1. Aguilar-Melchor, C., et al.: Rank Quasi-Cyclic (RQC) (2020). https://pqc-rqc.org/doc/rqc-specification_2020-04-21.pdf
2. Aguilar-Melchor, C., et al.: Hamming Quasi-Cyclic (HQC) (2021). https://pqc-hqc.org/doc/hqc-specification_2021-06-06.pdf
3. Alamélou, Q., Blazy, O., Cauchie, S., Gaborit, P.: A code-based group signature scheme. Cryptology ePrint Archive, Paper 2016/1119 (2016). https://eprint.iacr.org/2016/1119
4. Lecture Notes in Computer Science;M Bellare,2000
5. Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 4–6 May 1992, pp. 72–84. IEEE Computer Society (1992). https://doi.org/10.1109/RISP.1992.213269