Asymptotic Analysis of Blind Reconstruction of BCH Codes Based on Consecutive Roots of Generator Polynomials

In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 8; pp. 206514 - 206527
Main Authors Song, Minki, Shin, Dong-Joon
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2169-3536
2169-3536
DOI10.1109/ACCESS.2020.3037799

Cover

Abstract In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential for both the defender who wants to prevent information leakage and the challenger who wants to extract information from the intercepted signals. However, a proper performance analysis of most blind reconstruction methods has not been performed yet. Among many blind reconstruction methods of BCH codes proposed so far, the blind reconstruction method based on consecutive roots of generator polynomials proposed by Jo, Kwon, and Shin, called the JKS method, shows the best performance under the unknown channel information. However, the performance of the JKS method is only evaluated through simulation without performing theoretical analysis. In this paper, the JKS method is asymptotically analyzed under the binary symmetric channel with the cross-over probability <inline-formula> <tex-math notation="LaTeX">p </tex-math></inline-formula>. Since the blind reconstruction performance heavily depends on how many and which received codewords are used even for the same channel environment, sufficiently many codewords are assumed to perform asymptotic analysis. More specifically, an asymptotic threshold on <inline-formula> <tex-math notation="LaTeX">p </tex-math></inline-formula>, up to which blind reconstruction is successful, is derived when the number of received codewords is sufficiently large, which can be used as a new performance metric for blind reconstruction methods. Finally, the validity of the asymptotic analysis is confirmed through simulation.
AbstractList In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential for both the defender who wants to prevent information leakage and the challenger who wants to extract information from the intercepted signals. However, a proper performance analysis of most blind reconstruction methods has not been performed yet. Among many blind reconstruction methods of BCH codes proposed so far, the blind reconstruction method based on consecutive roots of generator polynomials proposed by Jo, Kwon, and Shin, called the JKS method, shows the best performance under the unknown channel information. However, the performance of the JKS method is only evaluated through simulation without performing theoretical analysis. In this paper, the JKS method is asymptotically analyzed under the binary symmetric channel with the cross-over probability <inline-formula> <tex-math notation="LaTeX">p </tex-math></inline-formula>. Since the blind reconstruction performance heavily depends on how many and which received codewords are used even for the same channel environment, sufficiently many codewords are assumed to perform asymptotic analysis. More specifically, an asymptotic threshold on <inline-formula> <tex-math notation="LaTeX">p </tex-math></inline-formula>, up to which blind reconstruction is successful, is derived when the number of received codewords is sufficiently large, which can be used as a new performance metric for blind reconstruction methods. Finally, the validity of the asymptotic analysis is confirmed through simulation.
In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential for both the defender who wants to prevent information leakage and the challenger who wants to extract information from the intercepted signals. However, a proper performance analysis of most blind reconstruction methods has not been performed yet. Among many blind reconstruction methods of BCH codes proposed so far, the blind reconstruction method based on consecutive roots of generator polynomials proposed by Jo, Kwon, and Shin, called the JKS method, shows the best performance under the unknown channel information. However, the performance of the JKS method is only evaluated through simulation without performing theoretical analysis. In this paper, the JKS method is asymptotically analyzed under the binary symmetric channel with the cross-over probability [Formula Omitted]. Since the blind reconstruction performance heavily depends on how many and which received codewords are used even for the same channel environment, sufficiently many codewords are assumed to perform asymptotic analysis. More specifically, an asymptotic threshold on [Formula Omitted], up to which blind reconstruction is successful, is derived when the number of received codewords is sufficiently large, which can be used as a new performance metric for blind reconstruction methods. Finally, the validity of the asymptotic analysis is confirmed through simulation.
