{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T16:14:24Z","timestamp":1768925664869,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T00:00:00Z","timestamp":1470355200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s12095-016-0200-y","type":"journal-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T03:33:41Z","timestamp":1470368021000},"page":"93-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A class of linear codes with a few weights"],"prefix":"10.1007","volume":"9","author":[{"given":"Can","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Chunming","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Keqin","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,5]]},"reference":[{"issue":"2","key":"200_CR1","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1023\/A:1026421315292","volume":"15","author":"R Anderson","year":"1998","unstructured":"Anderson, R., Ding, C., Helleseth, T., Kl\u00f8ve, T.: How to build robust shared control systems. Des. Codes Cryptogr. 15(2), 111\u2013124 (1998)","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"200_CR2","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system I: The user language. J. Symb. Comput. 24(3), 235\u2013265 (1997)","journal-title":"J. Symb. Comput."},{"key":"200_CR3","first-page":"143","volume":"39","author":"AR Calderbank","year":"1984","unstructured":"Calderbank, A.R., Goethals, J.M.: Three-weight codes and association schemes. Philips J. Res. 39, 143\u2013152 (1984)","journal-title":"Philips J. Res."},{"key":"200_CR4","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1112\/blms\/18.2.97","volume":"18","author":"AR Calderbank","year":"1986","unstructured":"Calderbank, A.R., Kantor, W.M.: The geometry of two-weight codes. Bull. London Math. Soc. 18, 97\u2013122 (1986)","journal-title":"Bull. London Math. Soc."},{"issue":"6","key":"200_CR5","doi-asserted-by":"crossref","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet, C., Ding, C., Yuan, J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089\u20132102 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"200_CR6","doi-asserted-by":"crossref","first-page":"217","DOI":"10.4064\/aa-86-3-217-226","volume":"86","author":"RS Coulter","year":"1998","unstructured":"Coulter, R.S.: Further evaluations of Weil sums. Acta Arith 86(3), 217\u2013226 (1998)","journal-title":"Acta Arith"},{"issue":"6","key":"200_CR7","doi-asserted-by":"crossref","first-page":"3265","DOI":"10.1109\/TIT.2015.2420118","volume":"60","author":"C Ding","year":"2015","unstructured":"Ding, C.: Linear codes from some 2-designs. IEEE Trans. Inf. Theory 60(6), 3265\u20133275 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"200_CR8","doi-asserted-by":"crossref","unstructured":"Ding, C., et al.: A class of three-weight and four-weight codes. In: Xing, C. (ed.) Proc. of the Second International Workshop on Coding Theory and Cryptography, Lecture Notes in Computer Science, vol. 5557, pp. 34\u201342. Springer Verlag, Berlin (2009)","DOI":"10.1007\/978-3-642-01877-0_4"},{"issue":"9","key":"200_CR9","doi-asserted-by":"crossref","first-page":"2288","DOI":"10.1016\/j.disc.2016.03.029","volume":"339","author":"C Ding","year":"2016","unstructured":"Ding, C.: A construction of binary linear codes from boolean functions. Discret. Math. 339(9), 2288\u20132303 (2016)","journal-title":"Discret. Math."},{"key":"200_CR10","doi-asserted-by":"crossref","unstructured":"Ding, C., Luo, J., Niederreiter, H.: Two weight codes punctured from irreducible cyclic codes. In: Li, Y., Ling, S., Niederreiter, H., Wang, H., Xing, C., Zhang, S. (eds.) Proc. of the First International Workshop on Coding Theory and Cryptography, pp. 119\u2013124. World Scientific, Singapore (2008)","DOI":"10.1142\/9789812832245_0009"},{"issue":"6","key":"200_CR11","doi-asserted-by":"crossref","first-page":"2274","DOI":"10.1109\/TIT.2007.896886","volume":"53","author":"C Ding","year":"2007","unstructured":"Ding, C., Niederreiter, H.: Cyclotomic linear codes of order 3. IEEE Trans. Inf. Theory 53(6), 2274\u20132277 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"200_CR12","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.tcs.2004.09.011","volume":"330","author":"C Ding","year":"2005","unstructured":"Ding, C., Wang, X.: A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330, 81\u201399 (2005)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"200_CR13","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1016\/j.disc.2015.09.001","volume":"339","author":"C Ding","year":"2014","unstructured":"Ding, C., Li, C., Li, N., Zhou, Z.: Three-weight cyclic codes and their weight distributions. Discret. Math. 339(2), 415\u2013427 (2014)","journal-title":"Discret. Math."},{"issue":"11","key":"200_CR14","doi-asserted-by":"crossref","first-page":"1879","DOI":"10.1109\/LCOMM.2014.2361516","volume":"18","author":"K Ding","year":"2014","unstructured":"Ding, K., Ding, C.: Binary linear codes with three weights. IEEE Commun. Lett. 18(11), 1879\u20131882 (2014)","journal-title":"IEEE Commun. Lett."