[1] E. Berlekamp, R. McEliece, and H. van Tilborg, “On the inherent intractability of certain coding problems,” IEEE
Trans. Inf. Theory, vol. 24, no. 3, pp. 384–386, 1978.
[2] S. Barg, “Some new NP-complete coding problems,” Problemy Peredachi Informatsii, vol. 30, no. 3, pp. 23–28, 1994.
[3] E. Prange, “The use of information sets in decoding cyclic codes,” IRE Trans. Inf. Theory, vol. 8, no. 5, pp. 5–9,
1962.
[4] I. I. Dumer, “Two decoding algorithms for linear codes,” Problemy Peredachi Informatsii, vol. 25, no. 1, pp. 24–32,
1989.
[5] P. J. Lee and E. F. Brickell, “An observation on the security of McEliece’s public-key cryptosystem,” in Workshop on
the Theory and Application of Cryptographic Techniques. Springer, 1988, pp. 275–280.
[6] J. S. Leon, “A probabilistic algorithm for computing minimum weights of large error-correcting codes,” IEEE Trans.
Inf. Theory, vol. 34, no. 5, pp. 1354–1359, 1988.
[7] J. Stern, “A method for finding codewords of small weight,” in International Colloquium on Coding Theory and
Applications. Springer, 1988, pp. 106–113.
[8] A. Becker, A. Joux, A. May, and A. Meurer, “Decoding random binary linear codes in 2n/20: How 1+1=0
improves information set decoding,” in Advances in Cryptology - EUROCRYPT 2012, ser. LNCS, D. Pointcheval
and T. Johansson, Eds., vol. 7237. Springer, 2012, pp. 520–536.
[9] A. May, A. Meurer, and E. Thomae, “Decoding random linear codes in O(20.054n),” in International Conference on
the Theory and Application of Cryptology and Information Security. Springer, 2011, pp. 107–124.
[10] D. J. Bernstein, T. Lange, and C. Peters, “Smaller decoding exponents: ball-collision decoding,” in Annual Cryptology
Conference. Springer, 2011, pp. 743–760.
[11] R. J. McEliece, “A public-key cryptosystem based on algebraic coding theory.” DSN Progress Report, pp. 114–116,
1978.
[12] N. Courtois, M. Finiasz, and N. Sendrier, “How to achieve a McEliece-based digital signature scheme,” in ASIACRYPT.
Springer, 2001, pp. 157–174.
[13] R. Bricout, A. Chailloux, T. Debris-Alazard, and M. Lequesne, “Ternary syndrome decoding with large weight,” in
International Conference on Selected Areas in Cryptography. Springer, 2019, pp. 437–466.
[14] T. Debris-Alazard, N. Sendrier, and J.-P. Tillich, “Wave: A new family of trapdoor one-way preimage sampleable
functions based on codes,” in ASIACRYPT. Springer, 2019, pp. 21–51.
[15] J. Stern, “A new identification scheme based on syndrome decoding,” in Advances in Cryptology — CRYPTO’ 93,
D. R. Stinson, Ed. Springer Berlin Heidelberg, 1994, pp. 13–21.
[16] V. Lyubashevsky, “Lattice signatures without trapdoors,” in Annual International Conference on the Theory and
Applications of Cryptographic Techniques. Springer, 2012, pp. 738–755.
[17] E. Persichetti, “Efficient one-time signatures from quasi-cyclic codes: A full treatment,” Cryptography, vol. 2, no.
4:30, 2018.
[18] P. Santini, M. Baldi, and F. Chiaraluce, “Cryptanalysis of a one-time code-based digital signature scheme,” in 2019
IEEE International Symposium on Information Theory (ISIT), Paris, France, 2019, pp. 2594–2598.
[19] J.-C. Deneuville and P. Gaborit, “Cryptanalysis of a code-based one-time signature,” Des. Codes Cryptogr., 2020.
[20] P.-L. Cayrel, P. Véron, and S. M. El Yousfi Alaoui, “A zero-knowledge identification scheme based on the q-ary
syndrome decoding problem,” in Selected Areas in Cryptography. Springer Berlin Heidelberg, 2011, pp. 171–186.
[21] S. M. El Yousfi Alaoui, P.-L. Cayrel, R. El Bansarkhani, and G. Hoffmann, “Code-based identification and signature
schemes in software,” in Security Engineering and Intelligence Informatics, A. Cuzzocrea, C. Kittl, D. E. Simos,
E. Weippl, and L. Xu, Eds. Springer Berlin Heidelberg, 2013, pp. 122–136.