{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T02:10:08Z","timestamp":1750990208158,"version":"3.41.0"},"reference-count":27,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.3934\/amc.2025016","type":"journal-article","created":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T09:41:27Z","timestamp":1746610887000},"page":"1685-1693","source":"Crossref","is-referenced-by-count":0,"title":["Construction of large-dimensional hulls of BCH codes with length &lt;inline-formula&gt;&lt;tex-math id=\"M1\"&gt;$ n = \\frac{q^4-1}{q+1} $&lt;\/tex-math&gt;&lt;\/inline-formula&gt;"],"prefix":"10.3934","volume":"19","author":[{"given":"Ming","family":"Yan","sequence":"first","affiliation":[]},{"given":"Tongjiang","family":"Yan","sequence":"additional","affiliation":[{"name":"China University of Petroleum (East China), China"}]},{"given":"Yuhua","family":"Sun","sequence":"additional","affiliation":[{"name":"China University of Petroleum (East China), China"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2025016-1","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(90)90003-Z"},{"key":"key-10.3934\/amc.2025016-2","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-023-01281-x"},{"key":"key-10.3934\/amc.2025016-3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2991635"},{"key":"key-10.3934\/amc.2025016-4","doi-asserted-by":"crossref","unstructured":"<p>C. Carlet, A. Daif, J. L. Danger, S. Guilley, Z. Najm, X. Ngo, T. Porteboeuf and C. Tavernier, Optimized linear complementary codes implementation for hardware trojan prevention, <i>ECCTD.<\/i>, (2015), 1-4.<\/p>","DOI":"10.1109\/ECCTD.2015.7300075"},{"key":"key-10.3934\/amc.2025016-5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17296-5_9"},{"key":"key-10.3934\/amc.2025016-6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056498"},{"key":"key-10.3934\/amc.2025016-7","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(08)80103-4"},{"key":"key-10.3934\/amc.2025016-8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0463-8"},{"key":"key-10.3934\/amc.2025016-9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2672961"},{"key":"key-10.3934\/amc.2025016-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2017.10.001"},{"key":"key-10.3934\/amc.2025016-11","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-023-01232-6"},{"key":"key-10.3934\/amc.2025016-12","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0330-z"},{"key":"key-10.3934\/amc.2025016-13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2450235"},{"key":"key-10.3934\/amc.2025016-14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2388576"},{"key":"key-10.3934\/amc.2025016-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2018.06.012"},{"key":"key-10.3934\/amc.2025016-16","doi-asserted-by":"publisher","DOI":"10.26421\/QIC13.1-2-3"},{"key":"key-10.3934\/amc.2025016-17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2470251"},{"key":"key-10.3934\/amc.2025016-18","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0653(04)00174-X"},{"key":"key-10.3934\/amc.2025016-19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3076878"},{"key":"key-10.3934\/amc.2025016-20","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-021-00965-6"},{"key":"key-10.3934\/amc.2025016-21","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3043448"},{"key":"key-10.3934\/amc.2025016-22","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(02)00451-1"},{"key":"key-10.3934\/amc.2025016-23","unstructured":"<p>F. MacWilliams and N. Sloane, <i>The Theory of Error-Correcting Codes<\/i>, North-Holland Math. Library, Vol. 16. North-Holland Publishing Co., Amsterdam-New York-Oxford, 1977.<\/p>"},{"key":"key-10.3934\/amc.2025016-24","doi-asserted-by":"publisher","DOI":"10.1126\/science.1131563"},{"key":"key-10.3934\/amc.2025016-25"},{"key":"key-10.3934\/amc.2025016-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2014.12.008"},{"key":"key-10.3934\/amc.2025016-27","doi-asserted-by":"crossref","unstructured":"<p>G. Luo, M. Ezerman, M. Grassl and S. Ling, Constructing quantum error-correcting codes that require a variable amount of entanglement, <i>Quant. Inf. Comput.<\/i>, <b>23<\/b> (2023), Paper No. 4, 28 pp.<\/p>","DOI":"10.1007\/s11128-023-04211-x"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T01:35:30Z","timestamp":1750988130000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2025016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":27,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2025016","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"type":"print","value":"1930-5346"},{"type":"electronic","value":"1930-5338"}],"subject":[],"published":{"date-parts":[[2025]]}}}