1. Avanzi, R., Hoerder, S., Page, D., Tunstall, M.: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. J. Cryptographic Eng. 1(4), 271–281 (2011)
2. Berlekamp, E., McEliece, R., van Tilborg, H.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)
3. Berlekamp, E., Seroussi, G., Po, T.: A hypersystolic reed–solomon decoder. In: Bhargava, V.K., Wicker, S.B., IEEE Communications Society, IEEE Information Theory Society (eds.) Reed-Solomon Codes and Their Applications, pp. 205–241. IEEE Press, Piscataway (1994)
4. Lecture Notes in Computer Science;DJ Bernstein,2013
5. Biswas, B.: Aspects de mise en oeuvre de la cryptographie basée sur les codes. These, Ecole Polytechnique X, October 2010