{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T21:51:42Z","timestamp":1774302702033,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,9]],"date-time":"2023-12-09T00:00:00Z","timestamp":1702080000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,9]],"date-time":"2023-12-09T00:00:00Z","timestamp":1702080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Shandong Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["No. ZR2022MA024"],"award-info":[{"award-number":["No. ZR2022MA024"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12071264"],"award-info":[{"award-number":["12071264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11701336"],"award-info":[{"award-number":["11701336"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"IC Program of Shandong Institutions of Higher Learning For Youth Innovative Talents"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comp. Appl. Math."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s40314-023-02527-z","type":"journal-article","created":{"date-parts":[[2023,12,9]],"date-time":"2023-12-09T13:02:01Z","timestamp":1702126921000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Linear codes from defining sets over $${\\mathbb {F}}_{p} +u{\\mathbb {F}}_{p}$$ and their applications"],"prefix":"10.1007","volume":"43","author":[{"given":"Xiangdi","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Yaozong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,9]]},"reference":[{"key":"2527_CR1","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.1109\/18.705584","volume":"44","author":"A Ashikhmin","year":"1998","unstructured":"Ashikhmin A, Barg A (1998) Minimal vectors in linear codes. IEEE Trans Inf Theory 44:2010\u20132017","journal-title":"IEEE Trans Inf Theory"},{"key":"2527_CR2","doi-asserted-by":"publisher","first-page":"4152","DOI":"10.1109\/TIT.2019.2891992","volume":"65","author":"D Bartoli","year":"2019","unstructured":"Bartoli D, Bonini M (2019) Minimal linear codes in odd characteristic. IEEE Trans Inf Theory 65:4152\u20134155","journal-title":"IEEE Trans Inf Theory"},{"key":"2527_CR3","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma W, Cannon J, Playoust C (1997) The MAGMA algebra system I: the user language. J Symb Comput 24:235\u2013256","journal-title":"J Symb Comput"},{"key":"2527_CR4","doi-asserted-by":"crossref","unstructured":"Chabanne H, Cohen G, Patey A (2014) Towards secure two-party computation from the wiretap channel. In: Lee H-S, Han D-G (eds) Proceedings of ICISC 2013. Lecture Notes in Computer Science, vol 8565. Springer, Berlin, pp 34\u201346","DOI":"10.1007\/978-3-319-12160-4_3"},{"key":"2527_CR5","first-page":"8308","volume-title":"Cryptography and coding. IMACC 2013. Lecture notes in computer science","author":"GD Cohen","year":"2013","unstructured":"Cohen GD, Mesnager S, Patey A (2013) On minimal and quasi-minimal linear codes. In: Stam M (ed) Cryptography and coding. IMACC 2013. Lecture notes in computer science. Springer, Berlin, p 8308"},{"key":"2527_CR6","volume-title":"Codes from difference sets","author":"C Ding","year":"2015","unstructured":"Ding C (2015) Codes from difference sets. World Scientific, Singapore"},{"key":"2527_CR7","doi-asserted-by":"publisher","DOI":"10.1142\/11101","volume-title":"Designs from linear codes","author":"C Ding","year":"2018","unstructured":"Ding C (2018) Designs from linear codes. World Scientific, Singapore"},{"issue":"11","key":"2527_CR8","doi-asserted-by":"publisher","first-page":"5835","DOI":"10.1109\/TIT.2015.2473861","volume":"61","author":"K Ding","year":"2015","unstructured":"Ding K, Ding C (2015) A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans Inf Theory 61(11):5835\u20135842","journal-title":"IEEE Trans Inf Theory"},{"key":"2527_CR9","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ffa.2018.08.010","volume":"54","author":"C Ding","year":"2018","unstructured":"Ding C, Heng Z, Zhou Z (2018) Minimal linear codes over finite fields. Finite Fields Appl. 54:176\u2013196","journal-title":"Finite Fields Appl."