| 1 | BERNSTEIN D J, LANGE T. Post-quantum cryptography [J]. Nature, 2017, 549(7671): 188-194. 10.1038/nature23461 | 
																													
																						| 2 | ALAGIC G, ALPERIN-SHERIFF J, APON D, et al. Status report on the second round of the NIST post-quantum cryptography standardization process: NISTIR 8309 [R]. Gaithersburg: National Institute of Standards and Technology, 2020. 10.6028/nist.ir.8240 | 
																													
																						| 3 | MCELIECE R J. A public-key cryptosystem based on algebraic coding theory: DSN progress report 42-44 [R]. Pasadena: Jet Propulsion Laboratory, 1978: 114-116. | 
																													
																						| 4 | GALLAGER R. Low-density parity-check codes [J]. IRE Transactions on Information Theory, 1962, 8(1): 21-28. 10.1109/tit.1962.1057683 | 
																													
																						| 5 | MONICO C, ROSENTHAL J, SHOKROLLAHI A. Using low density parity check codes in the McEliece cryptosystem [C]// Proceedings of the 2000 IEEE International Symposium on Information Theory. Piscataway: IEEE, 2000: 215. 10.1109/isit.2000.866513 | 
																													
																						| 6 | BALDI M, CHIARALUCE F, GARELLO R, et al. Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem [C]// Proceedings of the 2007 IEEE International Conference on Communications. Piscataway: IEEE, 2007: 951-956. 10.1109/icc.2007.161 | 
																													
																						| 7 | MISOCZKI R, TILLICH J P, SENDRIER N, et al. MDPC-McEliece: new McEliece variants from moderate density parity-check codes [C]// Proceedings of the 2013 IEEE International Symposium on Information Theory. Piscataway: IEEE, 2013: 2069-2073. 10.1109/isit.2013.6620590 | 
																													
																						| 8 | GUO Q, JOHANSSON T, STANKOVSKI P. A key recovery attack on MDPC with CCA security using decoding errors [C]// Proceedings of the 2016 International Conference on the Theory and Application of Cryptology and Information Security, LNCS10031. Berlin: Springer, 2016: 789-815. | 
																													
																						| 9 | BYERS J W, LUBY M, MITZENMACHER M, et al. A digital fountain approach to reliable distribution of bulk data [J]. ACM SIGCOMM Computer Communication Review, 1998, 28(4): 56-67. 10.1145/285243.285258 | 
																													
																						| 10 | LUBY M. LT codes [C]// Proceedings of the 2002 43rd Annual IEEE Symposium on Foundations of Computer Science. Piscataway: IEEE, 2002: 271-280. 10.1109/sfcs.2002.1181950 | 
																													
																						| 11 | SHOKROLLAHI A. Raptor codes [J]. IEEE Transactions on Information Theory, 2006, 52(6): 2551-2567. 10.1109/tit.2006.874390 | 
																													
																						| 12 | ZHANG M R. Major automatic repeat request protocols generalization and future develop direction [C]// Proceedings of the 6th International Conference on Information Management, Innovation Management and Industrial Engineering. Piscataway: IEEE, 2013: 5-8. 10.1109/iciii.2013.6703196 | 
																													
																						| 13 | BALDI M, BIANCHI M, CHIARALUCE F. Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes [J]. IET Information Security, 2013, 7(3): 212-220. 10.1049/iet-ifs.2012.0127 | 
																													
																						| 14 | MUKHERJEE A. Hybrid ARQ schemes [M/OL]// TAFAZOLLI R, CHATZIMISIOS P, WANG C L. Wiley 5G Ref: The Essential 5G Reference Online. (2020-05-16) [2020-11-23].. | 
																													
																						| 15 | EATON E, LEQUESNE M, PARENT A, et al. QC-MDPC: a timing attack and a CCA2 KEM [C]// Proceedings of the 2018 International Conference on Post-Quantum Cryptography, LNCS10786. Cham: Springer, 2018: 47-76. | 
																													
																						| 16 | 李艳霞.无线通信中的喷泉码技术研究[D].成都:电子科技大学,2019:23-24. | 
																													
																						|  | LI Y X. Research on fountain codes technology in wireless communication [D]. Chengdu: University of Electronic Science and Technology of China, 2019:23-24. | 
																													
																						| 17 | 孙玉情.QC-MDPC McEliece密码体制研究[D].西安:西安电子科技大学,2019:35-44. 10.19734/j.issn.1001-3695.2018.04.0349 | 
																													
																						|  | SUN Y Q. Research on QC-MDPC McEliece cryptosystem [D]. Xi’an: Xidian University, 2019:35-44. 10.19734/j.issn.1001-3695.2018.04.0349 | 
																													
																						| 18 | MAY A, MEURER A, THOMAE E. Decoding random linear codes in Õ(20.054n) [C]// Proceedings of the 2011 International Conference on the Theory and Application of Cryptology and Information Security, LNCS7073. Berlin: Springer, 2011: 107-124. | 
																													
																						| 19 | OTMANI A, TILLICH J P, DALLOT L. Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes [J]. Mathematics in Computer Science, 2010, 3(2): 129-140. 10.1007/s11786-009-0015-8 | 
																													
																						| 20 | BARDET M, DRAGOI V, LUQUE J G, et al. Weak keys for the quasi-cyclic MDPC public key encryption scheme [C]// Proceedings of the 2016 International Conference on Cryptology in Africa, LNCS9646. Cham: Springer, 2016: 346-367. | 
																													
																						| 21 | FABŠIČ T, HROMADA V, STANKOVSKI P, et al. A reaction attack on the QC-LDPC McEliece cryptosystem [C]// Proceedings of the 2017 International Workshop on Post-Quantum Cryptography, LNCS10346. Cham: Springer, 2017: 51-68. | 
																													
																						| 22 | BARRETO P S L M, GUERON S, GÜNEYSU T, et al. CAKE: Code-based Algorithm for Key Encapsulation [C]// Proceedings of the 2017 IMA International Conference on Cryptography and Coding, LNCS10655. Cham: Springer, 2017: 207-226. | 
																													
																						| 23 | ARAGON N, BARRETO P, BETTAIEB S, et al. BIKE: bit flipping key encapsulation [EB/OL]. (2017-12-22) [2020-11-23]. . | 
																													
																						| 24 | SENDRIER N, VASSEUR V. About low DFR for QC-MDPC decoding [C]// Proceedings of the 2020 International Conference on Post-Quantum Cryptography, LNCS12100. Cham: Springer, 2020: 20-34. |