T. P. Berger, P. Cayrel, P. Gaborit, and A. Otmani, Reducing Key Length of the McEliece Cryptosystem, Progress in Cryptology ? Africacrypt'2009, pp.77-97, 2009.
DOI : 10.1007/BFb0019850

URL : https://hal.archives-ouvertes.fr/hal-01081727

P. Cayrel, P. Véron, and S. M. Alaoui, A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem, Selected Areas in Cryptography, pp.171-186, 2010.
DOI : 10.1007/s002000050053

G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, The Keccak sponge function family

P. Gaborit and M. Girault, Lightweight Code-based Authentication and Signature, IEEE International Symposium on Information Theory ? ISIT'2007, pp.191-195, 2007.

M. Abdalla, J. H. An, M. Bellare, and C. Namprempre, From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security, IEEE Transactions on Information Theory, vol.54, issue.8, pp.3631-3646, 2008.
DOI : 10.1109/TIT.2008.926303

R. Misoczki and P. S. Barreto, Compact McEliece Keys from Goppa Codes, 2009.
DOI : 10.1007/978-3-642-05445-7_24

URL : https://hal.archives-ouvertes.fr/hal-00870932

A. Shamir, An Efficient Identification Scheme Based on Permuted Kernels, Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '89, pp.606-609, 1990.
DOI : 10.1007/0-387-34805-0_54

P. W. Shor, Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1995.
DOI : 10.1137/S0097539795293172

J. Stern, Designing Identification Schemes with Keys of Short Size, Advances in Cryptology ? Proceedings of CRYPTO '94, pp.164-173, 1994.
DOI : 10.1007/3-540-48658-5_18

J. Stern, A new identification scheme based on syndrome decoding, Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, pp.13-21, 1994.
DOI : 10.1007/3-540-48329-2_2

P. Véron, Improved identification schemes based on error-correcting codes, Applicable Algebra in Engineering, Communication and Computing, vol.9, issue.1, pp.57-69, 1996.
DOI : 10.1007/s002000050053