E. R. Berlekamp, R. J. Mc-eliece, and &. H. , Van Tilborg: On the inherent intractability of certain coding problems, IEEE Trans. Inform. Theory, pp.384-386, 1978.

A. Canteaut and &. , Chabanne: A further improvement of the work factor in an attempt at breaking Mc Efiece's cryptosystem, Proceedings of Eurocode'94, pp.163-167, 1994.

F. Chabaud, On the security of some cryptosystems based on error-correcting codes, Pre-proceedings of Eurocrypt'94, pp.127-135, 1994.
DOI : 10.1007/BFb0053430

U. Feige, A. Fiat, and &. , Shamir: Zero-knowledge proofs of identity, Proc. 19th ACM Syrup. Theory of Computing, pp.210-217, 1987.

A. Fiat and A. Shamir, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Lecture Notes in Computer Science, vol.263, issue.86, pp.186-194, 1986.
DOI : 10.1007/3-540-47721-7_12

M. Girault, A (non-practical) three-pass identification protocol using coding theory, Lecture Notes in Computer Science, vol.453, pp.265-272, 1990.
DOI : 10.1007/BFb0030367

S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof systems, Proc. 17th ACM Symp. Theory of Computing, pp.291-304, 1985.

S. Harari, A new authentication algorithm, Proceedings of Coding Theory and Applications, pp.91-105, 1988.
DOI : 10.1007/BFb0019849

J. S. Leon, A probabilistic algorithm for computing minimum weights of large errorcorrecting codes, IEEE Trans. Inform. Theory, IT, issue.5, pp.34-1354

F. J. Macwilliams and &. N. Sloane, The Theory of error-correcting codes, North- Holland, 1977.

J. Stern, An alternative to the Fiat-Shamir protocol, Lecture Notes in Computer Science, vol.434, pp.173-180
DOI : 10.1007/3-540-46885-4_19

J. Stern, A new identification scheme based on syndrome decoding, Lecture Notes in Computer Science, vol.773, pp.13-21, 1994.
DOI : 10.1007/3-540-48329-2_2