{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T15:19:01Z","timestamp":1769699941165,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T00:00:00Z","timestamp":1722384000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T00:00:00Z","timestamp":1722384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62172337"],"award-info":[{"award-number":["62172337"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Project of Gansu Natural Science Foundation","award":["23JRRA685"],"award-info":[{"award-number":["23JRRA685"]}]},{"name":"Funds for Innovative Fundamental Research Group Project of Gansu Province","award":["23JRRA684"],"award-info":[{"award-number":["23JRRA684"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s12095-024-00729-8","type":"journal-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T12:03:07Z","timestamp":1722427387000},"page":"1429-1448","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Several classes of linear codes with AMDS duals and their subfield codes"],"prefix":"10.1007","volume":"16","author":[{"given":"Xingbin","family":"Qiao","sequence":"first","affiliation":[]},{"given":"Xiaoni","family":"Du","sequence":"additional","affiliation":[]},{"given":"Wenping","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,31]]},"reference":[{"issue":"11","key":"729_CR1","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1109\/LCOMM.2014.2361516","volume":"18","author":"K Ding","year":"2014","unstructured":"Ding, K., Ding, C.: Binary linear codes with three weights. IEEE Commun. Lett. 18(11), 1879\u20131882 (2014)","journal-title":"IEEE Commun. Lett."},{"issue":"6","key":"729_CR2","doi-asserted-by":"publisher","first-page":"3265","DOI":"10.1109\/TIT.2015.2420118","volume":"61","author":"C Ding","year":"2015","unstructured":"Ding, C.: Linear codes from some 2-designs. IEEE Trans. Inf. Theory 61(6), 3265\u20133275 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"729_CR3","doi-asserted-by":"publisher","first-page":"5835","DOI":"10.1109\/TIT.2015.2473861","volume":"61","author":"K Ding","year":"2015","unstructured":"Ding, K., Ding, C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inf. Theory 61(11), 5835\u20135842 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"729_CR4","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1109\/TIT.2007.896872","volume":"53","author":"C Ding","year":"2007","unstructured":"Ding, C., Helleseth, T., Kl\u00f8ve, T., Wang, X.: A generic construction of cartesian authentication codes. IEEE Trans. Inf. Theory 53(6), 2229\u20132235 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"729_CR5","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.disc.2015.09.001","volume":"339","author":"C Ding","year":"2016","unstructured":"Ding, C., Li, C., Li, N., Zhou, Z.: Three-weight cyclic codes and their weight distributions. Discrete Math. 339(2), 415\u2013427 (2016)","journal-title":"Discrete Math."},{"issue":"2","key":"729_CR6","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s12095-017-0220-2","volume":"10","author":"G Luo","year":"2018","unstructured":"Luo, G., Cao, X., Xu, S., Mi, J.: Binary linear codes with two or three weights from Niho exponents. Cryptogr. Commun. 10(2), 301\u2013318 (2018)","journal-title":"Cryptogr. Commun."},{"issue":"2","key":"729_CR7","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s12095-017-0221-1","volume":"10","author":"P Tan","year":"2018","unstructured":"Tan, P., Zhou, Z., Tang, D., Helleseth, T.: The weight distribution of a class of two-weight linear codes derived from Kloosterman sums. Cryptogr. Commun. 10(2), 291\u2013299 (2018)","journal-title":"Cryptogr. Commun."},{"key":"729_CR8","doi-asserted-by":"publisher","first-page":"101608","DOI":"10.1016\/j.ffa.2019.101608","volume":"62","author":"Z Hu","year":"2020","unstructured":"Hu, Z., Li, N., Zeng, X.: New linear codes with few weights derived from Kloosterman sums. Finite Fields Appl. 62, 101608 (2020)","journal-title":"Finite Fields Appl."},{"key":"729_CR9","doi-asserted-by":"publisher","first-page":"101926","DOI":"10.1016\/j.ffa.2021.101926","volume":"76","author":"Z Hu","year":"2021","unstructured":"Hu, Z., Wang, L., Li, N., Zeng, X.: Several classes of linear codes with few weights from the closed butterfly structure. Finite Fields Appl. 76, 101926 (2021)","journal-title":"Finite Fields Appl."},{"key":"729_CR10","doi-asserted-by":"publisher","first-page":"101865","DOI":"10.1016\/j.ffa.2021.101865","volume":"73","author":"F Li","year":"2021","unstructured":"Li, F., Li, X.: Weight distributions and weight hierarchies of two classes of binary linear codes. Finite Fields Appl. 73, 101865 (2021)","journal-title":"Finite Fields Appl."},{"issue":"1","key":"729_CR11","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s10623-021-00962-9","volume":"90","author":"F Li","year":"2022","unstructured":"Li, F., Li, X.: Weight distributions and weight hierarchies of a family of $$p$$-ary linear codes. Des. Codes Cryptogr. 