R. M. Avanzi, S. Hoerder, D. Page, and M. Tunstall, Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems, Journal of Cryptographic Engineering, vol.1, issue.4, pp.271-281, 2011.

E. R. Berlekamp, R. J. Mceliece, C. A. Henk, and . Van-tilborg, On the inherent intractability of certain coding problems, IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978.

G. Valerii-denisovich, A new class of linear error-correcting codes, Problemy Peredachi Informatsii, vol.6, issue.3, pp.24-30, 1970.

S. Heyse, A. Moradi, and C. Paar, Practical power analysis attacks on software implementations of McEliece, Proceedings of the Third international conference on Post-Quantum Cryptography, vol.6061, pp.108-125, 2010.

C. Paul and . Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology (CRYPTO'96), vol.1109, pp.104-113, 1996.

J. Florence, N. Macwilliams, and . Sloane, The theory of errorcorrecting codes, 2006.

R. James-mceliece, A public-key cryptosystem based on algebraic coding theory, California Inst. Technol, 1978.

H. , G. Molter, M. Stöttinger, A. Shoufan, and F. Strenzke, A simple power analysis attack on a McEliece cryptoprocessor, Journal of Cryptographic Engineering, vol.1, issue.1, pp.29-36, 2011.

N. J. Patterson, The algebraic decoding of Goppa codes, IEEE Transactions on Information Theory, vol.21, issue.2, pp.203-207, 1975.

M. Petrvalsk´ypetrvalsk´y, T. Richmond, and M. Drutarovsk´ydrutarovsk´y, Countermeasure against SPA implementation of an embedded McEliece cryptosystem. Prepared to submission to MAREW, 2015.

T. Richmond, M. Petrvalsk´ypetrvalsk´y, and M. Drutarovsk´ydrutarovsk´y, A side-channel attack against the secret permutation on an embedded McEliece cryptosystem, 2015.
URL : https://hal.archives-ouvertes.fr/ujm-01186639

W. Peter and . Shor, Algorithms for quantum computation: discrete logarithms and factoring, Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp.124-134, 1994.

A. Shoufan, F. Strenzke, H. G. Molter, and M. Stöttinger, A timing attack against Patterson algorithm in the McEliece PKC, Proceedings of the 12th International Conference on Information, Security and Cryptology, vol.5984, pp.161-175, 2010.

F. Strenzke, A timing attack against the secret permutation in the McEliece PKC, Proceedings of the Third international conference on PostQuantum Cryptography, vol.6061, pp.95-107, 2010.

F. Strenzke, Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties, Journal of Cryptographic Engineering, vol.1, issue.4, pp.283-292, 2011.

F. Strenzke, Timing attacks against the syndrome inversion in code-based cryptosystems, The 5th International Workshop on Post-Quantum Cryptography, vol.7932, pp.217-230, 2013.

F. Strenzke, E. Tews, H. G. Molter, R. Overbeck, and A. Shoufan, Side channels in the McEliece PKC, The Second International Workshop on Post-Quantum Cryptography, vol.5299, pp.216-229, 2008.