1. Adams, C.M. (1985), Examination and Analysis of McEliece’s Public-Key Cryptosystem, M.Sc. Thesis, Department of Computing and Information Science, Queen’s University, Kingston.
2. Berlckamp, E.R. (1973), Goppa Codes, IEEE. Transactions on Information Theory, Vol. IT-19 #5 (Sept.).
3. Brickell, E.F. (1985), Breaking Iterated Knapsacks, Advances in Cryptology: Proceedings of Crypto 84, Blakley, G.R., Chaum, D. (Editors), Springer-Verlag, Berlin.
4. Bunch, J., Hopcroft, J.E. (1974), Triangular Factorization and Inversion by Fast Matrix Multiplication, Mathematics of Computation, Vol. 28; 125.
5. McEliece, R.J. (1977), The Theory of Information and Coding (Volume 3 of the Encyclopedia of Mathematics and its Applications), Addison-Wesley, Reading, Mass.