{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:53:25Z","timestamp":1771613605316,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015et\u0131rma Kurumu","award":["http:\/\/dx.doi.org\/10.13039\/501100004410"],"award-info":[{"award-number":["http:\/\/dx.doi.org\/10.13039\/501100004410"]}]},{"DOI":"10.13039\/501100005703","name":"Akdeniz University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005703","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comp. Appl. Math."],"published-print":{"date-parts":[[2025,10]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The construction of linear codes from functions in finite fields has been widely studied in the literature. There are two generic construction methods: the first and second generic construction methods for generating linear codes from functions over finite fields. In this paper, we first define the augmented code construction of the variation of the second generic construction method and then present new infinite families of four- and five-weight self-orthogonal divisible codes derived from trace functions. Moreover, by using the augmented code construction based on the first generic construction method, we construct new infinite families of three-weight and four-weight self-orthogonal divisible codes from weakly regular plateaued functions. We determine all parameters of the constructed self-orthogonal codes as well as their dual codes over the odd characteristic finite fields. We present Hamming weights and their weight distributions for the constructed self-orthogonal codes. Additionally, we utilise the constructed <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$ p $$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>p<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>-ary self-orthogonal codes to develop <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$ p $$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>p<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>-ary Linear Complementary Dual (LCD) codes and determine the parameters of the obtained LCD codes and their dual codes.<\/jats:p>","DOI":"10.1007\/s40314-025-03287-8","type":"journal-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T04:30:57Z","timestamp":1751257857000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Further designs for self-orthogonal and LCD codes developed from functions over finite fields"],"prefix":"10.1007","volume":"44","author":[{"given":"Sihem","family":"Mesnager","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1071-765X","authenticated-orcid":false,"given":"Ahmet","family":"S\u0131nak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"issue":"2","key":"3287_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1023\/A:1026421315292","volume":"15","author":"R Anderson","year":"1998","unstructured":"Anderson R, Ding C, Helleseth T, Klove T (1998) How to build robust shared control systems. Design Code Cryptogr. 15(2):111\u2013124","journal-title":"Design Code Cryptogr."},{"key":"3287_CR2","doi-asserted-by":"crossref","unstructured":"\u00c7akmak M, Sinak A, Yayla O (2024a) Constructions of self-orthogonal codes and lcd codes over finite fields. In: 2024 17th International Conference on Information Security and Cryptology (ISCT\u00fcrkiye), pp. 1\u20136. IEEE","DOI":"10.1109\/ISCTrkiye64784.2024.10779225"},{"key":"3287_CR3","unstructured":"\u00c7akmak M, S\u0131nak A, Yayla O (2024b) New self-orthogonal codes from weakly regular plateaued functions and their application in LCD codes. Cryptology ePrint Archive, Paper 2024\/125. https:\/\/eprint.iacr.org\/2024\/125"},{"issue":"1","key":"3287_CR4","doi-asserted-by":"publisher","first-page":"131","DOI":"10.3934\/amc.2016.10.131","volume":"10","author":"C Carlet","year":"2016","unstructured":"Carlet C, Guilley S (2016) Complementary dual codes for counter-measures to side-channel attacks. Adv. Math. Commun. 10(1):131\u2013150","journal-title":"Adv. Math. Commun."},{"issue":"6","key":"3287_CR5","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet C, Ding C, Yuan J (2005) Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE T Inform Theory 51(6):2089\u20132102","journal-title":"IEEE T Inform Theory"},{"key":"3287_CR6","doi-asserted-by":"crossref","unstructured":"Carlet C, Mesnager S, \u00d6zbudak F, S\u0131nak A (2017) Explicit characterizations for plateaued-ness of p-ary (vectorial) functions. In: Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10\u201312, 2017, Proceedings-In Honor of Claude Carlet 2, pp. 328\u2013345. Springer","DOI":"10.1007\/978-3-319-55589-8_22"},{"key":"3287_CR7","doi-asserted-by":"crossref","unstructured":"Chabanne H, Cohen G, Patey A (2013) Towards secure two-party computation from the wire-tap channel. In: International Conference on Information Security and Cryptology, pp. 34\u201346. Springer","DOI":"10.1007\/978-3-319-12160-4_3"},{"key":"3287_CR8","doi-asserted-by":"publisher","first-page":"2327","DOI":"10.1007\/s12190-024-02316-9","volume":"71","author":"W Chen","year":"2025","unstructured":"Chen W, Zhang J, Shi M (2025) A new family of p-ary self-orthogonal code from weakly regular plateaued functions. J. Appl. Math. Comput. 