1. P. Shor, "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer", SIAM Journal on Computing, vol. 26, no. 5, pp. 1484-1509, 1997. [
DOI:10.1137/S0097539795293172]
2. S. Heyse, "Post-quantum cryptography: Implementing alternative public key schemes on embedded devices", PhD thesis, Ruhr-University Bochum, 2013.
3. R. McEliece, "A Public-Key Cryptosystem Based On Algebraic Coding Theory", Deep Space Network Progress Report, vol. 44, pp. 114-116, 1978.
4. T. Berson, "Failure of the McEliece public-key cryptosystem under message-resend and related-message attack", Advances in Cryptology - CRYPTO '97, pp. 213-220, 1997. [
DOI:10.1007/BFb0052237]
5. R. Misoczki, J. Tillich, N. Sendrier and P. Barreto, "MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes", IEEE International Symposium on Information Theory, 2013. [
DOI:10.1109/ISIT.2013.6620590]
6. S. Mangard, E. Oswald and T. Popp, Power analysis attacks: Revealing the secrets of smart cards, Springer US, 2008.
7. حامد یوسفی، محمود گردشی، محمد سبزینژاد، «پیاده سازی حملۀ تحلیل توان ساده به الگوریتم AES روی میکروکنترلر PIC»، پردازش علائم و دادهها، دورة ۹، شمارة ۱، 1391.
8. P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis", Advances in Cryptology - CRYPTO' 99, pp. 388-397, 1999. [
DOI:10.1007/3-540-48405-1_25]
9. E. Brier, C. Clavier and F. Olivier, "Correlation Power Analysis with a Leakage Model", Lecture Notes in Computer Science, pp. 16-29, 2004. [
DOI:10.1007/978-3-540-28632-5_2]
10. M. Masoumi and M. Ahmadian, "A practical differential power analysis attack against an FPGA implementation of AES cryptosystem", Ieeexplore.ieee.org, 2010. [Online]. Available: https://ieeexplore.ieee.org/document/6018719. [Accessed: 13- Jan- 2020].
11. P. Kocher, "Design and validation strategies for obtaining assurance in countermeasures to power analysis and related attacks", Proceedings of the NIST Physical Security Workshop, 2005.
12. Y. Ishai, A. Sahai and D. Wagner, "Private Circuits: Securing Hardware against Probing Attacks", Advances in Cryptology - CRYPTO 2003, pp. 463-481, 2003. [
DOI:10.1007/978-3-540-45146-4_27]
13. I. von Maurich and T. Güneysu, "Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices", Post-Quantum Cryptography, pp. 266-282, 2014. [
DOI:10.1007/978-3-319-11659-4_16]
14. C. Chen, T. Eisenbarth, I. von Maurich and R. Steinwandt, "Masking Large Keys in Hardware: A Masked Implementation of McEliece", Lecture Notes in Computer Science, pp. 293-309, 2016. [
DOI:10.1007/978-3-319-31301-6_18]
15. C. Chen, T. Eisenbarth, I. von Maurich and R. Steinwandt, "Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem", IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1093-1105, 2016. [
DOI:10.1109/TIFS.2015.2509944]
16. S. Belaïd, F. Benhamouda, A. Passelègue, E. Prouff, A. Thillard and D. Vergnaud, "Private Multiplication over Finite Fields", Advances in Cryptology - CRYPTO 2017, pp. 397-426, [
DOI:10.1007/978-3-319-63697-9_14]