@ARTICLE{cgUCL-DMPRGLPB19,
 	AUTHOR={De Coninck, Quentin and Michel, François and Piraux, Maxime and Rochet, Florentin and Given-Wilson, Thomas and Legay, Axel and Pereira, Olivier and Bonaventure, Olivier},
	TITLE={{Pluginizing QUIC}},
	PUBLISHER={ACM},
	JOURNAL={Proceedings of the 2019 Conference of the {ACM} Special Interest Group on Data Communication (SIGCOMM) 2019},
	MONTH={8},
	YEAR={2019},
}

@ARTICLE{cgUCL-RBP19,
 	AUTHOR={Rochet, Florentin and Bonaventure, Olivier and Pereira, Olivier},
	TITLE={{Flexible Anonymous Network}},
	JOURNAL={12th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2019)},
	MONTH={7},
	YEAR={2019},
}

@ARTICLE{cgUCL-CELPT19,
 	AUTHOR={Culnane, Chris and Essex, Aleksander and Lewis, Sarah Jamie and Pereira, Olivier and Teague, Vanessa},
	TITLE={{Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud}},
	PUBLISHER={IEEE},
	JOURNAL={IEEE Security and Privacy Magazine},
	VOLUME={17},
	PAGES={62--70},
	MONTH={7},
	YEAR={2019},
}

@ARTICLE{cgUCL-REKP19,
 	AUTHOR={Rochet, Florentin and Efthymiadis, Kyriakos and Koeune, François and Pereira, Olivier},
	TITLE={{SWAT: Seamless Web Authentication Technology}},
	PUBLISHER={ACM},
	JOURNAL={Proceedings of the 2019 World Wide Web Conference (WWW’19)},
	MONTH={5},
	YEAR={2019},
}

@INPROCEEDINGS{cgUCL-PR19,
 	AUTHOR={Pereira, Olivier and Roenne, Peter},
	TITLE={{End-to-End Verifiable Quadratic Voting with Everlasting Privacy}},
	BOOKTITLE={4th Workshop on Advances in Secure Electronic Voting},
	PUBLISHER={Springer Verlag},
	SERIES={Lecture Notes in Computer Science},
	MONTH={2},
	YEAR={2019},
}

@INPROCEEDINGS{cgUCL-CPRT19,
 	AUTHOR={Culnane, Chris and Pereira, Olivier and Ramchen, Kim and Teague, Vanessa},
	TITLE={{Universally Verifiable MPC and IRV Ballot Counting}},
	BOOKTITLE={Financial Cryptography and Data Security 2019 },
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	MONTH={2},
	YEAR={2019},
}

@ARTICLE{cgUCL-RP18,
 	AUTHOR={Rochet, Florentin and Pereira, Olivier},
	TITLE={{Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols}},
	PUBLISHER={DE GRUYTER OPEN},
	EDITOR={Proceedings on Privacy Enhancing Technologies Symposium},
	JOURNAL={PoPETs},
	MONTH={7},
	YEAR={2018},
}

@ARTICLE{cgUCL-CCKLLPS18,
 	AUTHOR={Canetti, Ran and Cheung, Ling and Kaynar, Dilsun and Liskov, Moses and Lynch, Nancy and Pereira, Olivier and Segala, Roberto},
	TITLE={{Task-structured probabilistic I/O automata}},
	PUBLISHER={Elsevier},
	JOURNAL={Journal of Computer and System Sciences},
	VOLUME={94},
	PAGES={63-97},
	MONTH={6},
	YEAR={2018},
}

@INPROCEEDINGS{cgUCL-PW17,
 	AUTHOR={Pereira, Olivier and Wallach, Dan},
	TITLE={{Clash attacks and the STAR-Vote system}},
	BOOKTITLE={E-Vote-ID 2017},
	PUBLISHER={Springer},
	SERIES={LNCS},
	PAGES={19},
	MONTH={10},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-PRW17,
 	AUTHOR={Pereira, Olivier and Rochet, Florentin and Wiedling, Cyrille},
	TITLE={{Formal Analysis of the Fido 1.x Protocol}},
	PUBLISHER={Springer},
	EDITOR={The 10th International Symposium on Foundations & Practice of Security},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={10},
	YEAR={2017},
}

