T. Berger and P. Loidreau, How to Mask the Structure of Codes for a Cryptographic Use, Designs, Codes and Cryptography, vol.4, issue.3, pp.63-79, 2005.
DOI : 10.1007/s10623-003-6151-2

URL : https://hal.archives-ouvertes.fr/hal-00068424

A. Couvreur, P. Gaborit, V. Gauthier-umaña, A. Otmani, and J. P. Tillich, Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. Des. Codes Cryptogr, pp.1-26, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00830594

A. Couvreur, I. Márquez-corbella, and R. Pellikaan, A polynomial time attack against algebraic geometry code based public key cryptosystems, 2014 IEEE International Symposium on Information Theory, 2014.
DOI : 10.1109/ISIT.2014.6875072

URL : https://hal.archives-ouvertes.fr/hal-00937476

A. Couvreur, A. Otmani, and J. P. Tillich, Polynomial Time Attack on Wild McEliece over Quadratic Extensions, Advances in Cryptology -EURO- CRYPT 2014, pp.17-39, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00931774

I. M. Duursma, Majority coset decoding, IEEE Transactions on Information Theory, vol.39, issue.3, pp.1067-1070, 1993.
DOI : 10.1109/18.256518

C. Faure and L. Minder, Cryptanalysis of the McEliece cryptosystem over hyperelliptic codes, pp.99-107, 2008.

G. L. Feng and T. Rao, Decoding algebraic-geometric codes up to the designed minimum distance, IEEE Transactions on Information Theory, vol.39, issue.1, pp.37-45, 1993.
DOI : 10.1109/18.179340

T. Høholdt and R. Pellikaan, On the decoding of algebraic-geometric codes, IEEE Transactions on Information Theory, vol.41, issue.6, pp.1589-1614, 1995.
DOI : 10.1109/18.476214

H. Janwa and O. Moreno, McEliece public cryptosystem using algebraic-geometric codes. Des. Codes Cryptogr, pp.293-307, 1996.
DOI : 10.1109/isit.1995.550471

R. Kötter, A unified description of an error locating procedure for linear codes, Proceedings of Algebraic and Combinatorial Coding Theory, pp.113-117, 1992.

I. Márquez-corbella, E. Martínez-moro, and R. Pellikaan, The non-gap sequence of a subcode of a generalized Reed???Solomon code, Designs, Codes and Cryptography, vol.6, issue.2, pp.1-3, 2013.
DOI : 10.1007/s10623-012-9694-2

I. Márquez-corbella, E. Martínez-moro, and R. Pellikaan, On the unique representation of very strong algebraic geometry codes, Designs, Codes and Cryptography, vol.19, issue.3???4, pp.215-230, 2014.
DOI : 10.1007/s10623-012-9758-3

I. Márquez-corbella, E. Martínez-moro, R. Pellikaan, and D. Ruano, Computational aspects of retrieving a representation of an algebraic geometry code, Journal of Symbolic Computation, vol.64, issue.0, pp.67-87, 2014.
DOI : 10.1016/j.jsc.2013.12.007

I. Márquez-corbella and R. Pellikaan, Error-correcting pairs for a public-key cryptosystem Code-based Cryptography Workshop, 2012.

R. J. Mceliece, A public-key cryptosystem based on algebraic coding theory, DSN Progress Report, vol.4244, pp.114-116, 1978.

D. Mumford, Varieties Defined by Quadratic Equations, C.I.M.E., III Ciclo Varenna, pp.29-100, 1969.
DOI : 10.1007/978-3-642-11015-3_2

H. Niederreiter, Knapsack-type cryptosystems and algebraic coding theory, Problems of Control and Information Theory, vol.15, issue.2, pp.159-166, 1986.

R. Pellikaan, On decoding linear codes by error correcting pairs, 1988.

R. Pellikaan, On decoding by error location and dependent sets of error positions. Discrete Math, pp.106-107, 1992.

C. Peters, Information-Set Decoding for Linear Codes over F q, pp.81-94, 2010.
DOI : 10.1007/978-3-642-12929-2_7

V. M. Sidelnikov and S. O. Shestakov, On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discrete Mathematics and Applications, vol.2, issue.4, pp.439-444, 1992.
DOI : 10.1515/dma.1992.2.4.439

H. Stichtenoth, Algebraic function fields and codes, Graduate Texts in Mathematics, vol.254, 2009.

M. Tsfasman, S. Nogin, and D. , Algebraic geometric codes: basic notions, Mathematical Surveys and Monographs, vol.139, 2007.
DOI : 10.1090/surv/139

C. Wieschebrink, Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes, Lecture Notes in Comput. Sci, vol.6061, pp.61-72
DOI : 10.1007/978-3-642-12929-2_5