L. Batina, S. Bhasin, D. Jap, and S. Picek, CSI neural network: Using side-channels to recover your articial neural network information. Cryptology ePrint Archive, vol.477, 2018.

E. R. Berlekamp, R. J. Mceliece, C. A. Henk, and . Van-tilborg, On the inherent intractability of certain coding problems, IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978.

P. Gaborit, O. Ga-etan-murat, G. Z. Ruatta, and . Emor, Low rank parity check codes and their application to cryptography, pp.168-180, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00913719

R. Gilmore, N. Hanley, and M. O'neill, Neural network based attack on a masked implementation of AES, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.106-111, 2015.

G. Valerii-denisovich, A new class of linear error-correcting codes, Problemy Peredachi Informatsii, vol.6, issue.3, pp.24-30, 1970.

G. Hospodar, B. Gierlichs, E. D. Mulder, I. Verbauwhede, and J. Vandewalle, Machine learning in side-channel analysis: a rst study, Journal of Cryptographic Engineering, vol.1, issue.4, p.293, 2011.

W. Hua, Z. Zhang, and G. E. Suh, Reverse engineering convolutional neural networks through side-channel information leaks, Proceedings of the 55th Annual Design Automation Conference, DAC '18, 2018.

D. Jap, M. St-ottinger, and S. Bhasin, Support vector regression: Exploiting machine learning techniques for leakage modeling, Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP '15, vol.2, 2015.

C. Paul and . Kocher, Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems, Computer Science (LNCS), pages 104{113, vol.1109, 1996.

Y. Kong and E. Saeedi, The investigation of neural networks performance in sidechannel attacks, Articial Intelligence Review, 2018.

L. Lerman, R. Poussier, G. Bontempi, O. Markowitch, and F. Standaert, Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis), Constructive Side-Channel Analysis and Secure Design, pp.20-33, 2015.

H. Maghrebi, T. Portigliatti, and E. Prou, Breaking cryptographic implementations using deep learning techniques, Security, Privacy, and Applied Cryptography Engineering, pp.3-26, 2016.

R. James-mceliece, A public-key cryptosystem based on algebraic coding theory, California Inst. Technol, 1978.

R. Misoczki, J. Tillich, N. Sendrier, and P. S. Barreto, MDPCMcEliece: New McEliece variants from moderate density parity-check codes, IEEE International Symposium on Information Theory Proceedings (ISIT 2013), pp.2069-2073, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00870929

, Post-quantum cryptography standardization

A. Parashar, M. Rhu, A. Mukkara, A. Puglielli, R. Venkatesan et al., SCNN: An accelerator for compressed-sparse convolutional neural networks, SIGARCH Comput. Archit. News, vol.45, issue.2, pp.27-40, 2017.

S. Picek, A. Heuser, A. Jovic, S. A. Ludwig, S. Guilley et al., Side-channel analysis and machine learning: A practical perspective, 2017 International Joint Conference on Neural Networks (IJCNN), pp.4095-4102, 2017.
DOI : 10.1109/ijcnn.2017.7966373

URL : https://hal.archives-ouvertes.fr/hal-01628681

T. Richmond, Secure implementation of cryptographic protocols based on errorcorrecting codes (in French), 2016.

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/357980.358017

URL : http://people.csail.mit.edu/rivest/pubs/RSA78.pdf

W. Peter and . Shor, Algorithms for quantum computation: discrete logarithms and factoring, Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp.124-134, 1994.

F. Strenzke, Eciency and Implementation Security of Code-based Cryptosystems, 2013.

M. Ingo-von, Ecient Implementation of Code-and Hash-Based Cryptography, 2016.

L. Wei, B. Luo, Y. Li, Y. Liu, and Q. Xu, I know what you see: Power side-channel attack on convolutional neural network accelerators, Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC '18, pp.393-406, 2018.