{"id":"https://openalex.org/W2744819814","doi":"https://doi.org/10.1109/isit.2017.8006838","title":"Information set decoding with soft information and some cryptographic applications","display_name":"Information set decoding with soft information and some cryptographic applications","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2744819814","doi":"https://doi.org/10.1109/isit.2017.8006838","mag":"2744819814"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2017.8006838","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011896992","display_name":"Qian Guo","orcid":"https://orcid.org/0000-0003-0930-3174"},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Qian Guo","raw_affiliation_strings":["Department of Electrical and Information Technology, Lund University, Lund, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019956193","display_name":"Thomas Johansson","orcid":"https://orcid.org/0000-0003-1798-570X"},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Thomas Johansson","raw_affiliation_strings":["Department of Electrical and Information Technology, Lund University, Lund, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061311545","display_name":"Erik M\u00e5rtensson","orcid":"https://orcid.org/0000-0001-5824-7282"},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Erik Martensson","raw_affiliation_strings":["Department of Electrical and Information Technology, Lund University, Lund, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022656343","display_name":"Paul Stankovski","orcid":"https://orcid.org/0000-0002-2002-4240"},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Paul Stankovski","raw_affiliation_strings":["Department of Electrical and Information Technology, Lund University, Lund, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Technology, Lund University, Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011896992"],"corresponding_institution_ids":["https://openalex.org/I187531555"],"apc_list":null,"apc_paid":null,"fwci":0.2077,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.63942487,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1793","last_page":"1797"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.8327795267105103},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.7682862877845764},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7125895619392395},{"id":"https://openalex.org/keywords/sequential-decoding","display_name":"Sequential decoding","score":0.6017647385597229},{"id":"https://openalex.org/keywords/list-decoding","display_name":"List decoding","score":0.588819146156311},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5584654808044434},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5465240478515625},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5436039566993713},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5248201489448547},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4961622655391693},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.482757031917572},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.4465057849884033},{"id":"https://openalex.org/keywords/hamming-weight","display_name":"Hamming weight","score":0.44406795501708984},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.4173475503921509},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.4145643711090088},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.22064551711082458},{"id":"https://openalex.org/keywords/concatenated-error-correction-code","display_name":"Concatenated error correction code","score":0.21367746591567993},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09135130047798157}],"concepts":[{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.8327795267105103},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.7682862877845764},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7125895619392395},{"id":"https://openalex.org/C193969084","wikidata":"https://www.wikidata.org/wiki/Q7452500","display_name":"Sequential decoding","level":4,"score":0.6017647385597229},{"id":"https://openalex.org/C204397858","wikidata":"https://www.wikidata.org/wiki/Q4437907","display_name":"List decoding","level":5,"score":0.588819146156311},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5584654808044434},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5465240478515625},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5436039566993713},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5248201489448547},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4961622655391693},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.482757031917572},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.4465057849884033},{"id":"https://openalex.org/C63361517","wikidata":"https://www.wikidata.org/wiki/Q5645805","display_name":"Hamming weight","level":5,"score":0.44406795501708984},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.4173475503921509},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.4145643711090088},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.22064551711082458},{"id":"https://openalex.org/C78944582","wikidata":"https://www.wikidata.org/wiki/Q5158264","display_name":"Concatenated error correction code","level":4,"score":0.21367746591567993},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09135130047798157},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isit.2017.8006838","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:lup.lub.lu.se:b037b8ba-8282-4725-b2a5-10722080521d","is_oa":false,"landing_page_url":"https://lup.lub.lu.se/record/b037b8ba-8282-4725-b2a5-10722080521d","pdf_url":null,"source":{"id":"https://openalex.org/S4306400536","display_name":"Lund University Publications (Lund University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I187531555","host_organization_name":"Lund University","host_organization_lineage":["https://openalex.org/I187531555"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W72398006","https://openalex.org/W102155185","https://openalex.org/W566315627","https://openalex.org/W1510132879","https://openalex.org/W1536493828","https://openalex.org/W1565337244","https://openalex.org/W1897146492","https://openalex.org/W1965275036","https://openalex.org/W2023355697","https://openalex.org/W2099250555","https://openalex.org/W2100852839","https://openalex.org/W2103398070","https://openalex.org/W2104927845","https://openalex.org/W2137345636","https://openalex.org/W2144456414","https://openalex.org/W2155078778","https://openalex.org/W2156826724","https://openalex.org/W2166594487","https://openalex.org/W2199279747","https://openalex.org/W2401813776","https://openalex.org/W2408811573","https://openalex.org/W2484680112","https://openalex.org/W2557431413","https://openalex.org/W3104144002","https://openalex.org/W6632248230"],"related_works":["https://openalex.org/W2008960744","https://openalex.org/W1599365967","https://openalex.org/W4205451769","https://openalex.org/W2052976169","https://openalex.org/W3102491039","https://openalex.org/W2028976748","https://openalex.org/W3017203753","https://openalex.org/W2919070251","https://openalex.org/W3006333717","https://openalex.org/W2392521644"],"abstract_inverted_index":{"The":[0],"class":[1],"of":[2,12,32,60,74],"information":[3,68],"set":[4],"decoding":[5,13,47],"algorithms":[6,36],"is":[7,29],"the":[8,24,30,33,45],"best":[9],"known":[10],"way":[11],"general":[14],"codes,":[15],"i.e.":[16],"codes":[17],"that":[18,69],"admit":[19],"no":[20],"special":[21],"structure,":[22],"in":[23,37,77,93],"Hamming":[25],"metric.":[26],"Stern's":[27,61],"algorithm":[28,62,89],"origin":[31],"most":[34],"efficient":[35,101],"this":[38,41,87],"class.":[39],"In":[40],"paper":[42],"we":[43],"consider":[44],"same":[46],"problem":[48],"but":[49],"for":[50,63],"a":[51,58,64,94,99,104],"channel":[52,65],"with":[53,66],"soft":[54,67],"information.":[55],"We":[56,83],"give":[57],"version":[59],"includes":[70],"some":[71],"novel":[72],"steps":[73],"ordering":[75],"vectors":[76],"lists,":[78],"based":[79],"on":[80,103],"reliability":[81],"values.":[82],"then":[84],"demonstrate":[85],"how":[86],"new":[88],"can":[90],"be":[91],"used":[92],"few":[95],"cryptographic":[96],"applications,":[97],"including":[98],"very":[100],"attack":[102],"recently":[105],"proposed":[106],"McEliece-type":[107],"cryptosystem.":[108]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
