“…Stern [21] , Veron [23] , and CVE [6] are examples of signature schemes that were constructed via this method in the setting of the Hamming metric. Similarly, transformation can be adapted in the rank metric setting to construct signature schemes such as rank Stern [9] , rank Veron and rank CVE [3] , cRVDC [4] and rank AGS [15] .…”