1. -— (No Editor), Eleventh International Workshop on Algebraic and Combinatorial Coding Theory, Pamporovo, Bulgaria, June 16–22 (2008),
http://www.moi.math.bas.bg/acct2008/acct2008.html
, See [15]
2. Berger, T.P., Cayrel, P.-L., Gaborit, P., Otmani, A.: Reducing Key Length of the McEliece Cryptosystem. In: AFRICACRYPT 2009 [35], pp. 77–97 (2009), Citations in This Document: §6
3. Bernstein, D.J.: Grover vs. McEliece. In: PQCrypto 2010 [36], pp. 73–80 (2010),
http://cr.yp.to/papers.html#grovercode
, Citations in This Document: §1
4. Bernstein, D.J.: List Decoding for Binary Goppa Codes (2008),
http://cr.yp.to/papers.html#goppalist
, Citations in This Document: §5
5. Bernstein, D.J.: Fast Multiplication and Its Applications. In: Algorithmic Number Theory [10], pp. 325–384 (2008),
http://cr.yp.to/papers.html#multapps
, Citations in This Document: §5