{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:03:45Z","timestamp":1762430625858},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,5,11]],"date-time":"2012-05-11T00:00:00Z","timestamp":1336694400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s10623-012-9689-z","type":"journal-article","created":{"date-parts":[[2012,5,10]],"date-time":"2012-05-10T03:43:27Z","timestamp":1336621407000},"page":"313-322","source":"Crossref","is-referenced-by-count":13,"title":["The exponent of a polarizing matrix constructed from the Kronecker product"],"prefix":"10.1007","volume":"70","author":[{"given":"Myung-Kyu","family":"Lee","sequence":"first","affiliation":[]},{"given":"Kyeongcheol","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,11]]},"reference":[{"issue":"7","key":"9689_CR1","doi-asserted-by":"crossref","first-page":"3051","DOI":"10.1109\/TIT.2009.2021379","volume":"55","author":"E. Ar\u0131kan","year":"2009","unstructured":"Ar\u0131kan E.: Channel polarization: a method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Transac. Inf. Theory. 55(7), 3051\u20133073 (2009)","journal-title":"IEEE Transac. Inf. Theory."},{"issue":"6","key":"9689_CR2","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/LCOMM.2008.080017","volume":"12","author":"E. Ar\u0131kan","year":"2008","unstructured":"Ar\u0131kan E.: A performance comparison of polar codes and Reed-Muller codes. IEEE Commun. Lett. 12(6), 447\u2013449 (2008)","journal-title":"IEEE Commun. Lett."},{"key":"9689_CR3","unstructured":"Ar\u0131kan E., Telatar E.: On the rate of channel polarization. In: Proceedings of IEEE International Symposium on Information Theory, 1493\u20131495. Seoul, South Korea, (2009)."},{"issue":"7","key":"9689_CR4","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/LCOMM.2009.090428","volume":"13","author":"R. Mori","year":"2009","unstructured":"Mori R., Tanaka T.: Performance of polar codes with the construction using density evolution. IEEE Commun. Lett. 13(7), 519\u2013521 (2009)","journal-title":"IEEE Commun. Lett."},{"issue":"12","key":"9689_CR5","doi-asserted-by":"crossref","first-page":"6253","DOI":"10.1109\/TIT.2010.2080990","volume":"56","author":"S.B. Korada","year":"2010","unstructured":"Korada S.B., \u015ea\u015fo\u011flu E., Urbanke R.: Polar codes: characterization of exponent, bounds, and constructions. IEEE Transac. Inf. Theory 56(12), 6253\u20136264 (2010)","journal-title":"IEEE Transac. Inf. Theory"},{"key":"9689_CR6","unstructured":"Korada S.B., \u015ea\u015fo\u011flu E.: A class of transformations that polarize binary-input memoryless channels. In: Proceedings of IEEE International Symposium on Information Theory, 1478\u20131482. Seoul, South Korea, (2009)."},{"key":"9689_CR7","volume-title":"Theory of Error-Correcting Codes","author":"F.J. MacWiliams","year":"1977","unstructured":"MacWiliams F.J., Sloane N.: Theory of Error-Correcting Codes. North-Holland Publishing Co., Amsterdam (1977)"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9689-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9689-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9689-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:33Z","timestamp":1559231913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9689-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,11]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["9689"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9689-z","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,11]]}}}