1. E. R. Berlekamp, R. J. McEliece and H. C. A. Van Tilborg, On the Inherent Intractability of Certain Coding Problems, IEEE Trans. Inform. Theory, IT-24(3) pp. 384–386, 1978.
2. K. Chen, Improved Girault Identification Scheme, IEE Electronics Letters, Vol. 30, No.19, pp. 1590–1591, 1994.
3. E. M. Gabidulin, Theory of Code with Maximum Rank Distance, Problems of Information Transmission, Vol. 21, pp. 1–12, 1985.
4. M. Girault, A (non-practical) three-pass identification protocol using coding theory, Proceedings of Auscrypt'90, LNCS Vol. 453, pp. 204–211, 1990.
5. S. Harari, A New Authentication Algorithm, Coding Theory and Applications, LNCS Vol. 388, pp. 204–211, 1989.