{"id":"https://openalex.org/W2017835905","doi":"https://doi.org/10.1109/iscisc.2014.6994031","title":"Reducing the key length of mceliece cryptosystem using polar codes","display_name":"Reducing the key length of mceliece cryptosystem using polar codes","publication_year":2014,"publication_date":"2014-09-01","ids":{"openalex":"https://openalex.org/W2017835905","doi":"https://doi.org/10.1109/iscisc.2014.6994031","mag":"2017835905"},"language":"en","primary_location":{"id":"doi:10.1109/iscisc.2014.6994031","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc.2014.6994031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 11th International ISC Conference on Information Security and Cryptology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000485743","display_name":"Rahmat\u2010Allah Hooshmand","orcid":"https://orcid.org/0000-0003-2567-2551"},"institutions":[{"id":"https://openalex.org/I4210094568","display_name":"Shahid Sattari University of Aeronautical Engineering","ror":"https://ror.org/00kp9ef37","country_code":"IR","type":"education","lineage":["https://openalex.org/I4210094568"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"R. Hooshmand","raw_affiliation_strings":["Department of Electrical Engineering, Shahid Sattari University of Aeronautical Science and Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Shahid Sattari University of Aeronautical Science and Technology, Tehran, Iran","institution_ids":["https://openalex.org/I4210094568"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032082083","display_name":"Masoumeh Koochak Shooshtari","orcid":"https://orcid.org/0000-0003-4879-8640"},"institutions":[{"id":"https://openalex.org/I80543232","display_name":"K.N.Toosi University of Technology","ror":"https://ror.org/0433abe34","country_code":"IR","type":"education","lineage":["https://openalex.org/I80543232"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"M. Koochak Shooshtari","raw_affiliation_strings":["Faculty-of Electrical and Computer Engineering, K.N. Toosi University of Technology, Tehran, Iran","Faculty of Electrical and Computer Engineering K.N. Toosi University of Technology  Tehran Iran"],"affiliations":[{"raw_affiliation_string":"Faculty-of Electrical and Computer Engineering, K.N. Toosi University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I80543232"]},{"raw_affiliation_string":"Faculty of Electrical and Computer Engineering K.N. Toosi University of Technology  Tehran Iran","institution_ids":["https://openalex.org/I80543232"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050771160","display_name":"Taraneh Eghlidos","orcid":"https://orcid.org/0000-0002-3182-0277"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"T. Eghlidos","raw_affiliation_strings":["Electronics Research Institute Sharif University of Technology, Tehran, Iran","Electronics Research Institute Sharif University of Technology Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Electronics Research Institute Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]},{"raw_affiliation_string":"Electronics Research Institute Sharif University of Technology Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028840314","display_name":"Mohammad Reza Aref","orcid":"https://orcid.org/0000-0002-4321-0345"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"M. R. Aref","raw_affiliation_strings":["Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran","Department of Electrical Engineering, Sharif university of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]},{"raw_affiliation_string":"Department of Electrical Engineering, Sharif university of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000485743"],"corresponding_institution_ids":["https://openalex.org/I4210094568"],"apc_list":null,"apc_paid":null,"fwci":2.045,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.89003164,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"104","last_page":"108"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.9706219434738159},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.72200608253479},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6038823127746582},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5942226648330688},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.5000824928283691},{"id":"https://openalex.org/keywords/polar","display_name":"Polar","score":0.4513210654258728},{"id":"https://openalex.org/keywords/public-key-cryptosystem","display_name":"Public key cryptosystem","score":0.4304730296134949},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.368619441986084},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.34787455201148987},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.326859712600708},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32294392585754395},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2956136465072632},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.27077823877334595},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2684086859226227},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1538260281085968},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.13710755109786987}],"concepts":[{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.9706219434738159},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.72200608253479},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6038823127746582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5942226648330688},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.5000824928283691},{"id":"https://openalex.org/C29705727","wikidata":"https://www.wikidata.org/wiki/Q294562","display_name":"Polar","level":2,"score":0.4513210654258728},{"id":"https://openalex.org/C2984195096","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public key cryptosystem","level":4,"score":0.4304730296134949},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.368619441986084},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34787455201148987},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.326859712600708},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32294392585754395},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2956136465072632},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27077823877334595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2684086859226227},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1538260281085968},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.13710755109786987},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscisc.2014.6994031","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc.2014.6994031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 11th International ISC Conference on Information Security and Cryptology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1520077026","https://openalex.org/W1536493828","https://openalex.org/W1579684562","https://openalex.org/W1594742286","https://openalex.org/W1607264302","https://openalex.org/W1963603265","https://openalex.org/W1985709119","https://openalex.org/W2020560159","https://openalex.org/W2022088153","https://openalex.org/W2026461145","https://openalex.org/W2035929826","https://openalex.org/W2061822288","https://openalex.org/W2113237846","https://openalex.org/W2130768170","https://openalex.org/W2150498905","https://openalex.org/W2156088730","https://openalex.org/W2803767422","https://openalex.org/W2986959318","https://openalex.org/W4297991408","https://openalex.org/W6634641745","https://openalex.org/W6635535319","https://openalex.org/W6636380913","https://openalex.org/W6683175945","https://openalex.org/W6770380337"],"related_works":["https://openalex.org/W2147522842","https://openalex.org/W2030550825","https://openalex.org/W2111322244","https://openalex.org/W2391645691","https://openalex.org/W4210628926","https://openalex.org/W2404459910","https://openalex.org/W3101367291","https://openalex.org/W3029906886","https://openalex.org/W2381485910","https://openalex.org/W2362834166"],"abstract_inverted_index":{"This":[0],"paper":[1],"introduces":[2],"a":[3],"public":[4,58,68,81],"key":[5,61,69,82],"scheme":[6,34,75],"based":[7,84],"on":[8,79,85],"polar":[9,24,50],"codes":[10],"to":[11,55],"improve":[12],"the":[13,20,28,32,39,45,57,65,73,80],"performance":[14],"of":[15,23,31,48],"McEliece":[16,67],"cryptosystem.":[17,70],"By":[18],"exploiting":[19],"interesting":[21],"properties":[22],"codes,":[25],"we":[26],"put":[27],"encryption":[29],"matrix":[30,41,47],"proposed":[33,74],"in":[35],"systematic":[36],"form.":[37],"Moreover,":[38,88],"nonsingular":[40],"is":[42],"constructed":[43],"from":[44,91],"generator":[46],"used":[49],"code.":[51],"These":[52],"proceedings":[53],"lead":[54],"decrease":[56],"and":[59,95],"private":[60],"lengths":[62],"compared":[63],"with":[64],"original":[66],"We":[71],"analyze":[72],"against":[76],"known":[77],"attacks":[78],"cryptosystems":[83],"channel":[86],"coding.":[87],"it":[89],"benefits":[90],"high":[92],"code":[93],"rate":[94],"proper":[96],"error":[97],"correction":[98],"capability":[99],"for":[100],"reliable":[101],"communication.":[102]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
