{"id":"https://openalex.org/W4315648088","doi":"https://doi.org/10.3390/cryptography7010002","title":"Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber","display_name":"Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber","publication_year":2023,"publication_date":"2023-01-10","ids":{"openalex":"https://openalex.org/W4315648088","doi":"https://doi.org/10.3390/cryptography7010002"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7010002","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7010002","pdf_url":"https://www.mdpi.com/2410-387X/7/1/2/pdf?version=1673337879","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/1/2/pdf?version=1673337879","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079057375","display_name":"Iason Papadopoulos","orcid":"https://orcid.org/0000-0002-2104-8586"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Iason Papadopoulos","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, Imperial College London, London SW7 2AZ, UK"],"raw_orcid":"https://orcid.org/0000-0002-2104-8586","affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, Imperial College London, London SW7 2AZ, UK","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085576473","display_name":"Jiabo Wang","orcid":"https://orcid.org/0000-0001-5492-4119"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Jiabo Wang","raw_affiliation_strings":["Strategic Center for Research in Privacy-Preserving Technologies & Systems, Nanyang Technological University, Singapore 639798, Singapore"],"raw_orcid":"https://orcid.org/0000-0001-5492-4119","affiliations":[{"raw_affiliation_string":"Strategic Center for Research in Privacy-Preserving Technologies & Systems, Nanyang Technological University, Singapore 639798, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5085576473"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.574,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.83175803,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"7","issue":"1","first_page":"2","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.7724101543426514},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6770018339157104},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.6229737401008606},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6134312748908997},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.5960341095924377},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5228360295295715},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.5021994113922119},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4894019663333893},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4338444471359253},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3600340783596039},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.35021889209747314},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22801700234413147},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.07637813687324524}],"concepts":[{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.7724101543426514},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6770018339157104},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.6229737401008606},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6134312748908997},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.5960341095924377},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5228360295295715},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.5021994113922119},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4894019663333893},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4338444471359253},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3600340783596039},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.35021889209747314},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22801700234413147},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.07637813687324524},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography7010002","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7010002","pdf_url":"https://www.mdpi.com/2410-387X/7/1/2/pdf?version=1673337879","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e5c98df476c24d1f89a5517ffc7d7910","is_oa":true,"landing_page_url":"https://doaj.org/article/e5c98df476c24d1f89a5517ffc7d7910","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 1, p 2 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7010002","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7010002","pdf_url":"https://www.mdpi.com/2410-387X/7/1/2/pdf?version=1673337879","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4315648088.pdf"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W1995875735","https://openalex.org/W2150498905","https://openalex.org/W2794874206","https://openalex.org/W2803767422","https://openalex.org/W2866028610","https://openalex.org/W2999759127","https://openalex.org/W3023478445","https://openalex.org/W3175209871","https://openalex.org/W3184070252","https://openalex.org/W3203459837","https://openalex.org/W3217272717","https://openalex.org/W4232836212","https://openalex.org/W6724049718"],"related_works":["https://openalex.org/W4220701436","https://openalex.org/W4288020428","https://openalex.org/W4281396976","https://openalex.org/W2041206904","https://openalex.org/W4292387542","https://openalex.org/W2989046916","https://openalex.org/W204679888","https://openalex.org/W4285214172","https://openalex.org/W2997740458","https://openalex.org/W2765753692"],"abstract_inverted_index":{"In":[0],"modern":[1],"society,":[2],"the":[3,8,74,134,183,209,215,221],"Internet":[4],"is":[5,18,57,82,139,143],"one":[6,128],"of":[7,12,20,66,76,78,108,174,185,205],"most":[9],"used":[10],"means":[11],"communication.":[13],"Thus,":[14],"secure":[15],"information":[16],"transfer":[17],"inevitably":[19],"major":[21],"importance.":[22],"Computers":[23],"nowadays":[24],"use":[25],"encryption":[26,91,119],"methods":[27],"based":[28,144],"on":[29,145],"arithmetic":[30],"operations":[31],"to":[32,44,71,89,130,155,162,171,178,196],"turn":[33],"messages":[34],"into":[35],"ciphertexts":[36],"that":[37,55,93,175],"are":[38,69],"practically":[39],"impossible":[40],"for":[41,133],"an":[42],"attacker":[43],"reverse-engineer":[45],"using":[46,98],"a":[47,60,99,102,115,202],"classical":[48,100],"computer.":[49,104],"Lately,":[50],"it":[51,81],"has":[52,113,126],"been":[53,122],"proven":[54],"this":[56],"possible":[58],"in":[59,160,176,182],"post-quantum":[61,135],"setting":[62],"where":[63],"quantum":[64,79,103],"computers":[65],"considerable":[67],"size":[68],"available":[70],"attackers.":[72],"With":[73],"advance":[75],"technology":[77],"computers,":[80],"now":[83],"more":[84],"necessary":[85],"than":[86],"ever":[87],"before":[88],"construct":[90],"schemes":[92,120],"cannot":[94],"be":[95,131,197],"broken":[96],"either":[97],"or":[101],"The":[105,124],"National":[106],"Institute":[107],"Technology":[109],"and":[110,117,142,170],"Standards":[111],"(NIST)":[112],"orchestrated":[114],"competition,":[116],"numerous":[118],"have":[121],"proposed.":[123],"NIST":[125],"identified":[127],"algorithm":[129,138],"standardized":[132],"era.":[136],"This":[137,151],"called":[140],"CRYSTALS-Kyber":[141],"module":[146],"learning":[147],"with":[148],"errors":[149],"(MLWE).":[150],"paper":[152],"investigates":[153],"how":[154],"apply":[156],"error":[157],"correcting":[158],"codes":[159],"order":[161,177],"create":[163],"some":[164],"excess":[165],"decryption":[166,210],"failure":[167,211],"rate":[168,212],"(DFR)":[169],"take":[172],"advantage":[173],"re-tune":[179],"Kyber\u2019s":[180,192],"parameters":[181],"pursuit":[184],"higher":[186],"security.":[187],"By":[188],"applying":[189],"Polar":[190],"Codes,":[191],"security":[193],"was":[194],"managed":[195],"increased":[198],"by":[199,220],"54.4%":[200],"under":[201],"new":[203],"set":[204,219],"parameters,":[206],"while":[207],"keeping":[208],"well":[213],"below":[214],"upper":[216],"acceptable":[217],"bound":[218],"NIST.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2023-01-12T00:00:00"}