In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential for both the defender who wants to prevent information leakage and the challenger who wants to extract information from the intercepted signals. However, a proper performance analysis of most blind reconstruction methods has not been performed yet. Among many blind reconstruction methods of BCH codes proposed so far, the blind reconstruction method based on consecutive roots of generator polynomials proposed by Jo, Kwon, and Shin, called the JKS method, shows the best performance under the unknown channel information. However, the performance of the JKS method is only evaluated through simulation without performing theoretical analysis. In this paper, the JKS method is asymptotically analyzed under the binary symmetric channel with the cross-over probability $p$ . Since the blind reconstruction performance heavily depends on how many and which received codewords are used even for the same channel environment, sufficiently many codewords are assumed to perform asymptotic analysis. More specifically, an asymptotic threshold on $p$ , up to which blind reconstruction is successful, is derived when the number of received codewords is sufficiently large, which can be used as a new performance metric for blind reconstruction methods. Finally, the validity of the asymptotic analysis is confirmed through simulation.
Author Shin, Dong-Joon
Song, Minki
Author_xml – sequence: 1
  givenname: Minki
  orcidid: 0000-0003-1051-0066
  surname: Song
  fullname: Song, Minki
  organization: Department of Electronic Engineering, Hanyang University, Seoul, South Korea
– sequence: 2
  givenname: Dong-Joon
  orcidid: 0000-0002-5017-5314
  surname: Shin
  fullname: Shin, Dong-Joon
  email: djshin@hanyang.ac.kr
  organization: Department of Electronic Engineering, Hanyang University, Seoul, South Korea
BookMark eNptkU9r3DAQxU1JoWmaT5CLoefd6o9tSceNSZNAoCVpz2Isj4sWr7SV5BZ_-2jXYSlLdRnxeL8Zad7H4sJ5h0VxQ8maUqK-bNr27uVlzQgja064EEq9Ky4ZbdSK17y5-Of-obiOcUvykVmqxWUxbuK82yefrCk3DsY52lj6obwdrevLZzTexRQmk6x3R719KFvfYyxvIWJfZrXNFjRTsn-wfPY-Hfl7dBgg-VB-9-Ps_M7CGD8V74dc8PqtXhU_v979aB9WT9_uH9vN08pURKYV4z12taKdMLKmVPZk6PjQAEjKUMkKRC0qQmgDDGTHRYMAom-4qhsJXUf4VfG49O09bPU-2B2EWXuw-ij48EtDyD8eUUvV8wyJjhGsGKUdQWJ6pSjjiIrz3Ktaek1uD_NfGMdTQ0r0IQANxmCM-hCAfgsgY58XbB_87wlj0ls_hbzg7KuauqqYElV2qcVlgo8x4KCNTXDYdQpgx9OEJeLzCfyMPX_X_6mbhbKIeCIUO2xU8lelAbKB
CODEN IAECCG
CitedBy_id crossref_primary_10_1109_LCOMM_2021_3100348
crossref_primary_10_1109_TSP_2021_3110087
Cites_doi 10.23919/ISITA.2018.8664357
10.1109/GLOCOMW.2009.5360726
10.1109/TCOMM.2014.050614.130297
10.1186/1687-1499-2013-218
10.1007/BFb0024454
10.1109/TCOMM.2016.2561931
10.1109/WCSP.2015.7341243
10.1109/LCOMM.2018.2806482
10.1016/S0166-218X(00)00353-X
10.1186/1687-1499-2011-168
