M. Alekhnovich, More on Average Case vs Approximation Complexity, computational complexity, vol.64, issue.6, pp.755-786, 2011.
DOI : 10.1016/S0020-0190(97)00190-7

D. Augot, L. Batina, D. J. Bernstein, J. Bos, J. Buchmann et al., Initial recommendations of long-term secure post-quantum systems, 2015.

M. Baldi, M. Bodrato, and F. Chiaraluce, A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes, Security and Cryptography for Networks, 6th International Conference. Proceedings, pp.246-262, 2008.
DOI : 10.1007/978-3-540-85855-3_17

E. R. Berlekamp, R. J. Mceliece, and H. C. Van-tilborg, On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978.
DOI : 10.1109/TIT.1978.1055873

J. Chaulet, Étude de cryptosystèmes à clé publique basés sur les codes MDPC quasi-cycliques, 2017.

J. Chaulet and N. Sendrier, Worst case QC-MDPC decoder for McEliece cryptosystem, 2016 IEEE International Symposium on Information Theory (ISIT), pp.1366-1370, 2016.
DOI : 10.1109/ISIT.2016.7541522

URL : https://hal.archives-ouvertes.fr/hal-01408633

T. Chou, QcBits: Constant-Time Small-Key Code-Based Cryptography, Cryptographic Hardware and Embedded Systems -CHES 2016 -18th International Conference Proceedings, pp.280-300, 2016.
DOI : 10.1007/978-3-319-21476-4_10

J. Deneuville, P. Gaborit, and G. Zémor, Ouroboros: A Simple, Secure and Efficient Key Exchange Protocol Based on Coding Theory, Post-Quantum Cryptography -8th International Workshop Proceedings, pp.18-34, 2017.
DOI : 10.1007/978-3-642-25405-5_4

T. Fabsic, V. Hromada, P. Stankovski, P. Zajac, Q. Guo et al., A reaction attack on the QC-LDPC mceliece cryptosystem, Post- Quantum Cryptography -8th International Workshop Proceedings, pp.51-68, 2017.

J. Faugère, V. Gauthier-umaña, A. Otmani, L. Perret, and J. Tillich, A distinguisher for high rate mceliece cryptosystems, pp.282-286, 2011.

P. Fouque and G. Leurent, Cryptanalysis of a hash function based on quasicyclic codes In Topics in Cryptology -CT-RSA 2008, The Cryptographers' Track at the RSA Conference, Proceedings, pp.19-35, 2008.

R. G. Gallager, Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, 1963.
DOI : 10.1109/TIT.1962.1057683

Q. Guo, T. Johansson, and P. Stankovski, A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors, Advances in Cryptology -ASI- ACRYPT 2016 -22nd International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I, pp.789-815, 2016.
DOI : 10.1109/SFCS.1994.365700

S. Heyse, I. Maurich, and T. Güneysu, Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices, Cryptographic Hardware and Embedded Systems -CHES 2013 -15th International Workshop. Proceedings, pp.273-292, 2013.
DOI : 10.1007/978-3-642-40349-1_16

URL : http://www.emsec.rub.de/media/sh/veroeffentlichungen/2013/06/09/QC_MDPC_McEliece.pdf

K. Kobara and H. Imai, Semantically Secure McEliece Public-Key Cryptosystems -Conversions for McEliece PKC -, Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography Proceedings, pp.19-35, 2001.
DOI : 10.1007/3-540-44586-2_2

URL : http://imailab-www.iis.u-tokyo.ac.jp/Members/kobara/Papers/PKC01.ps

R. J. Mceliece, A Public-Key Cryptosystem Based On Algebraic Coding Theory, Deep Space Network Progress Report, vol.44, pp.114-116, 1978.

R. Misoczki, J. Tillich, N. Sendrier, and P. S. Barreto, MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes, 2013 IEEE International Symposium on Information Theory, pp.2069-2073, 2013.
DOI : 10.1109/ISIT.2013.6620590

URL : https://hal.archives-ouvertes.fr/hal-00870929

A. Otmani, J. Tillich, and L. Dallot, Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes, Mathematics in Computer Science, vol.1, issue.4, 2008.
DOI : 10.1515/dma.1992.2.4.439

URL : https://hal.archives-ouvertes.fr/hal-01083566

M. Rossi, M. Hamburg, M. Hutter, and M. E. Marson, A Side-Channel Assisted Cryptanalytic Attack Against QcBits, IACR Cryptology ePrint Archive, vol.2, issue.4, p.596, 2017.
DOI : 10.1145/2213977.2214056

URL : https://hal.archives-ouvertes.fr/hal-01614569

P. W. Shor, Algorithms for quantum computation: discrete logarithms and factoring, Proceedings 35th Annual Symposium on Foundations of Computer Science, pp.20-22, 1994.
DOI : 10.1109/SFCS.1994.365700

URL : http://csdl.computer.org/comp/proceedings/sfcs/1994/6580/00/0365700.pdf

I. Von-maurich, T. Oder, and T. Güneysu, Implementing QC-MDPC McEliece Encryption, ACM Transactions on Embedded Computing Systems, vol.14, issue.3, pp.1-4427, 2015.
DOI : 10.1007/978-3-319-11659-4