{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T09:43:22Z","timestamp":1745228602487},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T00:00:00Z","timestamp":1467849600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s12095-016-0198-1","type":"journal-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T07:03:54Z","timestamp":1467875034000},"page":"545-562","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Complete weight enumerators of two classes of linear codes"],"prefix":"10.1007","volume":"9","author":[{"given":"Xianfang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jian","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Fang-Wei","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,7]]},"reference":[{"key":"198_CR1","doi-asserted-by":"crossref","first-page":"25","DOI":"10.35552\/anujr.a.22.1.541","volume":"22","author":"M AL-Ashker","year":"2008","unstructured":"AL-Ashker, M., Isleem, I.: Simplex Linear Codes Over the Ring f 2 + v f 2. An-Najah Univ J. Res. (N. Sc.) 22, 25\u201342 (2008)","journal-title":"An-Najah Univ J. Res. (N. Sc.)"},{"key":"198_CR2","doi-asserted-by":"crossref","first-page":"2275","DOI":"10.1016\/j.disc.2015.05.016","volume":"338","author":"S Bae","year":"2015","unstructured":"Bae, S., Li, C., Yue, Q.: On the complete weight enumerator of some reducible cyclic codes. Discret. Math. 338, 2275\u20132287 (2015)","journal-title":"Discret. Math."},{"issue":"2","key":"198_CR3","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1137\/0404016","volume":"4","author":"IF Blake","year":"1991","unstructured":"Blake, I. F., Kith, K.: On the complete weight enumerator of Reed-Solomon codes. SIAM J. Discret. Math. 4(2), 164\u2013171 (1991)","journal-title":"SIAM J. Discret. Math."},{"issue":"3","key":"198_CR4","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system I: The user language. J. Symb. Comp. 24(3), 235\u2013265 (1997)","journal-title":"J. Symb. Comp."},{"issue":"1","key":"198_CR5","first-page":"103","volume":"20","author":"Y Cengellenmis","year":"2012","unstructured":"Cengellenmis, Y., Al-Ashker, M.M.: MacDonald codes over the ring F 3 + v F 3 $\\mathbb {F}_{3}+v\\mathbb {F}_{3}$ . IUG Journal of Natural and Engineering Studies 20(1), 103\u2013112 (2012)","journal-title":"IUG Journal of Natural and Engineering Studies"},{"issue":"3","key":"198_CR6","first-page":"277","volume":"14","author":"Y Cengellenmis","year":"2011","unstructured":"Cengellenmis, Y., Al-Ashker, M.M.: Simplex code of type beta over F 3 + v F 3 $\\mathbb {F}_{3}+v\\mathbb {F}_{3}$ . Proceedings of the Jangjeon Mathematical Society 14(3), 277\u2013284 (2011)","journal-title":"Proceedings of the Jangjeon Mathematical Society"},{"issue":"20","key":"198_CR7","first-page":"985","volume":"5","author":"A Dertli","year":"2011","unstructured":"Dertli, A., Cengellenmis, Y.: MacDonald codes over the ring F 2 + v F 2 $\\mathbb {F}_{2}+v\\mathbb {F}_{2}$ . Int. J. Algebra. 5(20), 985\u2013991 (2011)","journal-title":"Int. J. Algebra."},{"issue":"1","key":"198_CR8","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.tcs.2004.09.011","volume":"330","author":"C Ding","year":"2005","unstructured":"Ding, C., Wang, X.: A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330(1), 81\u201399 (2005)","journal-title":"Theor. Comput. Sci."},{"issue":"6","key":"198_CR9","doi-asserted-by":"crossref","first-page":"2229","DOI":"10.1109\/TIT.2007.896872","volume":"53","author":"C Ding","year":"2007","unstructured":"Ding, C., Helleseth, T., Kl\u00f8ve, T., Wang, X.: A general construction of authentication codes. IEEE Trans. Inf. Theory 53(6), 2229\u20132235 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"198_CR10","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1109\/TIT.2005.844087","volume":"51","author":"C Ding","year":"2005","unstructured":"Ding, C., Yin, J.: Algebraic constructions of constant composition codes. IEEE Trans. Inf. Theory 51(4), 1585\u20131589 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"198_CR11","doi-asserted-by":"crossref","first-page":"2018","DOI":"10.1109\/TIT.2006.872854","volume":"52","author":"T Helleseth","year":"2006","unstructured":"Helleseth, T., Kholosha, A.: Monomial and quadratic bent functions over the finite fields of odd characteristic. IEEE Trans. Inf. Theory 52(5), 2018\u20132032 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"198_CR12","unstructured":"Kith, K.: Complete weight enumeration of Reed-Solomon codes. Masters Thesis, Department of Electrical and Computing Engineering, University of Waterloo, Waterloo, ON, Canada (1989)"},{"key":"198_CR13","unstructured":"Kuzmin, A.S., Nechaev, A.A.: Complete weight enumerators of generalized Kerdock code and linear recursive codes over Galois rings. In: Proceedings of the WCC99 Workshop on Coding and Cryptography, pp. 332-336, Paris, France, 11-14 January (1999)"},{"key":"198_CR14","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/S0166-218X(00)00348-6","volume":"111","author":"AS Kuzmin","year":"2001","unstructured":"Kuzmin, A. S., Nechaev, A. A.: Complete weight enumerators of generalized Kerdock code and related linear codes over Galois rings. Discret. Appl. Math. 111, 117\u2013137 (2001)","journal-title":"Discret. Appl. Math."