10.1109/ISIT.2006.261971
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOA
DOI 10.1109/ACCESS.2020.3037799
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Materials Research Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 206527
ExternalDocumentID oai_doaj_org_article_89d38ab7b20e4211b0e0cd99123ee933
10.1109/access.2020.3037799
10_1109_ACCESS_2020_3037799
9257408
Genre orig-research
GrantInformation_xml – fundername: Signal Intelligence Research Center
– fundername: Defense Acquisition Program Administration and Agency for Defense Development of Korea
  funderid: 10.13039/501100005073
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
ID FETCH-LOGICAL-c408t-23deb591b7c85118d0fb3f6aa812e984a75740016a2a8b376eaa7d639568abb03
IEDL.DBID RIE
ISSN 2169-3536
IngestDate Fri Oct 03 12:45:11 EDT 2025
Sun Sep 07 11:07:19 EDT 2025
Mon Jun 30 05:44:16 EDT 2025
Thu Apr 24 23:08:33 EDT 2025
Wed Oct 01 03:37:47 EDT 2025
Wed Aug 27 02:27:31 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-23deb591b7c85118d0fb3f6aa812e984a75740016a2a8b376eaa7d639568abb03
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5017-5314
0000-0003-1051-0066
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9257408
PQID 2465442974
PQPubID 4845423
PageCount 14
ParticipantIDs crossref_primary_10_1109_ACCESS_2020_3037799
unpaywall_primary_10_1109_access_2020_3037799
crossref_citationtrail_10_1109_ACCESS_2020_3037799
proquest_journals_2465442974
doaj_primary_oai_doaj_org_article_89d38ab7b20e4211b0e0cd99123ee933
ieee_primary_9257408
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20200000
2020-00-00
20200101
2020-01-01
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 20200000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2020
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref12
lee (ref2) 2012
ref15
ref14
yardi (ref13) 2014
ref11
ref10
ref8
ref7
ref9
ref4
ref6
ref5
wicker (ref1) 1995
yardi (ref3) 2014
References_xml – ident: ref9
  doi: 10.23919/ISITA.2018.8664357
– start-page: 1051
  year: 2014
  ident: ref13
  article-title: Channel-code detection by a third-parity receiver via the likelihood ratio test
  publication-title: Proc IEEE Int Symp Inf Theory
– ident: ref15
  doi: 10.1109/GLOCOMW.2009.5360726
– ident: ref11
  doi: 10.1109/TCOMM.2014.050614.130297
– ident: ref12
  doi: 10.1186/1687-1499-2013-218
– ident: ref7
  doi: 10.1007/BFb0024454
– ident: ref4
  doi: 10.1109/TCOMM.2016.2561931
– start-page: 849
  year: 2014
  ident: ref3
  article-title: Blind reconstruction of binary cyclic codes
  publication-title: Proc Eur Wireless
– ident: ref5
  doi: 10.1109/WCSP.2015.7341243
– ident: ref6
  doi: 10.1109/LCOMM.2018.2806482
– ident: ref8
  doi: 10.1016/S0166-218X(00)00353-X
– ident: ref10
  doi: 10.1186/1687-1499-2011-168
