1. Avanzi, R.: Another look at square roots (and other less common operations) in fields of even characteristic. In: Proceedings of SAC 2007. LNCS, vol. 4876, pp. 138–154. Springer. Berlin (2007)
2. Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: Proceedings of PQCrypto 2008. LNCS, vol. 5299, pp. 31–46, Springer, Berlin 2008. See also: Cryptology ePrint Archive, Report 2008/318 (2008). http://eprint.iacr.org/2008/318.pdf
3. Biswas, B., Sendrier, N.: McEliece cryptosystem implementation: theory and practice. In: Proceedings of PQCrypto 2008. LNCS, vol. 5299, pp. 47–62. Springer, Heidelberg (2008)
4. Courtois, N., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital signature scheme. Cryptology ePrint Archive, Report 2001/010 (2001). http://eprint.iacr.org/2001/010.pdf
5. Eisenbarth, T., Güneysu, T., Heyse, S., Paar, C.: MicroEliece: McEliece for embedded devices. In: Cryptographic Hardware and Embedded Systems (CHES), LNCS, vol. 5747, pp. 49–64. Springer, Berlin (2009)