{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T09:43:57Z","timestamp":1745228637769},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s12095-021-00548-1","type":"journal-article","created":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T08:04:26Z","timestamp":1636704266000},"page":"663-675","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A class of binary cyclic codes with optimal parameters"],"prefix":"10.1007","volume":"14","author":[{"given":"Kaiqiang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haode","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,12]]},"reference":[{"issue":"5-6","key":"548_CR1","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s00200-009-0109-1","volume":"20","author":"X Cao","year":"2009","unstructured":"Cao, X.: A note on the moments of Kloosterman sums. Appl. Algebra Engrg. Comm. Comput. 20(5-6), 447\u2013457 (2009)","journal-title":"Appl. Algebra Engrg. Comm. Comput."},{"issue":"10","key":"548_CR2","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1007\/s11425-011-4264-z","volume":"54","author":"X Cao","year":"2011","unstructured":"Cao, X., Hu, L.: A construction of hyperbent functions with polynomial trace form. Sci. China Math. 54(10), 2229\u20132234 (2011)","journal-title":"Sci. China Math."},{"issue":"6","key":"548_CR3","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet, C., Ding, C., Yuan, J.: Linear codes from highly nonlinear functions and their secret sharing schemes. IEEE Trans. Inform. Theory 51(6), 2089\u20132102 (2005)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"5","key":"548_CR4","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1109\/TIT.1975.1055435","volume":"21","author":"P Delsarte","year":"1975","unstructured":"Delsarte, P.: On subfield subcodes of modified Reed-Solomon codes. IEEE Trans. Inform. Theory 21(5), 575\u2013576 (1975)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"5","key":"548_CR5","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1016\/j.disc.2019.01.023","volume":"342","author":"HQ Dinh","year":"2019","unstructured":"Dinh, H. Q., Wang, X., Liu, H., Sriboonchitta, S.: On the Hamming distances of repeated- root consta cyclic codes of length 4ps. Discret. Math. 342(5), 1456\u20131470 (2019)","journal-title":"Discret. Math."},{"issue":"2","key":"548_CR6","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.disc.2015.09.001","volume":"339","author":"C Ding","year":"2016","unstructured":"Ding, C., Li, C., Li, N., Zhou, Z.: Three-weight cyclic codes and their weight distributions. Discret. Math. 339(2), 415\u2013427 (2016)","journal-title":"Discret. Math."},{"issue":"9","key":"548_CR7","doi-asserted-by":"publisher","first-page":"5898","DOI":"10.1109\/TIT.2013.2260795","volume":"59","author":"C Ding","year":"2013","unstructured":"Ding, C., Helleseth, T.: Optimal ternary cyclic codes from monomials. IEEE Trans. Inform. Theory 59(9), 5898\u20135904 (2013)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"548_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.tcs.2004.09.011","volume":"330","author":"C Ding","year":"2005","unstructured":"Ding, C., Wang, X.: A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330(1), 81\u201399 (2005)","journal-title":"Theor. Comput. Sci."},{"issue":"7","key":"548_CR9","doi-asserted-by":"publisher","first-page":"3605","DOI":"10.1109\/TIT.2010.2048504","volume":"56","author":"C Ding","year":"2010","unstructured":"Ding, C., Yang, Y., Tang, X.: Optimal sets of frequency hopping sequences from linear cyclic codes. IEEE Trans. Inform. Theory 56(7), 3605\u20133612 (2010)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"548_CR10","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.disc.2012.11.009","volume":"313","author":"C Ding","year":"2013","unstructured":"Ding, C., Yang, J.: Hamming weights in irreducible cyclic codes. Discret. Math. 313(4), 434\u2013446 (2013)","journal-title":"Discret. Math."