/TIT.2006.872854","volume":"52","author":"T Helleseth","year":"2006","unstructured":"Helleseth, T., Kholosha, A.: Monomial and quadratic bent functions over the finite fields of odd characteristic. IEEE Trans. Inf. Theory 52(5), 2018\u20132032 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"186_CR25","doi-asserted-by":"crossref","first-page":"4646","DOI":"10.1109\/TIT.2010.2055130","volume":"56","author":"T Helleseth","year":"2010","unstructured":"Helleseth, T., Kholosha, A.: New binomial bent functions over the finite fields of odd characteristic. IEEE Trans. Inf. Theory 56(9), 4646\u20134652 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"186_CR26","doi-asserted-by":"crossref","unstructured":"Helleseth, T., Kholosha, A.: Bent functions and their connections to combinatorics. Surveys in Combinatorics 2013, pp 91\u2013126. Cambridge University Press (2013)","DOI":"10.1017\/CBO9781139506748.004"},{"key":"186_CR27","unstructured":"Heng, Z., Yue, Q.: Several class of cyclic codes with either optimal three weights or a few weights arXiv: 1510.05355 (2015)"},{"key":"186_CR28","doi-asserted-by":"crossref","unstructured":"Hollmann, H.D.L., Xiang, Q.: A proof of the Welch and Niho conjectures on cross-correlations of binary m-sequences. Journal Finite Fields and Their Applications, Vol. 7, Issue 2, pp 253\u2013286. Cambridge University Press (2001)","DOI":"10.1006\/ffta.2000.0281"},{"key":"186_CR29","doi-asserted-by":"crossref","unstructured":"Ireland, K., Rosen, M.: A Classical introduction to modern number theory, 2nd ed., vol. 84. Springer, New York (1990). Graduate Texts in Mathematics","DOI":"10.1007\/978-1-4757-2103-4"},{"issue":"1","key":"186_CR30","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/0097-3165(85)90049-4","volume":"40","author":"PV Kumar","year":"1985","unstructured":"Kumar, P.V., Scholtz, R.A., Welch, L.R.: Generalized bent functions and their properties. J. Comb. Theory Ser. A 40(1), 90\u2013107 (1985)","journal-title":"J. Comb. Theory Ser. A"},{"issue":"7","key":"186_CR31","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1109\/TIT.2014.2317785","volume":"60","author":"C Li","year":"2014","unstructured":"Li, C., Yue, Q., Li, F.: Hamming weights of the duals of cyclic codes with two zeros. IEEE Trans. Inf. Theory 60(7), 3895\u20133902 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"186_CR32","doi-asserted-by":"crossref","unstructured":"Mesnager, S.: Bent functions: fundamentals and results. Springer, New-York. To appear","DOI":"10.1007\/978-3-319-32595-8"},{"key":"186_CR33","unstructured":"Lidl, R., Niederreiter, H.: Finite fields (Encyclopedia of Mathematics and its Applications), 2nd Edn. Cambridge University Press (1997)"},{"key":"186_CR34","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On \u201cbent\u201d functions. J. Comb. Theory Ser. A 20, 300\u2013305 (1976)","journal-title":"J. Comb. Theory Ser. A"},{"issue":"3","key":"186_CR35","doi-asserted-by":"crossref","first-page":"1166","DOI":"10.1109\/TIT.2016.2518678","volume":"62","author":"C Tang","year":"2016","unstructured":"Tang, C., Li, N., Qi, Y., Zhou, Z., Helleseth, T.: Linear codes with two or three weights from weakly regular bent functions. IEEE Trans. Inf. Theory 62(3), 1166\u20131176 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"186_CR36","doi-asserted-by":"crossref","first-page":"23","DOI":"10.3934\/amc.2015.9.23","volume":"9","author":"Y Xia","year":"2015","unstructured":"Xia, Y., Helleseth, T., Li, C.: Some new classes of cyclic codes with three or six weights. Adv. Math. Commun. 9(1), 23\u201336 (2015)","journal-title":"Adv. Math. Commun."},{"key":"186_CR37","unstructured":"Xu, G., Cao, X.: Linear codes with two or three weights from some functions with low Walsh spectrum in odd characteristic. arXiv: 1510.01031 (2015)"},{"issue":"2","key":"186_CR38","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/TIT.2005.862125","volume":"52","author":"J Yuan","year":"2006","unstructured":"Yuan, J., Carlet, C., Ding, C.: The weight distribution of a class of linear codes from perfect nonlinear functions. IEEE Trans. Inf. Theory 52(2), 712\u2013717 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"186_CR39","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TIT.2005.860412","volume":"52","author":"J Yuan","year":"2006","unstructured":"Yuan, J., Ding, C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory 52(1), 206\u2013212 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"186_CR40","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.ffa.2009.12.001","volume":"16","author":"X Zeng","year":"2010","unstructured":"Zeng, X., Hu, L., Jiang, W., Yue, Q., Cao, X.: The weight distribution of a class of p-ary cyclic codes. Journal Finite Fields and Their Applications 16(1), 56\u201373 (2010)","journal-title":"Journal Finite Fields and Their Applications"},{"key":"186_CR41","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.ffa.2013.08.005","volume":"25","author":"Z Zhou","year":"2014","unstructured":"Zhou, Z., Ding, C.: A class of three-weight codes. Journal Finite Fields and Their Applications 25, 79\u201393 (2014)","journal-title":"Journal Finite Fields and Their Applications"},{"key":"186_CR42","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Li, N., Fan, C., Helleseth, T.: Linear codes with two or three weights from quadratic bent functions. Journal Des. Codes Crypt., 1\u201313 (2015)","DOI":"10.1007\/s10623-015-0144-9"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0186-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-016-0186-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0186-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0186-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:19:23Z","timestamp":1567775963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-016-0186-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,14]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["186"],"URL":"https:\/\/doi.org\/10.1007\/s12095-016-0186-5","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,14]]}}}