{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:38:09Z","timestamp":1760747889691,"version":"build-2065373602"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12095-025-00813-7","type":"journal-article","created":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T16:03:57Z","timestamp":1757088237000},"page":"1627-1639","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The weight distributions of three new classes of binary linear codes"],"prefix":"10.1007","volume":"17","author":[{"given":"Yang","family":"Yong","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,5]]},"reference":[{"key":"813_CR1","doi-asserted-by":"crossref","unstructured":"Assmus, E., Mattson, H.: Some 3-error-correcting BCH codes have covering radius 5. IEEE Trans. Inform. Theory. IT-22, 348\u2013349 (1976)","DOI":"10.1109\/TIT.1976.1055556"},{"key":"813_CR2","doi-asserted-by":"crossref","unstructured":"Assmus, E., Mattson, H.: The weight-distribution of a coset of a linear code. IEEE Trans. Inform. Theory. IT-24, 497\u2013497 (1978)","DOI":"10.1109\/TIT.1978.1055903"},{"key":"813_CR3","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S0019-9958(60)90287-4","volume":"3","author":"RC Bose","year":"1960","unstructured":"Bose, R.C., Ray-Chaudhuri, D.K.: On a class of error correcting binary group codes. Inform. and Control 3, 68\u201379 (1960)","journal-title":"Inform. and Control"},{"key":"813_CR4","unstructured":"Berlekamp, E.R.: Algebraic Coding Theory. McGraw-Hill, New York (1968)"},{"key":"813_CR5","unstructured":"Berlekamp, E.R.: Weight enumeration theorems, in Proc, pp. 161\u2013170. Sixth Allerton Conf. Circuit and Systems Theory, Urbana, IL (1968)"},{"key":"813_CR6","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/S0019-9958(70)90399-2","volume":"17","author":"ER Berlekamp","year":"1970","unstructured":"Berlekamp, E.R.: The weight enumerators for certain subcodes of the second order binary Reed-Muller codes. Inf. Contr. 17, 485\u2013500 (1970)","journal-title":"Inf. Contr."},{"issue":"5","key":"813_CR7","doi-asserted-by":"publisher","first-page":"1425","DOI":"10.1109\/18.333859","volume":"40","author":"P Charpin","year":"1994","unstructured":"Charpin, P.: Weight distributions of cosets of two-error-correcting binary BCH codes, extended or not. IEEE Trans. Inf. Theory 40(5), 1425\u20131442 (1994)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"813_CR8","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1137\/S089548019529443X","volume":"10","author":"P Charpin","year":"1997","unstructured":"Charpin, P., Zinoviev, V.: On coset weight distributions of the 3-error-correcting BCH-codes. SIAM J. Discr. Math. 10, 128\u2013145 (1997)","journal-title":"SIAM J. Discr. Math."},{"key":"813_CR9","doi-asserted-by":"crossref","unstructured":"Charpin, P., Helleseth, T., Zinoviev, V.A.: The coset distribution of triple-error-correcting binary primitive BCH codes. IEEE Trans. Inform. Theory. IT-52, 1727\u20131732 (2006)","DOI":"10.1109\/TIT.2006.871605"},{"key":"813_CR10","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1137\/0109020","volume":"9","author":"D Gorenstein","year":"1961","unstructured":"Gorenstein, D., Zierler, N.: A class of error-correcting codes in $$p^m$$ symbols. J. Soc. Indust. Appl. Math. 9, 207\u2013214 (1961)","journal-title":"J. Soc. Indust. Appl. Math."},{"key":"813_CR11","first-page":"147","volume":"2","author":"A Hocquenghem","year":"1959","unstructured":"Hocquenghem, A.: Codes correcteurs d\u2019erreurs. Chiffres (Paris) 2, 147\u2013156 (1959)","journal-title":"Codes correcteurs d\u2019erreurs. Chiffres (Paris)"},{"key":"813_CR12","doi-asserted-by":"crossref","unstructured":"Helleseth, T.: All binary 3-error-correcting BCH codes of length $$2^m-1$$ have covering radius 5. IEEE Trans. Inform. Theory. IT-24, 257\u2013258 (1978)","DOI":"10.1109\/TIT.1978.1055847"},{"key":"813_CR13","doi-asserted-by":"crossref","unstructured":"Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes. (2003)","DOI":"10.1017\/CBO9780511807077"},{"key":"813_CR14","unstructured":"Kasami, T.: Weight distributions of Bose-Chaudhuri-Hocquenghen codes. In: Bose, R.C., Dowling, T.A. (eds.) Combinatorial Mathematics and its Applications. Univ. of North Carolina Press, Chapel Hill, NC (1969)"},{"key":"813_CR15","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, I and II) (1977)"},{"key":"813_CR16","doi-asserted-by":"publisher","unstructured":"Wu, R., Hong, S.: On deep holes of standard Reed-Solomon codes. Sci. China Math. 55, 2447\u20132455 (2012). https:\/\/doi.org\/10.1007\/s11425-012-4499-3","DOI":"10.1007\/s11425-012-4499-3"},{"key":"813_CR17","doi-asserted-by":"publisher","unstructured":"Zhang, J., Fu, F., Liao, Q.: Deep holes of generalized Reed-Solomon codes (in Chinese). Sci. Sin. Math. 43, 727\u2013740 (2013). https:\/\/doi.org\/10.1360\/012012-30","DOI":"10.1360\/012012-30"},{"key":"813_CR18","doi-asserted-by":"publisher","unstructured":"Zhang, J., Wan, D., Kaipa, K.: Deep Holes of Projective Reed- Solomon Codes. IEEE Trans. Inform. Theory 66(4), 2392\u20132401 (2019). https:\/\/doi.org\/10.1109\/TIT.2019.2940962","DOI":"10.1109\/TIT.2019.2940962"},{"key":"813_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wan, D.: On Deep Holes of Elliptic Curve Codes. IEEE Trans. Inform, Theory (2023)","DOI":"10.1109\/TIT.2023.3257320"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-025-00813-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-025-00813-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-025-00813-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:02:39Z","timestamp":1760738559000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-025-00813-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":19,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["813"],"URL":"https:\/\/doi.org\/10.1007\/s12095-025-00813-7","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"28 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}