– ident: ref14
  doi: 10.1109/ISIT.2006.261971
– start-page: 591
  year: 2012
  ident: ref2
  article-title: Reconstruction of BCH codes using probability compensation
  publication-title: Proc 18th Asia-Pacific Conf Commun (APCC)
– year: 1995
  ident: ref1
  publication-title: Error Control Systems for Digital Communication and Storage
SSID ssj0000816957
Score 2.1848829
Snippet In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important....
SourceID doaj
unpaywall
proquest
crossref
ieee
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 206514
SubjectTerms Asymptotic analysis
Asymptotic methods
Asymptotic properties
BCH codes
blind reconstruction
Codes
consecutive roots
Crossovers
Error correcting codes
Error correction
Error correction codes
generator polynomial
Generators
Information systems
Methods
military surveillance system
Polynomials
Receivers
Reconstruction
Reconstruction algorithms
Security
security information system
Surveillance
Transmitters
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS-wwEA7iRT08_Mmrv8jBo8U0bbfJcbcoi6CIKHgLkyY99W0XdkX2v3cm7a67CL6L15Cm6cwk831t8w1jV5kWkPoqj522VYz8K48Vwu4YXG0xe_okDULaD4-D8Wt2_5a_rZX6on_COnngznA3SrtUgS2sFD5DtmKFF5VDVCNT75GN0-4rlF4jU2EPVgnetuhlhhKhb4ZliU-EhFAiTxUks6c3UlFQ7O9LrGygzZ33yRQWH9A0a4nnbp_96REjH3YzPWBbfnLI9tZ0BI9YM5wt_k3nLfbgS5UR3tZ8hBjScWKYXzqxob0c87J1fsZHmMQcx1Yq3Omrd9r8-HPbzsP1nSY1snL-1DYLOsCMwXrMXu9uX8px3JdRiKtMqHksU-dtrhNbVASvlBO1TesBAOZ2r1UGRV5kBP1AgrK44XiAwiFyyQdoeCvSE7Y9aSf-L-MBHko67kofVAFwzQJmN5dAbmtZuYjJpUVN1WuMU6mLxgSuIbTp3GDIDaZ3Q8SuVxdNO4mNn7uPyFWrrqSPHRowakwfNeZ_UROxI3L0ahAtyQYqYudLx5t-Lc-MJMk5TNtFFrF4FQzfpgqhwOXGVE9_Y6pnbJfG7F77nLNtDBd_gUBobi9DzH8CMX8ADw
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lj9MwELage0AceC1os7sgHziSxbHz8rGNWFVIrFaISsvJ8isXQlOpqVD59cw4bmlBWsHVGkeO_dnzjez5hpC3uWRaeFukThqbQvxVpDXQ7lS71oD39JkIQtqfbsr5Iv94V9xFnW3MhTm8v8-YfK9D2UCI4ziElwzV8eRDclIWQLwn5GRxczv9iuXjslKmIlxEXtzT88j3BIn-WFPliF4-2ixXevtDd92Bp7l-OqZwr4NAIT4w-Xa1GcyV_fmHfOM__sQz8iQyTjodIfKcPPDLF-TxgQ7hKemm6-331dCDBd2plNC-pTPgoI5ihPpbZza0N3Pa9M6v6QycoKPQioU_vd3g4Uk_9_0Q-o-a1hDV09u-22ICNID9JVlcf_jSzNNYhiG1OauHlAvnTSEzU1mkZ7VjrRFtqTVwAy_rXFdFlSN11FzXBg4sr3XlgPkUZa2NYeIVmSz7pT8jNNBLjumyeCGrNex5Dd7RZbowLbcuIXy3QMpGjXIsldGpEKswqaZNA8BUOJUqTmVC3u07rUaJjvvNZ7jye1PU1w4NsGIqbldVSydg8JXhzOcQIxvmmXXApbnwXgqRkFPEzf4jkuMc1Am53OFIxbNgrThK1oHbr_KEpHts_TXUESRHQz3_T_tLMgEw-NdAkwbzJm6PXwZeCsQ
  priority: 102
  providerName: Unpaywall
Title Asymptotic Analysis of Blind Reconstruction of BCH Codes Based on Consecutive Roots of Generator Polynomials
URI https://ieeexplore.ieee.org/document/9257408
https://www.proquest.com/docview/2465442974
https://doi.org/10.1109/access.2020.3037799
https://doaj.org/article/89d38ab7b20e4211b0e0cd99123ee933
UnpaywallVersion publishedVersion
