“…The information vector is further transformed using equilibrium coding. Upon receiving a message, a legitimate user, in the same way as in McEliece cryptosystem, removes the action of masking matrices and, using the fast decoding algorithm, receives the vector e, which, after equilibrium coding, represents the initially transmitted information [11].…”