},{"key":"2527_CR10","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.1007\/s10623-021-00914-3","volume":"90","author":"J Gao","year":"2022","unstructured":"Gao J, Meng X, Fu F-W (2022a) Weight distribution of double cyclic codes over Galois rings. Des Codes Cryptogr 90:2529\u20132549","journal-title":"Des Codes Cryptogr"},{"issue":"12","key":"2527_CR11","first-page":"4312","volume":"44","author":"J Gao","year":"2022","unstructured":"Gao J, Zhang Y, Meng X, Ma F (2022b) Weight distributions of some classes of irreducible quasi-cyclic codes of index 2. J Electron Inf Technol 44(12):4312\u20134318","journal-title":"J Electron Inf Technol"},{"key":"2527_CR12","doi-asserted-by":"publisher","first-page":"102181","DOI":"10.1016\/j.ffa.2023.102181","volume":"88","author":"J Gao","year":"2023","unstructured":"Gao J, Meng X, Fu F-W (2023) Weight distributions of generalized quasi-cyclic codes over $${\\mathbb{F} }_q+u{\\mathbb{F} }_q$$. Finite Fields Appl 88:102181","journal-title":"Finite Fields Appl"},{"key":"2527_CR13","doi-asserted-by":"publisher","first-page":"2018","DOI":"10.1109\/TIT.2006.872854","volume":"52","author":"T Helleseth","year":"2006","unstructured":"Helleseth T, Kholosha A (2006) Monomial and quadratic bent functions over the finite fields of odd characteristic. IEEE Trans Inf Theory 52:2018\u20132032","journal-title":"IEEE Trans Inf Theory"},{"key":"2527_CR14","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.ffa.2017.07.006","volume":"48","author":"Z Heng","year":"2017","unstructured":"Heng Z, Yue Q (2017) A construction of q-ary linear codes with two weights. Finite Fields Appl 48:20\u201342","journal-title":"Finite Fields Appl"},{"issue":"11","key":"2527_CR15","doi-asserted-by":"publisher","first-page":"3166","DOI":"10.1016\/j.disc.2019.06.025","volume":"342","author":"X Kong","year":"2019","unstructured":"Kong X, Yang S (2019) Complete weight enumerators of a class of linear codes with two or three weights. Discrete Math 342(11):3166\u20133176","journal-title":"Discrete Math"},{"key":"2527_CR16","volume-title":"Finite fields","author":"R Lidl","year":"1997","unstructured":"Lidl R, Niederreiter H, Cohn FM (1997) Finite fields. Cambridge University Press, Cambridge"},{"key":"2527_CR17","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10623-018-0478-1","volume":"87","author":"H Liu","year":"2019","unstructured":"Liu H, Liao Q (2019) Several classes of linear codes with a few weights from defining sets over $${\\mathbb{F} }_p+u{\\mathbb{F} }_p$$. Des Codes Cryptogr 87:15\u201329","journal-title":"Des Codes Cryptogr"},{"key":"2527_CR18","unstructured":"Liu H, Liao Q, Zhu C (2021) Two constructions for Minimal ternary linear codes. arXiv:2107.04992"},{"key":"2527_CR19","unstructured":"Massey JL (1993) Minimal codewords and secret sharing. Proceedings of the 6th Joint Swedish-Russion Workshop on Information Theory, M\u00f6lle Swden, pp. 276\u2013279"},{"key":"2527_CR20","doi-asserted-by":"publisher","first-page":"569","DOI":"10.3934\/amc.2020124","volume":"16","author":"X Meng","year":"2022","unstructured":"Meng X, Gao J (2022) Complete weight enumerators of torsion codes. Adv Math Commun 16:569\u2013571","journal-title":"Adv Math Commun"},{"key":"2527_CR21","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s10623-022-01128-x","volume":"91","author":"X Meng","year":"2023","unstructured":"Meng X, Gao J, Fu F-W, Ma F (2023) Weight distributions of Q2DC codes over finite fields. Des Codes Cryptogr 91:807\u2013830","journal-title":"Des Codes Cryptogr"},{"key":"2527_CR22","doi-asserted-by":"crossref","first-page":"6240","DOI":"10.1109\/TIT.2017.2715804","volume":"63","author":"S Mesnager","year":"2017","unstructured":"Mesnager S, Qi Y, Ru H, Tang C (2017) Minimal linear codes from characteristic functions. IEEE Trans Inf Theory 63:6240\u20136246","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"2527_CR23","first-page":"247","volume":"12","author":"M Shi","year":"2013","unstructured":"Shi M, Sol\u00e9 