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: KQ8
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: M~E
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwED-N8QA88DUQgVH5gcelc-OkiR_biKlC2jQhKo0ny195IWsqNRXq_vrdOWlYASHeIstJzrqz73e273cAn1LJtfA2i500Nsb4K4sLhN2xdpVB7-knIhBpX15NF8v0y012cwRnQy6M9z5cPvNjegxn-a6xW9oqO5doXyll9j7Ki2mXqzXsp1ABCZnlPbHQhMvzWVniGDAETDAy5USsJw-cT-Do74uqHODLJ9vVWu9-6rp-4GouXsDlXsjuhsmP8bY1Y3v3G3_j_47iJTzvMSebdUbyCo786jU8e8BEeAL1bLO7XbcN9mB7nhLWVGyOKNQxilF_Mc2G9nLBysb5DZujG3QMW6n0p7dbWj7Z16Zpw_sdqzXG9ey6qXeUAo3m_gaWF5-_lYu4L8QQWxS0jRPhvMnkxOSWAFrheGVENdUa0YGXRapzGhGCR53owuCS5bXOHWKfbFpoY7h4C8erZuXfAQsAM6GEWTqS1RpnvUb_6CY6M1ViXQTJXkPK9izlVCyjViFa4VJ1alWkVtWrNYKz4aV1R9Lx7-5zUv3QlRi2QwOqSfUTVhXSCRQ-Nwn3KUbJhntuHaLpRHgvhYjghFQ7fKTXagSne0NS_WqwUQmR1qHjz9MI4sG4_hBVhxKZB6K-__tfPsBT6tVtBZ3CMRqA_4jgqDWjsKkwCnNjBI-XV9ez7_cgPQyL
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwED9N42HwwNdAZAzwA49Ll8ZxEz-2EVOBdUJok_Zm-SsvhKZSU6Hy1-_OScMKCPEWWXZy1p19v7NzvwN4n8lEc29F7KSxMcZfIi4QdsfaVQa9px_zQKS9uJrMb7JPt-L2AM6GXBjvffj5zI_oMdzlu8Zu6KjsXKJ9ZZTZ-0BkWSa6bK3hRIVKSEiR99RC40SeT8sSZ4FBYIqxaULUenLP_QSW_r6syh7CPNosV3r7Q9f1PWdz8QQWOzG7f0y-jTatGdmfvzE4_u88nsLjHnWyaWcmz-DAL5_Do3tchMdQT9fb76u2wR5sx1TCmorNEIc6RlHqL67Z0F7OWdk4v2YzdISOYSsV__R2Qxso-9o0bRjf8VpjZM--NPWWkqDR4F_AzcWH63Ie96UYYouCtnHKnTdCjk1uCaIVLqkMryZaIz7wssh0TjNC-KhTXRjctLzWuUP0IyaFNibhL-Fw2Sz9K2ABYqaUMkuXslrjutfoId1YC1Ol1kWQ7jSkbM9TTuUyahXilUSqTq2K1Kp6tUZwNgxadTQd_-4-I9UPXYljOzSgmlS_ZFUhHUfhc5MmPsM42SQ-sQ7xdMq9l5xHcEyqHV7SazWC050hqX4_WKuUaOvQ9edZBPFgXH-IqkORzD1RT_7-lXdwNL9eXKrLj1efX8NDGtEdDJ3CIRqDf4NQqTVvwwq5A5AyDTM
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lj9MwELage0AceC1os7sgHziSxbHz8rGNWFVIrFaISsvJ8isXQlOpqVD59cw4bmlBWsHVGkeO_dnzjez5hpC3uWRaeFukThqbQvxVpDXQ7lS71oD39JkIQtqfbsr5Iv94V9xFnW3MhTm8v8-YfK9D2UCI4ziElwzV8eRDclIWQLwn5GRxczv9iuXjslKmIlxEXtzT88j3BIn-WFPliF4-2ixXevtDd92Bp7l-OqZwr4NAIT4w-Xa1GcyV_fmHfOM__sQz8iQyTjodIfKcPPDLF-TxgQ7hKemm6-331dCDBd2plNC-pTPgoI5ihPpbZza0N3Pa9M6v6QycoKPQioU_vd3g4Uk_9_0Q-o-a1hDV09u-22ICNID9JVlcf_jSzNNYhiG1OauHlAvnTSEzU1mkZ7VjrRFtqTVwAy_rXFdFlSN11FzXBg4sr3XlgPkUZa2NYeIVmSz7pT8jNNBLjumyeCGrNex5Dd7RZbowLbcuIXy3QMpGjXIsldGpEKswqaZNA8BUOJUqTmVC3u07rUaJjvvNZ7jye1PU1w4NsGIqbldVSydg8JXhzOcQIxvmmXXApbnwXgqRkFPEzf4jkuMc1Am53OFIxbNgrThK1oHbr_KEpHts_TXUESRHQz3_T_tLMgEw-NdAkwbzJm6PXwZeCsQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Asymptotic+Analysis+of+Blind+Reconstruction+of+BCH+Codes+Based+on+Consecutive+Roots+of+Generator+Polynomials&rft.jtitle=IEEE+access&rft.au=Song%2C+Minki&rft.au=Shin%2C+Dong-Joon&rft.date=2020&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=8&rft.spage=206514&rft.epage=206527&rft_id=info:doi/10.1109%2FACCESS.2020.3037799&rft.externalDocID=9257408
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon