References
- Advances Cryptology ASIACRYPT'98 Cryptoanalysis of the Original McEliece Cryptosystem Canteaut N. Sendrier
- em Proc. of Coding Theory and and Application LNCS 388 Polynomial-Tine Algoritms for Pime Factorization and Discrete Logarithm on a Quantum Computer P. W. Shor
- Lecture delivered at the University of Pureto Rico. On security of McEliece and Niederreiter type cryptosystems G. A. Kabatianskii
- Advances Cryptology ASIACRYPT'2000. LNCS Strengthening McEliece Cryptosystem P. Loidreau
- Proc. of IEEE International Sysposium on Information Sysposium on Information Theory, ISIT'98 Some weak keys in McEliece public-key cryptosystem P. Loidreau;N. Sendrier
- IEEE Transactions on Information Theory v.46 Finding the permutation Between Equivalent Linear codes:the Support Splitting Algorithm N. Sendrier https://doi.org/10.1109/18.850662
- Semantically Secure McEliece public-key cryptosystems-Conversations for McEliece PKC K. Kobara;H. Imai
- Advanced in Cryptology-Crypto'97 Failure of the McEliece public-key cryptosystem under Message-resend and related-message Attack Berson T. A.
- IEEE Transactions on Information Theory v.4 Further Cryptanalysis of the McEliece Public-Key Cryptosystem Hung-Min Sun
- Algebraic Function Fields and Codes Henning Stichtenoth
- IEEE Transactions on Information Theory v.44 no.2 On the Automorphism Group of Various Goppa Codes S. Wesemeyer
- Advances Cryptology ASIACRYPT'98 Improving the Security of the McEliece Public-Key Cryptosystem Hun-Min Sun
- Proceedings of the Sixth Swedish-Russian International Workshop on Information Theory A new public key cryptosystem E. Krouk
- Problems of Control and Information Theory v.15 no.2 Knapsack-Type cryptosystems and algebraic coding theory H. Niederrieter
- Disk-retnaya Matematika v.4 no.3 On insecurity of cryptosystems based on generalized Reed-Solomon codes V. M. Sidelnikov;S. O. Shestakov
- Introduction to Coding Theory J. H. van Lint