{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:26:18Z","timestamp":1766298378128,"version":"3.28.0"},"reference-count":55,"publisher":"Institution of Engineering and Technology (IET)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Commun."],"published-print":{"date-parts":[[2009,2,9]]},"DOI":"10.1049\/iet-com:20080050","type":"journal-article","created":{"date-parts":[[2009,2,4]],"date-time":"2009-02-04T23:31:53Z","timestamp":1233790313000},"page":"279-292","source":"Crossref","is-referenced-by-count":30,"title":["Efficient secure channel coding based on quasi-cyclic low-density parity-check codes"],"prefix":"10.1049","volume":"3","author":[{"given":"A.A.","family":"Sobhi Afshar","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran"}]},{"given":"T.","family":"Eghlidos","sequence":"additional","affiliation":[{"name":"Electronics Research Center, Sharif University of Technology, Tehran, Iran"}]},{"given":"M.R.","family":"Aref","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran"}]}],"member":"265","reference":[{"key":"10.1049\/iet-com:20080050_r1","unstructured":"\u2018A public-key cryptosystem based on algebraic coding theory\u2019, DSN Progress Report, 1978 p. 114\u2013116 42-44"},{"key":"10.1049\/iet-com:20080050_r2","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"Berlekamp","year":"1978","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r3","first-page":"119","author":"Preneel","year":"1992","journal-title":"Proc. 13th Symp. Information Theory in the Benelux"},{"key":"10.1049\/iet-com:20080050_r4","doi-asserted-by":"crossref","unstructured":"Kabatiansky, G., Krouk, E., and Semenov, S.: \u2018Error correcting coding and security for data networks\u2019, (John Wiley Sons Ltd. 2005)","DOI":"10.1002\/0470867574"},{"key":"10.1049\/iet-com:20080050_r5","first-page":"270","author":"Goldwasser","year":"1982","journal-title":"Proc. 14th ACM Symp. Theory of Computing"},{"key":"10.1049\/iet-com:20080050_r6","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.1049\/el:19890979","volume":"25","author":"Park","year":"1989","ISSN":"http:\/\/id.crossref.org\/issn\/0013-5194","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r7","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1049\/el:19900011","volume":"26","author":"Lin","year":"1990","ISSN":"http:\/\/id.crossref.org\/issn\/0013-5194","issn-type":"print"},{"journal-title":"Proc. CLC2006, Technische Universitat Darmstadt","year":"2006","author":"Gaborit","key":"10.1049\/iet-com:20080050_r8"},{"key":"10.1049\/iet-com:20080050_r9","doi-asserted-by":"crossref","first-page":"2591","DOI":"10.1109\/ISIT.2007.4557609","author":"Baldi","year":"2007","journal-title":"Proc. IEEE Int. Symp. Information Theory 2007"},{"key":"10.1049\/iet-com:20080050_r10","unstructured":"\u2018A security evaluation of the public-key cipher system proposed by McEliece, used as a combined scheme\u2019, Technical Report, 1986"},{"journal-title":"Proc. 11th annual Int. symposium on Computer architecture'","first-page":"240","author":"Rao","key":"10.1049\/iet-com:20080050_r11"},{"key":"10.1049\/iet-com:20080050_r12","first-page":"35","author":"Rao","year":"1986","journal-title":"Proc. Crypto'86"},{"key":"10.1049\/iet-com:20080050_r13","unstructured":"Hin, P.J.M.: \u2018Channel-error-correcting privacy cryptosystems\u2019, 1986, PhD, Delft University of Technology dissertation (in Dutch)"},{"key":"10.1049\/iet-com:20080050_r14","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1109\/18.32159","volume":"35","author":"Rao","year":"1987","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r15","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/3-540-48184-2_40","author":"Struik","year":"1988","journal-title":"Advances in Cryptology, Crypto'87"},{"key":"10.1049\/iet-com:20080050_r16","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/5.4443","volume":"76","author":"Brickell","year":"1988","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9219","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r17","unstructured":"Denny, W.F.: \u2018Encryptions