On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
Estimating the size of a union of random subsets of fixed cardinality, Elemente der Mathematik, vol.56, issue.4, pp.163-169, 2001. ,
DOI : 10.1007/PL00000552
A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511, IEEE Transactions on Information Theory, vol.44, issue.1, pp.367-378, 1998. ,
DOI : 10.1109/18.651067
How to Achieve a McEliece-Based Digital Signature Scheme, Lecture Notes in Computer Science, vol.2248, pp.157-174, 2001. ,
DOI : 10.1007/3-540-45682-1_10
URL : https://hal.archives-ouvertes.fr/inria-00072511
A summary of McEliece-type cryptosystems and their security, Cryptology ePrint Archive, Report, vol.162, 2006. ,
Shorter keys for code based cryptography, Proceedings of the 2005 International Workshop on Coding and Cryptography (WCC 2005), pp.81-91, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00078726
A digital signature scheme based on random error-correcting codes, Conf. Lecture Notes in Computer Science, vol.1355, pp.161-167, 1997. ,
DOI : 10.1007/BFb0024461
Constructing digital signatures from a one way function, 1979. ,
An Observation on the Security of McEliece???s Public-Key Cryptosystem, Lecture Notes in Computer Science, vol.330, pp.275-280, 1988. ,
DOI : 10.1007/3-540-45961-8_25
A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory, vol.34, issue.5, pp.1354-1359, 1988. ,
DOI : 10.1109/18.21270
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems, IEEE Transactions on Information Theory, vol.40, issue.1, pp.271-273, 1994. ,
The theory of error-correcting codes, 1986. ,
A public-key system based on algebraic coding theory, pp.114-116, 1978. ,
A Certified Digital Signature, 9th Annual International Cryptology Conference Proceedings (G. Brassard, pp.218-238, 1989. ,
DOI : 10.1007/0-387-34805-0_21
Knapsack-type cryptosystems and algebraic coding theory, Problems Control Inform. Theory, vol.15, issue.2, pp.159-166, 1986. ,
The BiBa one-time signature and broadcast authentication protocol, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.28-37, 2001. ,
DOI : 10.1145/501983.501988
Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying, ACISP Lecture Notes in Computer Science, vol.2384, pp.144-153, 2002. ,
DOI : 10.1007/3-540-45450-0_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.24.7320
A method for finding codewords of small weight, Lecture Notes in Computer Science, vol.388, pp.106-113, 1988. ,
DOI : 10.1007/BFb0019850
A new identification scheme based on syndrome decoding, Lecture Notes in Computer Science, vol.773, pp.13-21, 1993. ,
DOI : 10.1007/3-540-48329-2_2
Probì eme SD, opérateur trace, schémas d'identification et codes de goppa, 1995. ,