“…In the Hamming metric, signature schemes such as RaCoSS [17] and Persichetti's signature scheme [16] were shown to be insecure as information leaks from the secret. More recently, the Schnorr approach has been considered in constructing rank metric code-based signature schemes such as RQCS [19] , TPL [22] , Durandal [2] , MURAVE [13] and the SHMW signature scheme [20] . However, the RQCS signature scheme was successfully cryptanalyzed in [1] .…”