{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T15:54:41Z","timestamp":1764431681961,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/gcwkshps52748.2021.9681980","type":"proceedings-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T21:06:05Z","timestamp":1643058365000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Evolution of the Polar Code-Based Encryption Schemes"],"prefix":"10.1109","author":[{"given":"Chen","family":"An","sequence":"first","affiliation":[]},{"given":"Ying","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xianhui","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2540625"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2015.0713"},{"key":"ref33","first-page":"22","article-title":"A Rao-Nam like cryptosystem with product codes","author":"barbero","year":"2001","journal-title":"Proc 6th Int Conf Finite Fields and Applications to Coding Theory"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053722"},{"key":"ref31","first-page":"1","article-title":"Modifications of the Rao-Nam Cryptosystem","author":"barbero","year":"1998","journal-title":"Proc Int Conf Coding Theory Cryptography and Related Areas"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_40"},{"key":"ref37","first-page":"3","article-title":"Improving the Rao-Nam Secret Key Cryptosystem Using Regular EDF-QC-LDPC Codes","volume":"4","author":"hooshmand","year":"2012","journal-title":"ISeCure Journal"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20080050"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2015.0026"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2014.0101"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_20"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2013.6767351"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2015.0064"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88403-3_3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19574-7_10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05445-7_24"},{"key":"ref17","first-page":"120","article-title":"QC-LDPC Code-Based Cryptography","author":"baldi","year":"2014","journal-title":"SpringerBriefs in Electrical and Computer Engineering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620590"},{"key":"ref19","article-title":"Low rank parity check codes and their application to cryptography","author":"gaborit","year":"2013","journal-title":"Proceedings of the Workshop on Coding and Cryptography (WCC 2013)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/773453.808188"},{"key":"ref4","first-page":"159","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"niederreiter","year":"1986","journal-title":"Probl Control Inf Theory"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25922-8_1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0689"},{"key":"ref6","article-title":"Efficient encryption from random quasi-cyclic codes","volume":"abs 1612 5572","author":"aguilar","year":"2016","journal-title":"CoRR"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/3-540-47721-7_3","article-title":"Private-Key Algebraic-Code Cryptosystems","volume":"263","author":"rao","year":"1987","journal-title":"Lecture Notes on Computer Science"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1109\/18.272496","article-title":"On the equivalence of mceliece's and niederreiter's public-key cryptosystems","volume":"40","author":"li","year":"1994","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1515\/dma.1994.4.3.191"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69284-5_10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1515\/dma.1992.2.4.439"},{"key":"ref1","article-title":"A public-key cryptosystem based on algebraic coding theory","volume":"44","author":"mceliece","year":"1978","journal-title":"Deep Space Network Progress Report"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2014.6994031"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29360-8_9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2014.7011934"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.1489"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541753"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2691-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3086975"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36237-9_7"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/0898-1221(94)90038-8"},{"key":"ref25","first-page":"206","article-title":"Revised quantum resistant public key encryption scheme RLCE and IND-CCA2 security for McEliece schemes","author":"wang","year":"2017","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2021,12,7]]},"location":"Madrid, Spain","end":{"date-parts":[[2021,12,11]]}},"container-title":["2021 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9681915\/9681831\/09681980.pdf?arnumber=9681980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:57:51Z","timestamp":1652201871000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9681980\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps52748.2021.9681980","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}