90(1), 49\u201366 (2022)","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"729_CR12","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s10623-022-01122-3","volume":"91","author":"S Mesnager","year":"2023","unstructured":"Mesnager, S., Qian, L., Cao, X.: Further projective binary linear codes derived from two-to-one functions and their duals. Des. Codes Cryptogr. 91(3), 719\u2013746 (2023)","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"729_CR13","doi-asserted-by":"publisher","first-page":"3285","DOI":"10.1109\/TIT.2023.3236955","volume":"69","author":"S Mesnager","year":"2023","unstructured":"Mesnager, S., Qian, L., Cao, X., Yuan, M.: Several families of binary minimal linear codes from two-to-one functions. IEEE Trans. Inform. Theory 69(5), 3285\u20133301 (2023)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"729_CR14","doi-asserted-by":"publisher","first-page":"102186","DOI":"10.1016\/j.ffa.2023.102186","volume":"88","author":"C Zhu","year":"2023","unstructured":"Zhu, C., Liao, Q.: Two new classes of projective two-weight linear codes. Finite Fields Appl. 88, 102186 (2023)","journal-title":"Finite Fields Appl."},{"key":"729_CR15","doi-asserted-by":"publisher","first-page":"102304","DOI":"10.1016\/j.ffa.2023.102304","volume":"92","author":"Y He","year":"2023","unstructured":"He, Y., Mesnager, S., Li, N., Wang, L., Zeng, X.: Several classes of linear codes with few weights over finite fields. Finite Fields Appl. 92, 102304 (2023)","journal-title":"Finite Fields Appl."},{"issue":"7","key":"729_CR16","doi-asserted-by":"publisher","first-page":"112881","DOI":"10.1016\/j.disc.2022.112881","volume":"345","author":"X Zhang","year":"2022","unstructured":"Zhang, X., Du, X., Jin, W.: Weight distributions of two classes of linear codes with five or six weights. Discrete Math. 345(7), 112881 (2022)","journal-title":"Discrete Math."},{"issue":"6","key":"729_CR17","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1007\/s10623-023-01353-y","volume":"92","author":"X Du","year":"2024","unstructured":"Du, X., Rodr\u00edguez, R., Wu, H.: Infinite families of minimal binary codes via Krawtchouk polynomials. Des. Codes Cryptogr. 92(6), 1455\u20131475 (2024)","journal-title":"Des. Codes Cryptogr."},{"key":"729_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-023-00638-y","volume-title":"Construction of a class of at most three-weight linear codes and the applications","author":"W Liu","year":"2023","unstructured":"Liu, W., Du, X., Qiao, X.: Construction of a class of at most three-weight linear codes and the applications. Appl. Algebra Engrg. Comm, Comput (2023)"},{"issue":"1","key":"729_CR19","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TIT.2005.860412","volume":"52","author":"J Yuan","year":"2006","unstructured":"Yuan, J., Ding, C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inform. Theory 52(1), 206\u2013212 (2006)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"729_CR20","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1112\/blms\/18.2.97","volume":"18","author":"R Calderbank","year":"1986","unstructured":"Calderbank, R., Kantor, W.M.: The geometry of two-weight codes. Bull. London Math. Soc. 18(2), 97\u2013122 (1986)","journal-title":"Bull. London Math. Soc."},{"issue":"4\u20135","key":"729_CR21","first-page":"143","volume":"39","author":"AR Calderbank","year":"1984","unstructured":"Calderbank, A.R., Goethals, J.-M.: Three-weight codes and association schemes. Philips J. Res. 39(4\u20135), 143\u2013152 (1984)","journal-title":"Philips J. Res."},{"issue":"1","key":"729_CR22","first-page":"97","volume":"13","author":"A Canteaut","year":"2000","unstructured":"Canteaut, A., Charpin, P., Dobbertin, H.: Weight divisibility of cyclic codes, highly nonlinear functions on $$\\mathbb{F} _{2^n}$$, and crosscorrelation of maximum-length sequences. SIAM Disc. Math. 13(1), 97\u2013122 (2000)","journal-title":"SIAM Disc. Math."},{"issue":"2","key":"729_CR23","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15(2), 125\u2013156 (1998)","journal-title":"Des. Codes Cryptogr."},{"key":"729_CR24","unstructured":"Cannon, J., Bosma, W., Fieker, C., Stell, E.: Handbook of Magma Functions. version 2.19., Sydney (2013)"},{"issue":"8","key":"729_CR25","doi-asserted-by":"publisher","first-page":"4715","DOI":"10.1109\/TIT.2019.2907276","volume":"65","author":"C Ding","year":"2019","unstructured":"Ding, C., Heng, Z.: The subfield codes of ovoid codes. IEEE Trans. Inform. Theory 65(8), 4715\u20134729 (2019)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"729_CR26","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.ffa.2018.12.006","volume":"56","author":"Z Heng","year":"2019","unstructured":"Heng, Z., Ding, C.: The subfield codes of hyperoval and conic codes. Finite Fields Appl. 56, 308\u2013331 (2019)","journal-title":"Finite Fields Appl."