{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:12:16Z","timestamp":1774962736193,"version":"3.50.1"},"reference-count":21,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2018]]},"DOI":"10.3934\/amc.2018034","type":"journal-article","created":{"date-parts":[[2018,8,4]],"date-time":"2018-08-04T04:32:34Z","timestamp":1533357154000},"page":"579-594","source":"Crossref","is-referenced-by-count":42,"title":["Parameters of LCD BCH codes with two lengths"],"prefix":"10.3934","volume":"12","author":[{"given":"Haode","family":"Yan","sequence":"first","affiliation":[]},{"given":"Hao","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China"}]},{"given":"Chengju","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai 200062, China"}]},{"given":"Shudi","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Qufu Normal University, Shandong 273165, China"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2018034-1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.890730"},{"key":"key-10.3934\/amc.2018034-2","unstructured":"K. Boonniyoma and S. Jitman, Complementary dual subfield linear codes over finite fields, preprint, arXiv: 1605.06827."},{"key":"key-10.3934\/amc.2018034-3","doi-asserted-by":"crossref","unstructured":"C. Carlet and S. Guilley, Complementary dual codes for counter-measures to side-channel attacks, in <i>Coding Theory and Applications<\/i> (eds. R. Pinto, P. R. Malonek and P. Vettori), CIM Series in Mathematical Sciences, Springer Verlag, <b>3<\/b> (2014), 97-105.","DOI":"10.1007\/978-3-319-17296-5_9"},{"key":"key-10.3934\/amc.2018034-4","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0463-8"},{"key":"key-10.3934\/amc.2018034-5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2789347"},{"key":"key-10.3934\/amc.2018034-6","unstructured":"P. Charpin, Open problems on cyclic codes, in <i>Handbook of Coding Theory<\/i> (eds. V. S. Pless and W. C. Huffman), Amsterdam, The Netherlands: Elsevier, <b>1<\/b> (1998), 963-1063."},{"key":"key-10.3934\/amc.2018034-7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2748955"},{"key":"key-10.3934\/amc.2018034-8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2470251"},{"key":"key-10.3934\/amc.2018034-9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2409838"},{"key":"key-10.3934\/amc.2018034-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2016.12.009"},{"key":"key-10.3934\/amc.2018034-11"},{"key":"key-10.3934\/amc.2018034-12","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0447-0"},{"key":"key-10.3934\/amc.2018034-13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2672961"},{"key":"key-10.3934\/amc.2018034-14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2743687"},{"key":"key-10.3934\/amc.2018034-15"},{"key":"key-10.3934\/amc.2018034-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2017.04.001"},{"key":"key-10.3934\/amc.2018034-17","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(62)90298-X"},{"key":"key-10.3934\/amc.2018034-18","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(64)90438-3"},{"key":"key-10.3934\/amc.2018034-19","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(94)90283-6"},{"key":"key-10.3934\/amc.2018034-20"},{"key":"key-10.3934\/amc.2018034-21","unstructured":"S. Zhu, B. Pang and Z. Sun, The reversible negacyclic codes over finite fields, preprint, arXiv: 1610.08206."}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/aimsciences.org\/download\/files\/1930-5346_2018_3_579.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T09:59:24Z","timestamp":1772791164000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2018034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.3934\/amc.2018034","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}