1. Aragon, N., et al.: BIKE, Round 4 submission (2022). https://csrc.nist.gov/csrc/media/Projects/post-quantum-cryptography/documents/round-4/submissions/BIKE-Round4.zip. Accessed 9 Aug 2023
2. Baldi, M., Barenghi, A., Chiaraluce, F., Pelosi, G., Santini, P.: A finite regime analysis of information set decoding algorithms. Algorithms 12(10), 209 (2019)
3. LNCS;A Becker,2012
4. Bernstein, D.J., Chou, T.: CryptAttackTester: formalizing attack analyses (2023). https://cat.cr.yp.to/papers.html#cryptattacktester. Accessed 9 Aug 2023
5. Bernstein, D.J., et al.: Classic McEliece, Round 4 submission (2022). https://csrc.nist.gov/csrc/media/Projects/post-quantum-cryptography/documents/round-4/submissions/mceliece-Round4.tar.gz. Accessed 9 Aug 2023