VII. CONCLUSIONS AND PERSPECTIVES
Code-based cryptography became one of the most promising post-quantum security solutions. It is a dynamic field, especially because of the NIST’s standardization. However, the community needs to be aware of several weaknesses, that are theoretical as well as physical. The mathematical problems in code-based cryptography are well known. Depending on the chosen code, the first issue is to distinguish it from a random code. On one hand, message recovery attacks are mainly based on the information decoding problem. On the other hand, key recovery attacks are much difficult to classify, by their various methods, but much more efficient from the attacker point of view. Side-channel analysis must be performed on digital signature schemes and key-establishment algorithms. These schemes are the most deployed in real-world. Side-channel analysis should also be improved on public-key encryption.