using linear and non-linear codes: implementation and security considerations\u2019, 1988, PhD, The Center for Advanced Computer Studies, University of Southwestern Louisiana, Lafayette dissertation"},{"first-page":"174","year":"1991","author":"Struik","key":"10.1049\/iet-com:20080050_r18"},{"key":"10.1049\/iet-com:20080050_r19","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/ISIT.1993.748541","author":"Alencar","year":"1993","journal-title":"Proc. IEEE Int. Symp. Information Theory"},{"key":"10.1049\/iet-com:20080050_r20","doi-asserted-by":"crossref","first-page":"1394","DOI":"10.1049\/el:19940980","volume":"30","author":"Campello de Souza","year":"1994","ISSN":"http:\/\/id.crossref.org\/issn\/0013-5194","issn-type":"print"},{"first-page":"153","year":"1996","author":"Sun","key":"10.1049\/iet-com:20080050_r21"},{"key":"10.1049\/iet-com:20080050_r22","doi-asserted-by":"crossref","first-page":"2226","DOI":"10.1049\/el:19961491","volume":"32","author":"Al Jabri","year":"1996","ISSN":"http:\/\/id.crossref.org\/issn\/0013-5194","issn-type":"print"},{"first-page":"489","year":"1995","author":"Campello de Souza","key":"10.1049\/iet-com:20080050_r23"},{"key":"10.1049\/iet-com:20080050_r24","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/BFb0053722","author":"Sun","year":"1998","journal-title":"Proc. 3rd Australasian Conf. Information Security and Privacy"},{"key":"10.1049\/iet-com:20080050_r25","first-page":"1","author":"Barbero","year":"1998","journal-title":"Proc. Int. Conf. Coding Theory, Cryptography and Related Areas"},{"journal-title":"Proc. IEEE Int. Symposium on Information Theory 2003","year":"2003","author":"Xu","key":"10.1049\/iet-com:20080050_r26"},{"key":"10.1049\/iet-com:20080050_r27","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1049\/ip-com:20050086","volume":"153","author":"Payandeh","year":"2006","ISSN":"http:\/\/id.crossref.org\/issn\/1350-2425","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r28","first-page":"227","author":"Barbulescu","year":"2003","journal-title":"Proc. 3rd Int. Symp. Turbo Codes, ISTC 2003"},{"key":"10.1049\/iet-com:20080050_r29","first-page":"215","author":"Monico","year":"2000","journal-title":"Proc. IEEE Int. Symp. Information Theory"},{"key":"10.1049\/iet-com:20080050_r30","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1109\/ICC.2007.161","author":"Baldi","year":"2007","journal-title":"Proc. IEEE Int. Conf. Communications 2007"},{"key":"10.1049\/iet-com:20080050_r31","doi-asserted-by":"crossref","unstructured":"Gallager, R.G.: \u2018Low density parity check codes\u2019, 1963, PhD, MIT Press","DOI":"10.7551\/mitpress\/4347.001.0001"},{"key":"10.1049\/iet-com:20080050_r32","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1109\/18.748992","volume":"45","author":"MacKay","year":"1999","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r33","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/4234.905935","volume":"5","author":"Chung","year":"2001","ISSN":"http:\/\/id.crossref.org\/issn\/1089-7798","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r34","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1109\/18.910578","volume":"47","author":"Richardson","year":"2001","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r35","unstructured":"Lin, S., and Costello, D.J.: \u2018Error control coding: fundamentals and applications\u2019, 2nd edn.(Upper Saddle River, NJ, Prentice-Hall 1983),2004"},{"journal-title":"CCSDS P1B Channel Coding Meeting","year":"2002","author":"Fong","key":"10.1049\/iet-com:20080050_r36"},{"key":"10.1049\/iet-com:20080050_r37","unstructured":"\u2018Quasi-cyclic LDPC codes\u2019, October, 2003 CCSDS Working Group White Paper"},{"key":"10.1049\/iet-com:20080050_r38","doi-asserted-by":"crossref","unstructured":"\u2018Design of low-density parity-check (LDPC) codes for deep space applications\u2019, IPN Progress Report 42-159, November, 