},{"key":"198_CR15","doi-asserted-by":"crossref","unstructured":"Li, C., Yue, Q., Fu, F.-W.: Complete weight enumerators of some cyclic codes. Des. Codes Cryptogr. preprint (2015)","DOI":"10.1007\/s10623-015-0091-5"},{"key":"198_CR16","doi-asserted-by":"crossref","unstructured":"Li, C., Bae, S., Ahn, J., Yang, S., Yao, Z.: Complete weight enumerators of linear codes and their applications. Des. Codes Cryptogr. preprint (2015)","DOI":"10.1007\/s10623-015-0136-9"},{"issue":"11","key":"198_CR17","doi-asserted-by":"crossref","first-page":"7482","DOI":"10.1109\/TIT.2011.2161631","volume":"57","author":"J Luo","year":"2011","unstructured":"Luo, J., Helleseth, T.: Constant composition codes as subcodes of cyclic codes. IEEE Trans. Inf. Theory 57(11), 7482\u20137488 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"198_CR18","volume-title":"The Theory of Error-Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F. J., Sloane, N. J. A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)"},{"issue":"6","key":"198_CR19","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1109\/TIT.1972.1054898","volume":"18","author":"FJ MacWilliams","year":"1972","unstructured":"MacWilliams, F.J., Mallows, C.L., Sloane N.J.A.: Generalizations of Gleasons theorem on weight enumerators of self-dual codes. IEEE Trans. Inf. Theory 18(6), 794\u2013805 (1972)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"198_CR20","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1147\/rd.41.0043","volume":"4","author":"JE MacDonald","year":"1960","unstructured":"MacDonald, J.E.: Design methods for maximum minimun-distance error-coorcting codes. IBM J. Res. Dev. 4(1), 43\u201357 (1960)","journal-title":"IBM J. Res. Dev."},{"issue":"3","key":"198_CR21","first-page":"239","volume":"7","author":"RS Rees","year":"1996","unstructured":"Rees, R.S., Stinson, D.R.: Combinatorial Characterizations of Authentication Codes II. Des. Codes Cryptogr. 7(3), 239\u2013259 (1996)","journal-title":"Des. Codes Cryptogr."},{"key":"198_CR22","doi-asserted-by":"crossref","unstructured":"Simmons, G.J.: Authentication Theory\/Coding Theory. In: Advances in CryptologyCRYPTO84. Lecture Notes in Computer Science, vol. 196, pp 411\u2013431. Springer, Berlin (1984)","DOI":"10.1007\/3-540-39568-7_32"},{"key":"198_CR23","unstructured":"Wang, X., Gao, J., Fu, F. -W.: Secret sharing schemes from linear codes over F p + v F p $\\mathbb {F}_{p}+v\\mathbb {F}_{p}$ . Int. J. Found. Comput. Sci to appear (2015)"},{"key":"198_CR24","unstructured":"Xiang, C., Liu, H.: The complete weight enumerator of a class of linear codes. arXiv: hep-th\/1505.06502v2 (2015)"},{"key":"198_CR25","unstructured":"Yang, S., Yao, Z.: Complete weight enumerators of some linear codes. arXiv: 1505.06326v2 (2015)"},{"key":"198_CR26","unstructured":"Yang, S., Yao, Z.: The complete weight enumerator of several cyclic codes. arXiv: 1505.05575v2 (2015)"},{"key":"198_CR27","unstructured":"Yang, S., Yao, Z.: Complete weight enumerator of a family of linear Codes from Cyclotomy. arXiv: 1507.05732v1 (2015)"},{"key":"198_CR28","doi-asserted-by":"crossref","unstructured":"Yang, S., Yao, Z.: Complete weight enumerators of a family of three-weight linear codes. Des. Codes Cryptogr (2016)","DOI":"10.1007\/s10623-016-0191-x"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0198-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-016-0198-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0198-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0198-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T04:27:43Z","timestamp":1692419263000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-016-0198-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,7]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["198"],"URL":"https:\/\/doi.org\/10.1007\/s12095-016-0198-1","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,7]]}}}