P, Wu B (2013) Cyclic codes and weight enumerators of linear codes over $${\\mathbb{F} }_2+v{\\mathbb{F} }_2 +v^2{\\mathbb{F} }_2$$. Appl Comput Math 12(2):247\u2013255","journal-title":"Appl Comput Math"},{"issue":"10","key":"2527_CR24","doi-asserted-by":"publisher","first-page":"6240","DOI":"10.1109\/TIT.2017.2742499","volume":"63","author":"M Shi","year":"2017","unstructured":"Shi M, Guan Y, Sol\u00e9 P (2017a) Two new families of two-weight codes. IEEE Trans Inf Theory 63(10):6240\u20136246","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"2527_CR25","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/TIT.2016.2628408","volume":"63","author":"M Shi","year":"2017","unstructured":"Shi M, Xu L, Yang G (2017b) A note on one weight and two weight projective $${\\mathbb{Z} }_4$$-codes. IEEE Trans Inf Theory 63(1):177\u2013182","journal-title":"IEEE Trans Inf Theory"},{"key":"2527_CR26","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s40314-019-0937-y","volume":"38","author":"Y Wang","year":"2019","unstructured":"Wang Y, Gao J (2019) MacDonald codes over the ring $${\\mathbb{F} }_p+v{\\mathbb{F} }_p+v^2{\\mathbb{F} }_p$$. Comput Appl Math 38:169","journal-title":"Comput Appl Math"},{"key":"2527_CR27","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.disc.2016.09.003","volume":"340","author":"Q Wang","year":"2017","unstructured":"Wang Q, Li F, Ding K, Lin D (2017) Complete weight enumerators of two classes of linear codes. Discrete Math 340:467\u2013480","journal-title":"Discrete Math"},{"issue":"11","key":"2527_CR28","doi-asserted-by":"publisher","first-page":"7067","DOI":"10.1109\/TIT.2019.2918537","volume":"65","author":"G Xu","year":"2019","unstructured":"Xu G, Qu L (2019) Three classes of minimal linear codes over the finite fields of odd characteristic. IEEE Trans Inf Theory 65(11):7067\u20137078","journal-title":"IEEE Trans Inf Theory"},{"key":"2527_CR29","doi-asserted-by":"publisher","first-page":"101688","DOI":"10.1016\/j.ffa.2020.101688","volume":"65","author":"G Xu","year":"2020","unstructured":"Xu G, Qu L, Cao X (2020) Minimal linear codes from Maiorana\u2013McFarland functions. Finite Fields Appl 65:101688","journal-title":"Finite Fields Appl"},{"key":"2527_CR30","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s12095-021-00519-6","volume":"14","author":"G Xu","year":"2022","unstructured":"Xu G, Qu L, Luo G (2022) Minimal linear codes from weakly regular bent functions. Cryptogr Commun 14:415\u2013431","journal-title":"Cryptogr Commun"},{"key":"2527_CR31","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s10623-016-0191-x","volume":"82","author":"S Yang","year":"2017","unstructured":"Yang S, Yao Z (2017) Complete weight enumerators of a family of three-weight linear codes. Des Codes Cryptogr 82:663\u2013674","journal-title":"Des Codes Cryptogr"},{"key":"2527_CR32","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TIT.2005.860412","volume":"52","author":"J Yuan","year":"2006","unstructured":"Yuan J, Ding C (2006) Secret sharing schemes from three classes of linear codes. IEEE Trans Inf Theory 52:206\u2013212","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Computational and Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-023-02527-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40314-023-02527-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-023-02527-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T13:29:58Z","timestamp":1707398998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40314-023-02527-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,9]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["2527"],"URL":"https:\/\/doi.org\/10.1007\/s40314-023-02527-z","relation":{},"ISSN":["2238-3603","1807-0302"],"issn-type":[{"value":"2238-3603","type":"print"},{"value":"1807-0302","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,9]]},"assertion":[{"value":"7 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All the authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"13"}}