1. C. Adams and H. Meijer, “Security-related comments regarding McEliece's public-key cryptosystem”, Advances in Cryptology—Crypto '87 (LNCS 293), 224–228, 1988.
2. C. Adams and H. Meijer, “Security-related comments regarding McEliece's public-key cryptosystem”, IEEE Transactions on Information Theory, 35 (1989), 454–455.
3. M. Bellare and P. Rogaway, “Optimal asymmetric encryption”, Advances in Cryptology — EUROCRYPT 94 (LNCS 950), 232–249, 1994.
4. E.R. Berlekamp, R.J. McEliece, and H.C.A. van Tilborg, “On the inherent intractability of certain coding problems”, IEEE Transactions on Information Theory, 24 (1978), 384–386.
5. E.M. Gabidulin, A.V. Paramonov, and O.V. Tretjakov, “Ideals over a non-commutative ring and their application in cryptology”. Advances in Cryptology—EUROCRYPT '91 (LNCS 547), 482–489, 1991.