On the Use of Structured Codes in Code Based Cryptography1