P. Cayrel, F. Strenzke-cayrel, S. M. Yousfi-alaoui, G. Hoffmann, M. Meziani et al., Session 2 : Side-Channel Attacks II Recent progress in code-based cryptography Information Security and Assurance Polynomial structures in code-based cryptography New directions in cryptography. Information Theory A new class of linear correcting codes A new method of solving numerical equations of all orders, by continuous approximation, COSADE 2010 -First International Workshop on Constructive Side-Channel Analysis and Secure DesignKoc96] P. Kocher. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems Advances in Cryptology (CRYPTO'96)Mas69] J. Massey. Shift-register synthesis and BCH decoding. Information TheoryMcE78] R.J. McEliece. A public-key cryptosystem based on algebraic coding theory. DSN progress report, pp.24-2821, 1819.

H. Molter, M. Stöttinger, A. Shoufan, F. Strenzkepat75-]-n, and . Patterson, A simple power analysis attack on a McEliece cryptoprocessor Knapsack-type cryptosystems and algebraic coding theory. Problems of control and information theory The algebraic decoding of goppa codes, Journal of Cryptographic Engineering IEEE Transactions on Information Theory, vol.1, issue.212, pp.29-36159, 1975.

T. Richmond, P. Cayrel, V. Fischer, P. L. Véron-[-rsa78-]-r, A. Rivest et al., A secure implementation of a goppa decoder A method for obtaining digital signatures and public-key cryptosystems Algorithms for quantum computation : discrete logarithms and factoring, Cryptographic architectures embedded in reconfigurable devices-Cryptarchi 2013 Foundations of Computer Science Proceedings., 35th Annual Symposium onSho99] P.W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM review, pp.120-126, 1978.

A. Shoufan, F. Strenzke, H. Molter, M. Stöttinger, H. G. Molter et al., A timing attack against patterson algorithm in the mceliece pkc. Information, Security and Cryptology? ICISC, Side Channels in the McEliece PKC. Post-Quantum Cryptography, pp.161-175, 2008.

]. F. Str10a and . Strenzke, How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices, IACR Cryptology ePrint Archive, p.465, 2010.

]. F. Str10b and . Strenzke, A smart card implementation of the mceliece pkc Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, pp.47-59, 2010.

]. F. Str10c and . Strenzke, A timing attack against the secret permutation in the mceliece pkc, pp.95-107, 2010.

]. F. Str11 and . Strenzke, Timing attacks against the syndrome inversion in code-based cryptosystems, 2011.

]. A. Swm-+-09, T. Shoufan, H. G. Wink, S. A. Molter, F. Huss et al., A novel processor architecture for mceliece cryptosystem and fpga platforms, ASAP, pp.98-105, 2009.