{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:14:49Z","timestamp":1766733289018,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6875341","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T21:50:30Z","timestamp":1408485030000},"page":"2784-2788","source":"Crossref","is-referenced-by-count":13,"title":["Recovering the interleaver of an unknown turbo-code"],"prefix":"10.1109","author":[{"given":"Jean-Pierre","family":"Tillich","sequence":"first","affiliation":[]},{"given":"Audrey","family":"Tixier","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Sendrier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2012.6262570"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0463"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6005780"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2009.5360726"},{"journal-title":"Reconnaissance En Aveugle de Codeur A Base de Code Convolutif Contribution A La Mise En Oeuvre D'un Recepteur Intelligent","year":"2009","author":"marazin","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2009.5351168"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205729"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557147"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2007.358"},{"journal-title":"Analyse de Canaux de Communication Dans Un Contexte Non Cooperatif","year":"2007","author":"barbier","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1117\/12.603372"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513364"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513365"},{"key":"24","first-page":"68","article-title":"Blind recognition algorithm of turbo codes for communication intelligence systems","volume":"8","author":"naseri","year":"2011","journal-title":"International Journal of Computer Science Issues"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.102612.121473"},{"key":"26","first-page":"213","article-title":"Blind recovery of the second convolutional encoder of a turbo-code when its systematic outputs are punctured","volume":"19","author":"marazin","year":"2009","journal-title":"Proceedings of Military Technical Academy Review"},{"key":"27","first-page":"345","article-title":"Blind recovery of the second convolutional encoder of a turbo-code when its systematic outputs are punctured","author":"gautier","year":"2008","journal-title":"7-th IEEE-Communications 2008"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055186"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(00)00353-X"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MEMB.2006.1578665"},{"key":"10","first-page":"457","article-title":"Blind recognition of punctured convolutional codes","author":"lu","year":"2004","journal-title":"IEEE Int Symp on Information Theory"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2010.0343"},{"key":"7","article-title":"Determining the parameters of a rate 1 n convolutional encoder over GF(q)","author":"rice","year":"1995","journal-title":"Proc Third Int'l Conf Finite Fields and Applications"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205843"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595063"},{"key":"4","first-page":"66","article-title":"Algebraic approach of the reconstruction of linear and convolutional error correcting codes","volume":"16","author":"barbier","year":"2006","journal-title":"World Academy of Science Engineering and Technology"},{"key":"9","article-title":"Reconstruction of punctured convolutional encoders","author":"filiol","year":"2000","journal-title":"Int Symp Information Theory Its Applications (ISITA)"},{"key":"8","first-page":"101","article-title":"Reconstruction of convolutional encoders over GF(Q)","author":"filiol","year":"1997","journal-title":"Cryptography and Coding 6th IMA Int Conf"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2014,6,29]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06875341.pdf?arnumber=6875341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:25:08Z","timestamp":1602689108000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6875341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6875341","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}