R. J. Mceliece, A public-key cryptosystem based on algebraic coding theory, California Inst. Technol, 1978.

P. C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Lecture Notes in Computer Science, vol.1109, pp.104-113, 1996.
DOI : 10.1007/3-540-68697-5_9

F. Strenzke, E. Tews, H. G. Molter, R. Overbeck, and A. Shoufan, Side Channels in the McEliece PKC, The Second International Workshop on Post-Quantum Cryptography, pp.216-229, 2008.
DOI : 10.1007/978-3-540-46588-1_10

A. Shoufan, F. Strenzke, H. G. Molter, and M. Stöttinger, A Timing Attack against Patterson Algorithm in the McEliece PKC, Proceedings of the 12th International Conference on Information, pp.161-175, 2010.
DOI : 10.1007/978-3-642-14423-3_12

F. Strenzke, A Timing Attack against the Secret Permutation in the McEliece PKC, Proceedings of the Third international conference on Post-Quantum Cryptography, pp.95-107, 2010.
DOI : 10.1007/978-3-642-12929-2_8

S. Heyse, A. Moradi, and C. Paar, Practical Power Analysis Attacks on Software Implementations of McEliece, Proceedings of the Third international conference on Post-Quantum Cryptography ser. Lecture Notes in Computer Science (LNCS), N. Sendrier, pp.108-125, 2010.
DOI : 10.1007/978-3-642-12929-2_9

P. Cayrel and P. Dusart, McEliece/Niederreiter PKC: Sensitivity to Fault Injection, 2010 5th International Conference on Future Information Technology, pp.1-6, 2010.
DOI : 10.1109/FUTURETECH.2010.5482663

URL : https://hal.archives-ouvertes.fr/hal-00602197

R. M. Avanzi, S. Hoerder, D. Page, and M. Tunstall, Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems, Journal of Cryptographic Engineering, vol.2, issue.4, pp.271-281, 2011.
DOI : 10.1007/s13389-011-0024-9

H. G. Molter, M. Stöttinger, A. Shoufan, and F. Strenzke, A simple power analysis attack on a McEliece cryptoprocessor, Journal of Cryptographic Engineering, vol.26, issue.5, pp.29-36, 2011.
DOI : 10.1007/s13389-011-0001-3

F. Strenzke, Fast and Secure Root Finding for Code-Based Cryptosystems, Cryptology and Network Security, ser. Lecture Notes in Computer Science, pp.232-246, 2012.
DOI : 10.1007/978-3-642-35404-5_18

P. Gaborit, E. Berlin, and . Heidelberg, Timing attacks against the syndrome inversion in code-based cryptosystems, The 5th International Workshop on Post-Quantum Cryptography ser. Lecture Notes in Computer Science (LNCS), pp.217-230978, 2011.

C. Chen, T. Eisenbarth, I. Maurich, and R. Steinwandt, Differential Power Analysis of a McEliece Cryptosystem, Cryptology ePrint Archive, vol.534534, 2014.
DOI : 10.1007/978-3-319-28166-7_26

I. Maurich and T. Güneysu, Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices, Lecture Notes in Computer Science, vol.8772, pp.266-282978, 2014.
DOI : 10.1007/978-3-319-11659-4_16

V. D. Goppa, A new class of linear error-correcting codes, Problemy Peredachi Informatsii, vol.6, issue.3, pp.24-30, 1970.

E. R. Berlekamp, Goppa codes, IEEE Transactions on Information Theory, vol.19, issue.5, pp.590-592, 1973.
DOI : 10.1109/TIT.1973.1055088

N. J. Patterson, The algebraic decoding of Goppa codes, IEEE Transactions on Information Theory, vol.21, issue.2, pp.203-207, 1975.
DOI : 10.1109/TIT.1975.1055350

F. Strenzke, Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties, Journal of Cryptographic Engineering, vol.42, issue.44, pp.283-292, 2011.
DOI : 10.1007/s13389-011-0020-0