[[1] S. P. N. 984520, Secure Implementation of Post-Quantum Cryptography, 2013. http://147.175.106.232/nato/?q=node/27.]Search in Google Scholar
[[2] SHOR, P.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM review 41 No. 2 (1999), 303-332.10.1137/S0036144598347011]Search in Google Scholar
[[3] McELIECE, R. J.: A Public-Key Cryptosystem based on Algebraic Coding Theory, DSN Progress Report 42 No. 44 (1978), 114-116, http://www.cs.colorado.edu/~jrblack/class/ csci7000/f03/papers/mceliece.pdf.]Search in Google Scholar
[[4] BERLEKAMP, E.–McELIECE, R.–van TILBORG, H.: On the Inherent Intractability of Certain Coding Problems, IEEE Transactions on Information Theory 24 No. 3 (May 1978), 384-386.10.1109/TIT.1978.1055873]Search in Google Scholar
[[5] REPKA, M.–CAYREL, P.-L.: Multidisciplinary Perspectives in Cryptology and Information Security, IGI Global, Ch. Cryptography based on Error Correcting Codes: a Survey, 2014, pp. 133-156.]Search in Google Scholar
[[6] ZAJAC, P.: A Note on CCA2-Protected McEliece Cryptosys-tem with a Systematic Public Key, Cryptology ePrint Archive, Report 2014/651, 2014 http://eprint.iacr.org/.]Search in Google Scholar
[[7] OUZAN, S.–BE'ERY, Y.: Moderate-Density Parity-Check Codes, CoRR abs/0911.3262 (2009).]Search in Google Scholar
[[8] NIEDERREITER, H.: Knapsack-Type Cryptosystems and Algebraic Coding Theory, Problems of Control and Information Theory 15 No. 2 (1986), 159-166.]Search in Google Scholar
[[9] BISWAS, B.–SENDRIER, N.: Mceliece Cryptosystem Implementation: Theory and Practice, in PQCrypto, ser. LNCS (J. Buchmann and J. Ding, eds.), vol. 5299, Springer, 2008, pp. 47-62.]Search in Google Scholar
[[10] STRENZKE, F.: Efficiency and Implementation Security of Code-Based Cryptosystems, PhD dissertation, Universität Darmstadt, Germany, 2013.]Search in Google Scholar
[[11] HEYSE, S.–von MAURICH, I.–GÜNEYSU, T.: Smaller Keys for Code-Based Cryptography: Qc-mdpc Mceliece Implementations on Embedded Devices, in CHES, ser. LNCS (G. Bertoni and J.-S. Coron, eds.), vol. 8086, Springer, 2013, pp. 273-292. SHOUP, V.: Ntl: A Library for Doing Number Theory (version 6.0.0), February 2013. http://www.shoup.net/ntl/. FRIGO, M.–JOHNSON, S. G.: The Design and Implementation of FFTW3, Proceedings of the IEEE 93 No. 2 (2005), 216-231, Special Issue on Program Generation, Optimization, and Platform Adaptation. http://www.fftw.org/.]Search in Google Scholar
[[14] EISENBARTH, T.–GÜNEYSU, T.–HEYSE, S.–PAAR, C.: Microeliece: Mceliece for Embedded Devices, in CHES, ser. LNCS (C. Clavier and K. Gaj, eds.), vol. 5747, Springer, 2009, pp. 49-64.]Search in Google Scholar
[STRENZKE, F.: A Smart Card Implementation of the mceliece pkc, in The 4th IFIP WG 11.2, Proceedings, ser. WISTP'10, Springer-Verlag, Berlin, Heidelberg, 2010, pp. 47-59.10.1007/978-3-642-12368-9_4]Search in Google Scholar
[[16] CAYERL, P.-L.: Code Based Cryptography, 2012, http://cayrel.net/research/code-based-cryptography/ code-based-cryptosystems/.]Search in Google Scholar
[[17] HEYSE, S.–GÜNEYSU, T.: Towards One Cycle Per Bit Asymmetric Encryption: Code-Based Cryptography on Re-configurable Hardware, in CHES, ser. LNCS (E. Prouff and P. Schaumont, eds.), vol. 7428, Springer, 2012, pp. 340-355.]Search in Google Scholar
[[18] ENGELBERT, D.–OVERBECK, R.–SCHMIDT, A.: A Summary of Mceliece-Type Cryptosystems and their Security, J. Mathematical Cryptology 1 No. 2 (2007), 151-199.]Search in Google Scholar
[[19] SENDRIER, N. Ed.: PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings, ser. LNCS, vol. 6061, Springer, 2010.]Search in Google Scholar
[[20] STRENZKE, F.: A Timing Attack against the Secret Permutation in the Mceliece pkc, in PQCrypto ser. LNCS (N. Sendrier, eds.), vol. 6061, Springer, 2010, pp. 95-107.]Search in Google Scholar
[[21] STRENZKE, F.: Timing Attacks Against the Syndrome Inversion in Code-Based Cryptosystems, in PQCrypto, ser. LNCS (P. Gaborit, ed.), vol. 7932, Springer, 2013, pp. 217-230.]Search in Google Scholar
[[22] STRENZKE, F.–TEWS, E.–MOLTER,H. G.–OVERBECK, R.–SHOUFAN, A.: Side Channels in the Mceliece pkc, in PQCrypto, ser. LNCS (J. Buchmann and J. Ding, eds.), vol. 5299, Springer, 2008, pp. 216-229.]Search in Google Scholar
[[23] GOPPA, V. D.: A New Class of Linear Error Correcting Codes, Probl. Pered. Inform. 6 (Sep 1970), 24-30.]Search in Google Scholar
[[24] ZAJAC, P.–JOKAY, M.: Computing Indexes and Periods of All Boolean Matrices up to Dimension n = 8, Computing and Informatics 31 No. 6 (2013), 1329-1344.]Search in Google Scholar
[[25] SEDGEWICK, R.: Permutation Generation Methods, ACM Comput. Surv. 9 No. 2 (June 1977), 137-164, http://doi.acm.org/10.1145/356689.356692.10.1145/356689.356692]Search in Google Scholar
[[26] KOBARA, K.–IMAI, H.: Semantically Secure Mceliece Public-Key Cryptosystems-Conversions for Mceliece pkc, in Public Key Cryptography, ser. LNCS (K. Kim, ed.), vol. 1992, Springer, 2001, pp. 19-35.]Search in Google Scholar
[[27] ZAJAC, P.: A New Method to Solve mrhs Equation Systems and its Connection to Group Factorization, J. Mathematical Cryptology 7 No. 4 (2013), 367-381.]Search in Google Scholar
[[28] PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings, ser. LNCS (J. Buchmann and J. Ding, eds.), vol. 5299, Springer, 2008.]Search in Google Scholar