},{"issue":"9","key":"729_CR27","doi-asserted-by":"publisher","first-page":"5387","DOI":"10.1109\/TIT.2020.2970405","volume":"66","author":"Z Heng","year":"2020","unstructured":"Heng, Z., Ding, C., Wang, W.: Optimal binary linear codes from maximal arcs. IEEE Trans. Inform. Theory 66(9), 5387\u20135394 (2020)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"729_CR28","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1007\/s12095-020-00432-4","volume":"12","author":"X Wang","year":"2020","unstructured":"Wang, X., Zheng, D.: The subfield codes of several classes of linear codes. Cryptogr. Commun. 12(6), 1111\u20131131 (2020)","journal-title":"Cryptogr. Commun."},{"issue":"1","key":"729_CR29","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s12095-020-00460-0","volume":"13","author":"X Wang","year":"2021","unstructured":"Wang, X., Zheng, D., Zhang, Y.: A class of subfield codes of linear codes and their duals. Cryptogr. Commun. 13(1), 173\u2013196 (2021)","journal-title":"Cryptogr. Commun."},{"issue":"6","key":"729_CR30","doi-asserted-by":"publisher","first-page":"3941","DOI":"10.1109\/TIT.2023.3328932","volume":"70","author":"L Xu","year":"2024","unstructured":"Xu, L., Fan, C., Mesnager, S., Luo, R., Yan, H.: Subfield codes of several few-weight linear codes parameterized by functions and their consequences. IEEE Trans. Inform. Theory 70(6), 3941\u20133964 (2024)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"729_CR31","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Cambridge University Press, Cambridge (1997)"},{"key":"729_CR32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316257449","volume-title":"Finite Geometry and Combinatorial Applications","author":"S Ball","year":"2015","unstructured":"Ball, S.: Finite Geometry and Combinatorial Applications. Cambridge University Press, Cambridge (2015)"},{"key":"729_CR33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-correcting Codes","author":"WC Huffman","year":"2003","unstructured":"Huffman, W.C., Pless, V.: Fundamentals of Error-correcting Codes. Cambridge University Press, Cambridge (2003)"},{"issue":"6","key":"729_CR34","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1016\/j.ffa.2009.05.005","volume":"15","author":"M Moisio","year":"2009","unstructured":"Moisio, M.: Explicit evaluation of some exponential sums. Finite Fields Appl. 15(6), 644\u2013651 (2009)","journal-title":"Finite Fields Appl."},{"issue":"7","key":"729_CR35","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/LCOMM.2015.2431253","volume":"19","author":"Q Wang","year":"2015","unstructured":"Wang, Q., Ding, K., Xue, R.: Binary linear codes with two weights. IEEE Commun. Lett. 19(7), 1097\u20131100 (2015)","journal-title":"IEEE Commun. Lett."},{"key":"729_CR36","unstructured":"Grassl, M.: Bounds on the minimum distance of linear codes. Online available at http:\/\/www.codetables.de. Accessed 1 Mar 2024"},{"issue":"8","key":"729_CR37","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1007\/s10623-021-00898-0","volume":"89","author":"X Wang","year":"2021","unstructured":"Wang, X., Zheng, D., Zhang, Y.: Binary linear codes with few weights from boolean functions. Des. Codes Cryptogr. 89(8), 2009\u20132030 (2021)","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"729_CR38","first-page":"171","volume":"28","author":"RS Coulter","year":"1999","unstructured":"Coulter, R.S.: On the evaluation of a class of Weil sums in characteristic 2. New Zealand J. Math. 28(2), 171\u2013184 (1999)","journal-title":"New Zealand J. Math."},{"issue":"10","key":"729_CR39","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1007\/s10623-019-00628-7","volume":"87","author":"M Shi","year":"2019","unstructured":"Shi, M., Sol\u00e9, P.: Three-weight codes, triple sum sets, and strongly walk regular graphs. Des. Codes Cryptogr. 87(10), 2395\u20132404 (2019)","journal-title":"Des. Codes Cryptogr."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00729-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-024-00729-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00729-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T16:28:31Z","timestamp":1737476911000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-024-00729-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,31]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["729"],"URL":"https:\/\/doi.org\/10.1007\/s12095-024-00729-8","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,31]]},"assertion":[{"value":"14 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The results in this manuscript have not been published elsewhere, nor are they under consideration by another publisher. Written informed consent for publication was obtained from all participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}