March 3, 2016
      
                  
        
  Author(s)
  Dustin  Moody,   Ray A. Perlner
 
       
            
    
    
        Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding, blockwise triangular private keys, and a nonuniform error pattern based on "generalized error sets." The general approach was referred to as "McEliece in