2004","DOI":"10.1109\/MSP.2004.1267048"},{"key":"10.1049\/iet-com:20080050_r39","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1109\/TCOMM.2004.831353","volume":"52","author":"Chen","year":"2004","ISSN":"http:\/\/id.crossref.org\/issn\/0090-6778","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r40","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1109\/TIT.2004.840867","volume":"51","author":"Tang","year":"2005","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r41","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/TCOMM.2004.841966","volume":"53","author":"Xu","year":"2005","ISSN":"http:\/\/id.crossref.org\/issn\/0090-6778","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r42","unstructured":"\u2018Low density parity check codes for use in near-earth and deep space applications\u2019, (CCSDS, Washington, DCResearch and Development for Space Data System Standards, 1, 2006),CCSDS 131.1-O-1: Orange Book"},{"key":"10.1049\/iet-com:20080050_r43","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/TCOMM.2006.884815","volume":"54","author":"Li","year":"2006","ISSN":"http:\/\/id.crossref.org\/issn\/0090-6778","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r44","doi-asserted-by":"crossref","first-page":"2711","DOI":"10.1109\/18.959255","volume":"47","author":"Yu","year":"2001","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r45","unstructured":"Peterson, W.W., and Weldon, E.J.: \u2018Error correcting codes\u2019, 2nd edn.(MIT Press 1972)"},{"key":"10.1049\/iet-com:20080050_r46","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1109\/TIT.1981.1056404","volume":"27","author":"Tanner","year":"1981","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r47","first-page":"244","author":"Baldi","year":"2005","journal-title":"Proc. 8th Int. Symp. Commun. Theory and Appl., ISCTA 05"},{"key":"10.1049\/iet-com:20080050_r48","first-page":"1036","author":"Xia","year":"2005","journal-title":"Proc. IEEE Wireless Commun. and Networking Conf."},{"key":"10.1049\/iet-com:20080050_r49","doi-asserted-by":"crossref","unstructured":"Baldi, M.: \u2018Quasi-cyclic low-density parity-check codes and their application to cryptography\u2019, November, 2006, PhD, Universita\u0300 Politecnica delle Marche Ancona, Italy","DOI":"10.1109\/ICC.2007.161"},{"key":"10.1049\/iet-com:20080050_r50","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1006\/ffta.1998.0215","volume":"4","author":"Wu","year":"1998","ISSN":"http:\/\/id.crossref.org\/issn\/1071-5797","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r51","unstructured":"Ben-Israel, A., and Greville, T.N.E.: \u2018Generalized inverses: theory and applications\u2019, (Springer-Verlag, New York 2003),2nd edn."},{"key":"10.1049\/iet-com:20080050_r52","unstructured":"\u2018TM synchronization and channel coding\u2019, (Blue BookRecommendation for Space Data System Standards, CCSDS, Washington, DC1, 2003),CCSDS 131.0-B-1:"},{"key":"10.1049\/iet-com:20080050_r53","doi-asserted-by":"crossref","unstructured":"Salomon, D.: \u2018Data compression: the complete reference\u2019, (Springer 2000),2nd edn.","DOI":"10.1007\/978-3-642-86092-8"},{"key":"10.1049\/iet-com:20080050_r54","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1049\/el:20030169","volume":"39","author":"Heo","ISSN":"http:\/\/id.crossref.org\/issn\/0013-5194","issn-type":"print"},{"key":"10.1049\/iet-com:20080050_r55","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/18.850662","volume":"46","author":"Sendrier","year":"2000","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"}],"container-title":["IET Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-com_20080050?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T16:56:13Z","timestamp":1731430573000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-com%3A20080050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,2,9]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,2,9]]}},"alternative-id":["10.1049\/iet-com:20080050"],"URL":"https:\/\/doi.org\/10.1049\/iet-com:20080050","relation":{},"ISSN":["1751-8628","1751-8636"],"issn-type":[{"type":"print","value":"1751-8628"},{"type":"electronic","value":"1751-8636"}],"subject":[],"published":{"date-parts":[[2009,2,9]]}}}