A public-key cryptosystem based on algebraic coding theory, JPL DSN Progress Report, pp.114-116, 1978. ,
On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
Permutation Decoding of Systematic Codes, Bell System Technical Journal, pp.485-505, 1964. ,
DOI : 10.1002/j.1538-7305.1964.tb04075.x
The theory of Error-Correcting Codes The Netherlands, 2009. ,
An Observation on the Security of McEliece???s Public-Key Cryptosystem, Advances in Cryptology -EUROCRYPT'88, pp.275-280, 1988. ,
DOI : 10.1007/3-540-45961-8_25
A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory, vol.34, issue.5, pp.1354-1359, 1988. ,
DOI : 10.1109/18.21270
A method for finding codewords of small weight, Coding Theory and Applications Lecture Notes in computer Science, vol.388, pp.106-113, 1989. ,
DOI : 10.1007/BFb0019850
A new algorithm for finding minimum-weight words in a linear code : application to a primitive narrow-sense BCH codes of length 511, IEEE Transactions on Information Theory, pp.367-378, 1998. ,
URL : https://hal.archives-ouvertes.fr/inria-00074006
Attacking and Defending the McEliece Cryptosystem, Post-quantum cryptography: second international workshop, 2008. ,
DOI : 10.1007/0-387-34799-2_10
Using permutation group for decoding, Proceedings of the Twelfth International Workshop on Algebraic and Combinatorial Coding Theory, ACCT-12, pp.86-92, 2010. ,
Codes derived from binary Goppa codes, Problems of Information Transmission, pp.91-99, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-00967387
Strengthening McEliece Cryptosystem, Advances in Cryptology (ASIACRYPT 200), pp.585-598, 2000. ,
DOI : 10.1007/3-540-44448-3_45
Reducing Key Length of the McEliece Cryptosystem, Progress in Cryptology -Second International Conference on Cryptology in Africa, pp.77-97, 2009. ,
DOI : 10.1007/BFb0019850
URL : https://hal.archives-ouvertes.fr/hal-01081727
Sha-3 proposal : FSB, 2008. ,
Finding the permutation between equivalent linear codes: the support splitting algorithm, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1193-1203, 2000. ,
DOI : 10.1109/18.850662
Weak keys in the McEliece public-key cryptosystem, IEEE Transactions on Information Theory, vol.47, issue.3, pp.1207-1212, 2001. ,
DOI : 10.1109/18.915687