%PDF-1.4 % 4 0 obj << /S /GoTo /D (section.1) >> endobj 7 0 obj (1 Introduction) endobj 8 0 obj << /S /GoTo /D (section.2) >> endobj 11 0 obj (2 Introduction to Polar Codes) endobj 12 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 15 0 obj (2.1 Channel Polarization) endobj 16 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 19 0 obj (2.2 Polar Coding) endobj 20 0 obj << /S /GoTo /D (section.3) >> endobj 23 0 obj (3 The Proposed Symmetric Scheme Based on Polar Codes ) endobj 24 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 27 0 obj (3.1 Encryption-Encoding) endobj 28 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 31 0 obj (3.2 Decryption-Decoding ) endobj 32 0 obj << /S /GoTo /D (section.4) >> endobj 35 0 obj (4 Efficiency and Security) endobj 36 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 39 0 obj (4.1 Efficiency) endobj 40 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 43 0 obj (4.2 Security) endobj 44 0 obj << /S /GoTo /D (section.5) >> endobj 47 0 obj (5 Conclusions) endobj 48 0 obj << /S /GoTo /D [49 0 R /Fit] >> endobj 74 0 obj << /Length 4208 /Filter /FlateDecode >> stream xڥ]s۸=_H_r}偖` E$.vA4X,b8EqWq2ϯJrfdIfF46o\$6R"uë3+J$˄M+aLG5P=o^Q.D%CM"lTWn}^T=]+f̬tpϯ pί+ԗRG_R*$F@͵&ZWZGQvnsjͩJ4WZwϯ)ɤy>& !k=`#k` :IΚrSO[O;틺vwնwi{w`s[j6/TEbH 7,uZfc^ZA&dwm#%Nˑ_Y,9͔KjzFiI^]ejUEݾ*MlǛ)BSjf~fLk%3¢?5]ʚz2Z#C