71:2327\u20132348","journal-title":"J. Appl. Math. Comput."},{"key":"3287_CR9","doi-asserted-by":"crossref","unstructured":"Cohen GD, Mesnager S, Patey A (2013) On minimal and quasi-minimal linear codes. In: Cryptography and Coding: 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings 14, pp. 85\u201398. Springer","DOI":"10.1007\/978-3-642-45239-0_6"},{"issue":"9","key":"3287_CR10","doi-asserted-by":"publisher","first-page":"2288","DOI":"10.1016\/j.disc.2016.03.029","volume":"339","author":"C Ding","year":"2016","unstructured":"Ding C (2016) A construction of binary linear codes from boolean functions. Discrete Math. 339(9):2288\u20132303","journal-title":"Discrete Math."},{"issue":"11","key":"3287_CR11","doi-asserted-by":"publisher","first-page":"5835","DOI":"10.1109\/TIT.2015.2473861","volume":"61","author":"K Ding","year":"2015","unstructured":"Ding K, Ding C (2015) A class of two-weight and three-weight codes and their applications in secret sharing. IEEE T Inform Theory 61(11):5835\u20135842","journal-title":"IEEE T Inform Theory"},{"issue":"1","key":"3287_CR12","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.tcs.2004.09.011","volume":"330","author":"C Ding","year":"2005","unstructured":"Ding C, Wang X (2005) A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330(1):81\u201399","journal-title":"Theor. Comput. Sci."},{"issue":"10","key":"3287_CR13","doi-asserted-by":"publisher","first-page":"6536","DOI":"10.1109\/TIT.2018.2819196","volume":"64","author":"C Ding","year":"2018","unstructured":"Ding C, Heng Z, Zhou Z (2018) Minimal binary linear codes. IEEE T Inform Theory 64(10):6536\u20136545","journal-title":"IEEE T Inform Theory"},{"issue":"12","key":"3287_CR14","doi-asserted-by":"publisher","first-page":"3953","DOI":"10.1007\/s10623-023-01287-5","volume":"91","author":"Z Heng","year":"2023","unstructured":"Heng Z, Li D, Liu F (2023) Ternary self-orthogonal codes from weakly regular bent functions and their application in lcd codes. Design Code Cryptogr. 91(12):3953\u20133976","journal-title":"Design Code Cryptogr."},{"issue":"11","key":"3287_CR15","doi-asserted-by":"publisher","first-page":"8320","DOI":"10.1109\/TIT.2024.3439408","volume":"70","author":"Z Heng","year":"2024","unstructured":"Heng Z, Li X, Wu Y, Wang Q (2024) Two families of linear codes with desirable properties from some functions over finite fields. IEEE T Inform Theory 70(11):8320\u20138342. https:\/\/doi.org\/10.1109\/TIT.2024.3439408","journal-title":"IEEE T Inform Theory"},{"issue":"10","key":"3287_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2025.114529","volume":"348","author":"Z Heng","year":"2025","unstructured":"Heng Z, Yang M, Ming Y (2025) A family of self-orthogonal divisible codes with locality 2. Discrete Math. 348(10):114529","journal-title":"Discrete Math."},{"key":"3287_CR17","doi-asserted-by":"crossref","unstructured":"Huffman WC, Pless V (2003) Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge","DOI":"10.1017\/CBO9780511807077"},{"key":"3287_CR18","unstructured":"Kurz S (2023) Divisible codes. arXiv preprint arXiv:2112.11763"},{"issue":"12","key":"3287_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2023.113626","volume":"346","author":"D Li","year":"2023","unstructured":"Li D, Heng Z, Li C (2023) Three families of self-orthogonal codes and their application in optimal quantum codes. Discrete Math. 346(12):113626","journal-title":"Discrete Math."},{"key":"3287_CR20","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl R, Niederreiter H (1997) Finite Fields, vol 20. Cambridge University Press, New York"},{"key":"3287_CR21","doi-asserted-by":"crossref","unstructured":"Li X, Heng Z (2024) Self-orthogonal codes from p-divisible codes. IEEE T Inform Theory","DOI":"10.1109\/TIT.2024.3449921"},{"key":"3287_CR22","unstructured":"Massey JL (1998) Orthogonal , antiorthogonal and self-orthogonal matrices and their codes. https:\/\/api.semanticscholar.org\/CorpusID:6889914"},{"issue":"3","key":"3287_CR23","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/S0019-9958(64)90438-3","volume":"7","author":"JL Massey","year":"1964","unstructured":"Massey JL (1964) Reversible codes. Information and Control 7(3):369\u2013380","journal-title":"Information and Control"},{"key":"3287_CR24","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/0012-365X(92)90563-U","volume":"106","author":"JL Massey","year":"1992","unstructured":"Massey JL (1992) Linear codes with complementary duals. Discrete Math. 106:337\u2013342","journal-title":"Discrete Math."},{"issue":"1","key":"3287_CR25","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s12095-016-0186-5","volume":"9","author":"S Mesnager","year":"2017","unstructured":"Mesnager S (2017) Linear codes with few weights from weakly regular bent functions based on a generic construction. Cryptogr Commun 9(1):71\u201384","journal-title":"Cryptogr Commun"},{"key":"3287_CR26","doi-asserted-by":"crossref","unstructured":"Mesnager S, S\u0131nak A (2020a) Several classes of minimal linear codes with few weights from weakly regular plateaued functions. IEEE T Inform Theory 66(4):2296\u20132310","DOI":"10.1109\/TIT.2019.2956130"},{"issue":"5","key":"3287_CR27","doi-asserted-by":"publisher","first-page":"2295","DOI":"10.3906\/mat-2104-5","volume":"45","author":"S Mesnager","year":"2021","unstructured":"Mesnager S, \u00d6zbudak F, Sinak A (2021) Secondary constructions of (non)-weakly regular plateaued functions over finite fields. Turk J Math. 45(5):2295\u20132306","journal-title":"Turk J Math."},{"key":"3287_CR28","doi-asserted-by":"crossref","unstructured":"Mesnager S, \u00d6zbudak F, Sinak A (2019) Linear codes from weakly regular plateaued functions and their secret sharing schemes. Design Code Cryptogr. 87 463\u2013480","DOI":"10.1007\/s10623-018-0556-4"},{"key":"3287_CR29","doi-asserted-by":"crossref","unstructured":"Mesnager S, S\u0131nak A (2020b) Infinite classes of six-weight linear codes derived from weakly regular plateaued functions. In: 2020 International Conference on Information Security and Cryptology (ISCTURKEY), pp. 93\u2013100. IEEE","DOI":"10.1109\/ISCTURKEY51113.2020.9308019"},{"issue":"3","key":"3287_CR30","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus OS (1976) On \u201cbent\u2019\u2019 functions. J Comp Theory A 20(3):300\u2013305","journal-title":"J Comp Theory A"},{"key":"3287_CR31","doi-asserted-by":"crossref","unstructured":"Schoenmakers B (1999) A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Annual International Cryptology Conference, pp. 148\u2013164. Springer","DOI":"10.1007\/3-540-48405-1_10"},{"issue":"1\u20133","key":"3287_CR32","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.disc.2004.05.005","volume":"285","author":"N Sendrier","year":"2004","unstructured":"Sendrier N (2004) Linear codes with complementary duals meet the gilbert-varshamov bound. Discrete Math. 285(1\u20133):345\u2013347","journal-title":"Discrete Math."},{"issue":"3","key":"3287_CR33","doi-asserted-by":"publisher","first-page":"953","DOI":"10.55730\/1300-0098.3135","volume":"46","author":"A Sinak","year":"2022","unstructured":"Sinak A (2022) Construction of minimal linear codes with few weights from weakly regular plateaued functions. Turk J Math 46(3):953\u2013972","journal-title":"Turk J Math"},{"issue":"3","key":"3287_CR34","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1109\/TIT.2016.2518678","volume":"62","author":"C Tang","year":"2016","unstructured":"Tang C, Li N, Qi Y, Zhou Z, Helleseth T (2016) Linear codes with two or three weights from weakly regular bent functions. IEEE T Inform Theory 62(3):1166\u20131176","journal-title":"IEEE T Inform Theory"},{"issue":"7","key":"3287_CR35","doi-asserted-by":"publisher","first-page":"4769","DOI":"10.1109\/TIT.2023.3332332","volume":"70","author":"X Wang","year":"2024","unstructured":"Wang X, Heng Z (2024) Several families of self-orthogonal codes and their applications in optimal quantum codes and lcd codes. IEEE T Inform Theory 70(7):4769\u20134791. https:\/\/doi.org\/10.1109\/TIT.2023.3332332","journal-title":"IEEE T Inform Theory"},{"issue":"1","key":"3287_CR36","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/BF01223730","volume":"36","author":"HN Ward","year":"1981","unstructured":"Ward HN (1981) Divisible codes. Archiv der Mathematik 36(1):485\u2013494","journal-title":"Archiv der Mathematik"},{"issue":"4","key":"3287_CR37","first-page":"263","volume":"27","author":"H Ward","year":"2001","unstructured":"Ward H (2001) Divisible codes-a survey. Serdica Mathematical Journal 27(4):263\u2013278","journal-title":"Divisible codes-a survey. Serdica Mathematical Journal"},{"issue":"1","key":"3287_CR38","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TIT.2005.860412","volume":"52","author":"J Yuan","year":"2006","unstructured":"Yuan J, Ding C (2006) Secret sharing schemes from three classes of linear codes. IEEE T Inform Theory 52(1):206\u2013212","journal-title":"IEEE T Inform Theory"},{"issue":"3","key":"3287_CR39","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1109\/18.915690","volume":"47","author":"Y Zheng","year":"2001","unstructured":"Zheng Y, Zhang X-M (2001) On plateaued functions. IEEE T Inform Theory 47(3):1215\u20131223","journal-title":"IEEE T Inform Theory"},{"key":"3287_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2023.102186","volume":"88","author":"C Zhu","year":"2023","unstructured":"Zhu C, Liao Q (2023) Two new classes of projective two-weight linear codes. Finite Fields Th App. 88:102186","journal-title":"Finite Fields Th App."}],"container-title":["Computational and Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-025-03287-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40314-025-03287-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-025-03287-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T05:04:46Z","timestamp":1757394286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40314-025-03287-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":40,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["3287"],"URL":"https:\/\/doi.org\/10.1007\/s40314-025-03287-8","relation":{},"ISSN":["2238-3603","1807-0302"],"issn-type":[{"value":"2238-3603","type":"print"},{"value":"1807-0302","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"3 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Materials availability"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}],"article-number":"341"}}