E. R. Berlekamp, R. J. Mceliece, C. A. Henk, and . Van-tilborg, On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978.
DOI : 10.1109/TIT.1978.1055873

F. Strenzke, E. Tews, H. G. Molter, R. Overbeck, and A. Shoufan, Side Channels in the McEliece PKC, The Second International Workshop on Post-Quantum Cryptography, pp.216-229, 2008.
DOI : 10.1007/978-3-540-46588-1_10

N. J. Patterson, The algebraic decoding of Goppa codes, IEEE Transactions on Information Theory, vol.21, issue.2, pp.203-207, 1975.
DOI : 10.1109/TIT.1975.1055350

A. Shoufan, F. Strenzke, H. G. Molter, and M. Stöttinger, A Timing Attack against Patterson Algorithm in the McEliece PKC, Proceedings of the 12th International Conference on Information, Security and Cryptology, pp.161-175, 2009.
DOI : 10.1007/978-3-642-14423-3_12

F. Strenzke, A Timing Attack against the Secret Permutation in the McEliece PKC, Proceedings of the Third international conference on Post-Quantum Cryptography, pp.95-107, 2010.
DOI : 10.1007/978-3-642-12929-2_8

R. M. Avanzi, S. Hoerder, D. Page, and M. Tunstall, Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems, Journal of Cryptographic Engineering, vol.2, issue.4, pp.271-281, 2011.
DOI : 10.1007/s13389-011-0024-9

F. Strenzke, Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems, The 5th International Workshop on Post-Quantum Cryptography Philippe Gaborit, pp.217-230, 2013.
DOI : 10.1007/978-3-642-38616-9_15

S. Heyse, A. Moradi, and C. Paar, Practical Power Analysis Attacks on Software Implementations of McEliece, Proceedings of the Third international conference on Post-Quantum Cryptography Nicolas Sendrier, pp.108-125, 2010.
DOI : 10.1007/978-3-642-12929-2_9

H. , G. Molter, M. Stöttinger, A. Shoufan, and F. Strenzke, A simple power analysis attack on a McEliece cryptoprocessor, Journal of Cryptographic Engineering, vol.1, issue.1, pp.29-36, 2011.

C. Chen, T. Eisenbarth, R. Ingo-von-maurich, and . Steinwandt, Differential Power Analysis of a McEliece Cryptosystem, Cryptology ePrint Archive, vol.534, 2014.
DOI : 10.1007/978-3-319-28166-7_26

G. Valerii-denisovich, A new class of linear errorcorrecting codes, Problemy Peredachi Informatsii, vol.6, issue.3, pp.24-30, 1970.

E. R. Berlekamp, Goppa codes, IEEE Transactions on Information Theory, vol.19, issue.5, pp.590-592, 1973.
DOI : 10.1109/TIT.1973.1055088

S. Microelectronics, STM32 product information, software and datasheets, 2015.

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, CHES, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

X. Zhou, J. Peng, and L. Guo, An improved AES masking method smartcard implementation for resisting DPA attacks, International Journal of Computer Science Issues (IJCSI), vol.10, issue.01, pp.118-122, 2013.

M. Rivain, E. Prouff, and J. Doget, Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers, Lecture Notes in Computer Science, vol.5747, pp.171-188, 2009.
DOI : 10.1007/978-3-642-04138-9_13