},{"issue":"4","key":"548_CR11","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1109\/18.923728","volume":"47","author":"H Dobbertin","year":"2001","unstructured":"Dobbertin, H., Helleseth, T., Kumar, V., Martinsen, H.: Ternary m-sequences with three-valued cross-correlation function: New decimations of Welch and Niho type. IEEE Trans. Inform. Theory 47(4), 1473\u20131481 (2001)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"5","key":"548_CR12","doi-asserted-by":"publisher","first-page":"2018","DOI":"10.1109\/TIT.2006.872854","volume":"52","author":"T Helleseth","year":"2006","unstructured":"Helleseth, T., Kholosha, A.: Monomial and quadratic bent functions over the finite fields of odd characteristic. IEEE Trans Inform. Theory 52(5), 2018\u20132032 (2006)","journal-title":"IEEE Trans Inform. Theory"},{"key":"548_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"WC Huffman","year":"2003","unstructured":"Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)"},{"key":"548_CR14","doi-asserted-by":"publisher","DOI":"10.1142\/6400","volume-title":"Codes for Error Detection, World Scientific","author":"T Kl\u00f8ve","year":"2007","unstructured":"Kl\u00f8ve, T.: Codes for Error Detection, World Scientific. World Scientific Publishing Co., Inc., New Jersey (2007)"},{"issue":"3","key":"548_CR15","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/18.54892","volume":"36","author":"G Lachaud","year":"1990","unstructured":"Lachaud, G., Wolfmann, J.: The weights of the orthogonals of the extended quadratic binary Goppa codes. IEEE Trans. Inform. Theory 36(3), 686\u2013692 (1990)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"548_CR16","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.ffa.2014.01.009","volume":"28","author":"C Li","year":"2014","unstructured":"Li, C., Yue, Q., Li, F.: Weight distributions of cyclic codes with respect to pairwise coprime order elements. Finite Fields Appl. 28, 94\u2013114 (2014)","journal-title":"Finite Fields Appl."},{"key":"548_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-58575-3","volume-title":"Introduction to Coding Theory","author":"JH Lint","year":"1999","unstructured":"Lint, J.H.: Introduction to Coding Theory. Springer, Berlin (1999)"},{"key":"548_CR18","doi-asserted-by":"publisher","unstructured":"Liu, K., Ren, W., Wang, F., Wang, J.: A new class of distance-optimal binary cyclic codes and their duals. Appl. Algebra Engin. Commun. Comput. https:\/\/doi.org\/10.1007\/s00200-020-00478-0 (2021)","DOI":"10.1007\/s00200-020-00478-0"},{"key":"548_CR19","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1587\/transfun.E100.A.965","volume":"100-A","author":"R Luo","year":"2017","unstructured":"Luo, R., Wei, L., Cheng, F., Du, X.: A class of binary cyclic codes with four weights. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A, 965\u2013968 (2017)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"3","key":"548_CR20","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1109\/TIT.2019.2946660","volume":"66","author":"M Shi","year":"2020","unstructured":"Shi, M., Li, X., Neri, A., Sol\u0117, P.: : How many weights can a cyclic code have? IEEE Trans. Inform. Theory 66(3), 1449\u20131459 (2020)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"9","key":"548_CR21","doi-asserted-by":"publisher","first-page":"5985","DOI":"10.1109\/TIT.2013.2266731","volume":"59","author":"J Yang","year":"2013","unstructured":"Yang, J., Xiong, M., Ding, C., Luo, J.: Weight distribution of a class of cyclic codes with arbitrary number of zeros. IEEE Trans. Inform. Theory 59(9), 5985\u20135993 (2013)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"548_CR22","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s00200-019-00400-3","volume":"32","author":"X Zeng","year":"2021","unstructured":"Zeng, X., Fan, C., Zeng, Q., Qi, Y.: Two classes of binary cyclic codes and their weight distributions. Appli. Algebra Engin., Commun. Comput. 32, 49\u201361 (2021)","journal-title":"Appli. Algebra Engin., Commun. Comput."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00548-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00548-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00548-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T10:11:21Z","timestamp":1651572681000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00548-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["548"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00548-1","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"29 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}