},{"issue":"11","key":"200_CR15","doi-asserted-by":"crossref","first-page":"5835","DOI":"10.1109\/TIT.2015.2473861","volume":"61","author":"K Ding","year":"2015","unstructured":"Ding, K., Ding, C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inf. Theory 61(11), 5835\u20135842 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"200_CR16","doi-asserted-by":"crossref","first-page":"3035","DOI":"10.1109\/TIT.2007.903153","volume":"53","author":"K Feng","year":"2007","unstructured":"Feng, K., Luo, J.: Value distribution of exponential sums from perfect nonlinear functions and their applications. IEEE Trans. Inform. Theory 53(9), 3035\u20133041 (2007)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"200_CR17","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"WC Huffman","year":"2003","unstructured":"Huffman, W. C., Pless, V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"key":"200_CR18","doi-asserted-by":"crossref","unstructured":"Ireland, K., Rosen, M.: A Classical Introduction to Modern Number Theory, 2nd ed, vol. 84. Springer-Verlag, New York (1990). Graduate Texts in Mathematics","DOI":"10.1007\/978-1-4757-2103-4"},{"key":"200_CR19","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.ffa.2014.01.009","volume":"28","author":"C Li","year":"2014","unstructured":"Li, C., Yue, Q., Li, F.: Weight distributions of cyclic codes with respect to pairwise coprime order elements. Finite Fields Appl. 28, 94\u2013114 (2014)","journal-title":"Finite Fields Appl."},{"key":"200_CR20","unstructured":"Li, F., Wang, Q., Lin, D.: A class of three-weight and five-weight linear codes. arXiv: 1509.06242v1 (2015)"},{"key":"200_CR21","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Cambridge University Press, Cambridge (1997)"},{"key":"200_CR22","doi-asserted-by":"crossref","unstructured":"Mesnager, S.: Linear codes with few weights from weakly regular bent functions based on a generic construction. IACR Cryptology ePrint Archive, 1103 (2015)","DOI":"10.1007\/s12095-016-0186-5"},{"issue":"2","key":"200_CR23","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/LCOMM.2015.2506576","volume":"20","author":"Y Qi","year":"2016","unstructured":"Qi, Y., Tang, C., Huang, D.: Binary linear codes with few weights. IEEE Commun. Lett. 20(2), 208\u2013211 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"3","key":"200_CR24","doi-asserted-by":"crossref","first-page":"1166","DOI":"10.1109\/TIT.2016.2518678","volume":"62","author":"C Tang","year":"2016","unstructured":"Tang, C., Li, N., Qi, Y., Zhou, Z., Helleseth, T.: Linear codes with two or three weights from weakly regular bent functions. IEEE Trans. Inf. Theory 62(3), 1166\u20131176 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"200_CR25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/LCOMM.2015.2497344","volume":"20","author":"C Tang","year":"2016","unstructured":"Tang, C., Qi, Y., Huang, D.: Two-weight and three-weight linear codes from square functions. IEEE Commun. Lett. 20(1), 29\u201332 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"7","key":"200_CR26","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1109\/LCOMM.2015.2431253","volume":"19","author":"Q Wang","year":"2015","unstructured":"Wang, Q., Ding, K., Xue, R.: Binary linear codes with two weights. IEEE Commun. Lett. 19(7), 1097\u20131100 (2015)","journal-title":"IEEE Commun. Lett."},{"issue":"4","key":"200_CR27","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/s12095-015-0158-1","volume":"8","author":"C Xiang","year":"2016","unstructured":"Xiang, C.: Linear codes from a generic construction. Cryptogr. Commun. 8(4), 525\u2013539 (2016)","journal-title":"Cryptogr. Commun."},{"issue":"1","key":"200_CR28","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TIT.2005.860412","volume":"52","author":"J Yuan","year":"2006","unstructured":"Yuan, J., Ding, C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory 52(1), 206\u2013212 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"200_CR29","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.ffa.2013.08.005","volume":"25","author":"Z Zhou","year":"2014","unstructured":"Zhou, Z., Ding, C.: A class of three-weight cyclic codes. Finite Fields Appl. 25, 79\u201393 (2014)","journal-title":"Finite Fields Appl."},{"key":"200_CR30","doi-asserted-by":"publisher","unstructured":"Zhou, Z., Li, N., Fan, C., Helleseth, T.: Linear codes with two or three weights from quadratic bent functions, Des. Codes Cryptogr. doi: 10.1007\/s10623-015-0144-9 (2015)","DOI":"10.1007\/s10623-015-0144-9"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0200-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-016-0200-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0200-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0200-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T00:21:21Z","timestamp":1656980481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-016-0200-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,5]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["200"],"URL":"https:\/\/doi.org\/10.1007\/s12095-016-0200-y","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,5]]}}}