C. Aguilar-melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy et al., URL https://hal. archives-ouvertes.fr/hal-01946894, submission to the NIST post quantum standardization process, p.3, 2017.

C. Aguilar-melchor, O. Blazy, J. Deneuville, P. Gaborit, and G. Zémor, Efficient encryption from random quasi-cyclic codes, IEEE Trans Information Theory, vol.64, issue.5, pp.3927-3943, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01951335

N. Aragon, O. Blazy, P. Gaborit, A. Hauteville, and G. Zémor, Durandal: A rank metric based signature scheme, Advances in Cryptology -EURO-CRYPT 2019 -38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.728-758, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02307147

N. Courtois, M. Finiasz, and N. Sendrier, How to achieve a McEliece-based digital signature scheme, Heidelberg, vol.2248, pp.157-174, 2001.
URL : https://hal.archives-ouvertes.fr/inria-00072511

D. Julius, B. , A. H. Tanja, L. Panny, and L. , COMMENT: RaCoSS. Official comments about NIST PQC submissions, 2017.

T. Debris-alazard and J. Tillich, Two attacks on rank metric codebased schemes: Ranksign and an IBE scheme, Advances in Cryptology -ASIACRYPT 2018 -24th International Conference on the Theory and Application of Cryptology and Information Security, vol.11272, pp.62-92, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01957207

T. Debris-alazard, N. Sendrier, and J. Tillich, The problem with the SURF scheme, Cryptology ePrint Archive, vol.662, 2017.

T. Debris-alazard, N. Sendrier, and J. P. Tillich, Wave: A new code-based signature scheme, Cryptology ePrint Archive, vol.996, p.3, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01958175

J. C. Deneuville and P. Gaborit, Cryptanalysis of a code-based one-time signature, The Eleventh International Workshop on Coding and Cryptography, vol.2019, 2019.
URL : https://hal.archives-ouvertes.fr/hal-01961491

J. C. Faugère, V. Gauthier, A. Otmani, L. Perret, and J. P. Tillich, A distinguisher for high rate McEliece cryptosystems, Proc. IEEE Inf. Theory Workshop-ITW 2011, pp.282-286, 2011.

A. Fiat and A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, Odlyzko AM (ed) CRYPTO'86, vol.263, pp.186-194, 1987.

P. Gaborit and G. Zémor, On the hardness of the decoding and the minimum distance problems for rank codes, IEEE Trans Information Theory, vol.62, issue.12, pp.7245-7252, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01443111

P. Gaborit, G. Murat, O. Ruatta, and G. Zémor, Low rank parity check codes and their application to cryptography, Proceedings of the Workshop on Coding and Cryptography WCC'2013, vol.6, p.9, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00913719

P. Gaborit, O. Ruatta, J. Schrek, and G. Zémor, New results for rank-based cryptography, Progress in Cryptology -AFRICACRYPT 2014, vol.8469, pp.1-12, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01261421

C. Gentry, C. Peikert, and V. Vaikuntanathan, Trapdoors for hard lattices and new cryptographic constructions, 40th ACM STOC, pp.197-206, 2008.

J. Hoffstein, J. Pipher, and J. H. Silverman, NSS: An NTRU lattice-based signature scheme, LNCS, vol.2045, pp.211-228, 2001.

G. Kabatianskii, E. Krouk, and B. Smeets, A digital signature scheme based on random error-correcting codes, IMA Int. Conf., Springer, vol.1355, pp.161-167, 1997.

V. Lyubashevsky, Lattice signatures without trapdoors, p.6, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00864308

D. Micciancio and C. Peikert, Trapdoors for lattices: Simpler, tighter, faster, smaller, 2012.

P. Sarathi, R. Rui, X. Kazuhide, F. Shinsaku, K. Kirill et al., RaCoSS: Random code-based signature scheme. Submission to NIST post-quantum standardization process, vol.2, p.6, 2017.

P. Sarathi, R. Rui, X. Kazuhide, F. Shinsaku, K. Kirill et al., Code-based signature scheme without trapdoors, IEICE Tech. Rep, vol.118, issue.151, pp.17-22, 2018.

E. Persichetti, Efficient digital signatures from coding theory, vol.397, p.6, 2017.

, EUROCRYPT 2012, vol.7237, p.12, 2012.

P. Santini, M. Baldi, and F. Chiaraluce, Cryptanalysis of a one-time codebased digital signature scheme, 2018.

C. P. Schnorr, Efficient identification and signatures for smart cards, LNCS, vol.435, p.6, 1990.

P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J Comput, vol.26, issue.5, pp.1484-1509, 1997.

Y. Song, X. Huang, Y. Mu, and W. Wu, A new code-based signature scheme with shorter public key, 053&version=20190125:204017&file=053.pdf 3, vol.7, p.10, 2019.

K. Xagawa, Practical attack on racoss-r. Cryptology ePrint Archive, vol.831, 2018.