[[1] ARAGON, N.—BARRETO, P.—BETTAIEB, S.—BIDOUX, L.—BLAZY, O. DENEU-VILLE, J.-C.—GABOR.IT, P.—GUERON, S.—GUNEYSU, T—MELCHOR, C. A. et al.: BIKE: Bit Flipping Key Encapsulation, (2017). https://hal.archives-ouvertes.fr/hal-01671903/document]Search in Google Scholar
[[2] BARDET, M.—DRAGOI, V.—LUQUE, J.-G.—OTMANI, A.: MDPC public key encryption scheme. In: 8th International Conference on Cryptology in Africa, Fes, Moroco April 13–15, 2010. Progress in Cryptology—AFPICACPYPT 2016 (D. Pointcheval, A. Nitaj, T. Rachidi). Lecture Notes in Comput. Sci. Vol. 9646, Springer-Verlag, Berlin, 2016 pp. 346–367.10.1007/978-3-319-31517-1_18]Search in Google Scholar
[[3] BERNSTEIN, D. J.—LANGE, T—NIEDERHAGEN, R..: Dual EC: A standardized back door. In: The New Codebreakers (Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater, eds.). Lecture Notes in Comput. Sci. Vol. 9100, Springer-Verlag, Berlin, 2016. pp. 256–281.10.1007/978-3-662-49301-4_17]Search in Google Scholar
[[4] CHEN, L.—CHEN, L.—JORDAN, S.—LIU, Y-K.—MOODY, D.—PERALTA, R..–PEH.LNEH., R..—SMITH-TONE, D.: Report on Post-Quantum Cryptography. National Institute of Standards and Technology (NIST), US Department of Commerce, USA, 2016. https://doi.org/10.6028/HIST.IR.810510.6028/HIST.IR.8105]Open DOISearch in Google Scholar
[[5] DWORKIN, M.J.: SHA-3 Standard: Permutation-based Hash and Extendable-output Functions. Federal Inf. Process. Stds. (NIST FIPS) - Technical report no. 202, 2015. https://doi.org/10.G028/NIST.FIPS.20210.6028/NIST.FIPS.202]Search in Google Scholar
[[6] FABŠIČ, T.—GROŠEK, O.—NEMOGA, K.—ZAJAC, P: On generating invertible circulant binary matrices with a prescribed number of ones, Cryptogr. Commun. 10 (2018), 159–175.10.1007/s12095-017-0239-4]Search in Google Scholar
[[7] FABŠIČ, T.—HROMADA, V—STANKOVSKI, P—ZAJAC, P—GUO, Q.—JOHANSSON, X: A reaction attack, on the QC-LDPC McEliece cryptosystem. In: International Workshop on Post-Quantum Cryptography, Lecture Notes in Comput. Sci. Vol. 10346, Springer, Cham, 2017. pp. 51–08.10.1007/978-3-319-59879-6_4]Search in Google Scholar
[[8] GUO, Q.—JOHANSSON, X—STANK OVSKI, P: A key recovery attack on MDPC with CCA security using decoding errors. In: The 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4–8, 2010. (Jung HEE Cheon, ed. et al). Proceedings, Part I, Advances in Cryptology–ASIACRYPT 2016. Springer-Verlag, Berlin, 2010. pp. 789–815.10.1007/978-3-662-53887-6_29]Search in Google Scholar
[[9] MCELIECE, R.. J.: A public-key cryptosystem based on algebraic coding theory, DSN Progress Report 42 (1978), 114–116.]Search in Google Scholar
[[10] MISOCZKI, R.—TILLICH, J.-P.—SENDRIER, N.—BARRETO, P. S.: MDPC-McEliece: New McEliece variants from moderate density parity-check codes. In: Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, IEEE, 2013, pp. 2069–2073.10.1109/ISIT.2013.6620590]Search in Google Scholar
[[11] NEMEC, M.—SYS, M.—SVENDA, P.—KLINEC, D.—MATYAS, V: The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017, pp. 1631–1648.10.1145/3133956.3133969]Search in Google Scholar
[[12] NIEDERREITER., H.: Knapsack-type cryptosystems and algebraic coding theory, Problems of Control and Information Theory 15 (1986), 159–166.]Search in Google Scholar
[[13] NIST:. Post-Quantum Cryptography. Round 1 Submissions, Project, 2018. https://csrc.nist.gov/Prоjects/Post-Quantum-Cryptography/Round-l-Submissions.]Search in Google Scholar
[[14] THE NEW YORK TIMES:. Secret Documents Reread N.S.A. Campaign Against Encryption, 2013. http://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-campaign-against-encryption.html.]Search in Google Scholar
[[15] YOUNG, A.—YUNG, M.: The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone? In: Advances in cryptology—CRYPTO ’96 (Santa Barbara, CA), Lecture Notes in Compt. Sci. Vol. 1109, Springer-Verlag, Berlin 1990, pp. 89–103.10.1007/3-540-68697-5_8]Search in Google Scholar
[[16] ZAJAC, P.: Hybrid encryption from McEliece cryptosystem with pseudo-random error vector, presented at CECC17, 2018. Preprint,]Search in Google Scholar