R. J. Mceliece, A public-key cryptosystem based on algebraic coding theory, California Inst. Technol, 1978.

F. Strenzke, E. Tews, H. G. Molter, R. Overbeck, and A. Shoufan, Side Channels in the McEliece PKC, The Second International Workshop on Post-Quantum Cryptography, pp.216-229, 2008.
DOI : 10.1007/978-3-540-46588-1_10

A. Shoufan, F. Strenzke, H. G. Molter, and M. Stöttinger, A Timing Attack against Patterson Algorithm in the McEliece PKC, Proceedings of the 12th International Conference on Information, Security and Cryptology, pp.161-175, 2009.
DOI : 10.1007/978-3-642-14423-3_12

F. Strenzke, A Timing Attack against the Secret Permutation in the McEliece PKC, Proceedings of the Third international conference on Post-Quantum Cryptography, pp.95-107, 2010.
DOI : 10.1007/978-3-642-12929-2_8

S. Heyse, A. Moradi, and C. Paar, Practical Power Analysis Attacks on Software Implementations of McEliece, Proceedings of the Third international conference on Post-Quantum Cryptography, pp.108-125, 2010.
DOI : 10.1007/978-3-642-12929-2_9

P. Cayrel and P. Dusart, McEliece/Niederreiter PKC: Sensitivity to Fault Injection, 2010 5th International Conference on Future Information Technology, pp.1-6, 2010.
DOI : 10.1109/FUTURETECH.2010.5482663

URL : https://hal.archives-ouvertes.fr/hal-00602197

R. M. Avanzi, S. Hoerder, D. Page, and M. Tunstall, Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems, Journal of Cryptographic Engineering, vol.2, issue.4, pp.271-281, 2011.
DOI : 10.1007/s13389-011-0024-9

H. G. Molter, M. Stöttinger, A. Shoufan, and F. Strenzke, A simple power analysis attack on a McEliece cryptoprocessor, Journal of Cryptographic Engineering, vol.26, issue.5, pp.29-36, 2011.
DOI : 10.1007/s13389-011-0001-3

F. Strenzke, Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems, The 5th International Workshop on Post- Quantum Cryptography, 2013.
DOI : 10.1007/978-3-642-38616-9_15

C. Chen, T. Eisenbarth, I. Maurich, and R. Steinwandt, Differential Power Analysis of a McEliece Cryptosystem, Cryptology ePrint Archive, vol.534534, 2014.
DOI : 10.1007/978-3-319-28166-7_26

I. Maurich and T. Güneysu, Towards side-channel resistant implementations of QC-MDPC McEliece encryption on constrained devices, " in Post-Quantum Cryptography, ser, LNCS, M. Mosca, vol.8772, pp.266-282978, 2014.

V. D. Goppa, A new class of linear error-correcting codes, Problemy Peredachi Informatsii, vol.6, issue.3, pp.24-30, 1970.

E. R. Berlekamp, Goppa codes, IEEE Transactions on Information Theory, vol.19, issue.5, pp.590-592, 1973.
DOI : 10.1109/TIT.1973.1055088

N. J. Patterson, The algebraic decoding of Goppa codes, IEEE Transactions on Information Theory, vol.21, issue.2, pp.203-207, 1975.
DOI : 10.1109/TIT.1975.1055350

F. Strenzke, Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties, Journal of Cryptographic Engineering, vol.42, issue.44, pp.283-292, 2011.
DOI : 10.1007/s13389-011-0020-0

M. Petrvalsky, M. Drutarovsky, and M. Varchola, Differential power analysis attack on ARM based AES implementation without explicit synchronization Keysight (Agilent Technologies), " DSO9404A datasheet and product information Available: http://www.keysight.com/en/pd-1632456-pn-DSO9404A/oscilloscope- 4-ghz-4-analog-channels?&cc=SK&lc=eng [21] F The theory of error-correcting codes, Radioelektronika (RADIOELEKTRONIKA), 2014 24th International Conference, pp.1-4, 2006.

D. Bernstein, T. Lange, and C. Peters, Attacking and defending the mceliece cryptosystem, " in Post-Quantum Cryptography, ser. Lecture Notes in Computer Science, pp.31-46, 2008.