{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:14:04Z","timestamp":1771611244375,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/iscisc.2013.6767351","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T19:25:49Z","timestamp":1395343549000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["Secret key cryptosystem based on polar codes over Binary Erasure Channel"],"prefix":"10.1109","author":[{"given":"R.","family":"Hooshmand","sequence":"first","affiliation":[]},{"given":"M. Koochak","family":"Shooshtari","sequence":"additional","affiliation":[]},{"given":"M. R.","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/0898-1221(94)90038-8"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57332-1_24"},{"key":"13","first-page":"1","article-title":"Modifications of the rao-nam cryptosystem","author":"barbero","year":"1998","journal-title":"International Conference on Coding Theory Cryptography and Related Areas"},{"key":"14","first-page":"3","article-title":"Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes","volume":"4","author":"hooshmand","year":"2012","journal-title":"ISeCure Journal"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513579"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20080050"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/18.32159"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"1","first-page":"114","article-title":"A public-key cryptosystem based on algebraic codes","author":"mceliece","year":"1978","journal-title":"DNS Progress Reports"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283641"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2008.080017"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.070213.120789"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"4","first-page":"445","article-title":"The rao-nam scheme is insecure against a chosen-plaintext attack","author":"struik","year":"1987","journal-title":"Advances in Cryptology Crypto 87 Proc"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.061611.110862"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592698"}],"event":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","location":"Yazd, Iran","start":{"date-parts":[[2013,8,29]]},"end":{"date-parts":[[2013,8,30]]}},"container-title":["2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6765549\/6767314\/06767351.pdf?arnumber=6767351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:33:24Z","timestamp":1490301204000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6767351\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2013.6767351","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}