1. M.L. Akkar, N. Courtois, L. Goubin, R. Duteuil, A fast and secure implementation of Sflash, in PKC’03. LNCS, vol. 2567 (2003), pp. 267–278
2. R.M. Avanzi, S. Hoerder, D. Page, M. Tunstall, Side-channel attacks on the McEliece and Niederreiter public-ky cryptosystems. J. Crypt. Eng. 1, 271–281 (2011)
3. G.V. Bard, Algebraic Cryptanalysis (Springer, Dordrecht, 2009)
4. G.V. Bard, N.T. Courtois, C. Jefferson, Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over
$$GF(2)$$
via SAT-Solvers,
https://eprint.iacr.org/2007/024.pdf
5. M. Bardet, J.C. Faugère, B. Salvy, B.Y. Yang, Asymptotic expansion of the degree of regularity for semi-regular systems of equations, in MEGA’05 (2005)