@ARTICLE{cgUCL-PBPS17,
 	AUTHOR={Pereira, Olivier and Berti, Francesco and Peters, Thomas and Standaert, François-Xavier},
	TITLE={{On Leakage-Resilient Authenticated Encryption with Decryption Leakages}},
	PUBLISHER={IACR},
	JOURNAL={IACR Transactions on Symmetric Cryptology},
	VOLUME={3},
	PAGES={271-293},
	MONTH={9},
	YEAR={2017},
}

@ARTICLE{cgUCL-RP17,
 	AUTHOR={Rochet, Florentin and Pereira, Olivier},
	TITLE={{Waterfilling: Balancing the Tor network with maximum diversity}},
	JOURNAL={Proceedings on Privacy Enhancing Technologies},
	VOLUME={2017},
	MONTH={7},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-JTPB17,
 	AUTHOR={Jadin, Mathieu and Tihon, Gautier and Pereira, Olivier and Bonaventure, Olivier},
	TITLE={{Securing MultiPath TCP: Design & Implementation}},
	BOOKTITLE={IEEE INFOCOM 2017},
	PUBLISHER={IEEE},
	MONTH={5},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-PR17,
 	AUTHOR={Pereira, Olivier and Rivest, Ronald},
	TITLE={{Marked Mix-Nets}},
	BOOKTITLE={Voting'17},
	PUBLISHER={Spinger},
	SERIES={LNCS},
	MONTH={4},
	YEAR={2017},
}

@INBOOK{cgUCL-P16,
 	AUTHOR={Pereira, Olivier},
	TITLE={{Internet Voting with Helios}},
	BOOKTITLE={Real-World Electronic Voting: Design, Analysis and Deployment},
	PUBLISHER={CRC Press},
	EDITOR={Feng Hao and Peter Y. A. Ryan},
	PAGES={277-308},
	MONTH={12},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-CP16,
 	AUTHOR={Cuvelier, Édouard and Pereira, Olivier},
	TITLE={{Verifiable Multi-Party Computation with Perfectly Private Audit Trail}},
	BOOKTITLE={14th International Conference on Applied Cryptography and Network Security},
	PUBLISHER={Springer},
	EDITOR={Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={9696},
	MONTH={6},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-PSV15,
 	AUTHOR={Pereira, Olivier and Standaert, François-Xavier and Vivek, Srinivas},
	TITLE={{Leakage-Resilient Authentication and Encryption from Symmetric Primitives}},
	BOOKTITLE={Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
	PUBLISHER={ACM},
	PAGES={96-108},
	MONTH={10},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-BCGPW15,
 	AUTHOR={Bernhard, David and Cortier, Veronique and Galindo, David and Pereira, Olivier and Warinschi, Bogdan},
	TITLE={{SoK: A comprehensive analysis of game-based ballot privacy definitions}},
	BOOKTITLE={IEEE Symposium on Security and Privacy 2015},
	PUBLISHER={IEEE Computer Society},
	MONTH={5},
	YEAR={2015},
}

@ARTICLE{cgUCL-P14,
 	AUTHOR={Pereira, Olivier},
	TITLE={{Verifiable Elections with Commitment Consistent Encryption - A Primer}},
	BOOKTITLE={abs/1412.7358},
	JOURNAL={CoRR},
	NOTE={http://arxiv.org/abs/1412.7358},
	MONTH={12},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-CP14,
 	AUTHOR={Cuvelier, Édouard and Pereira, Olivier},
	TITLE={{Multi-Party Function Evaluation with Perfectly Private Audit Trail}},
	MONTH={12},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-PP13,
 	AUTHOR={Palmieri, Paolo and Pereira, Olivier},
	TITLE={{Unconditionally Secure Oblivious Transfer from Real Network Behavior}},
	BOOKTITLE={8th International Workshop on Security, IWSEC2013},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={8231},
	PAGES={168--182},
	MONTH={11},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-CPP13,
 	AUTHOR={Cuvelier, Édouard and Pereira, Olivier and Peters, Thomas},
	TITLE={{Election Verifiability or Ballot Privacy : Do We Need to Choose?}},
	BOOKTITLE={Computer Security – ESORICS 2013},
	PUBLISHER={Springer Berlin Heidelberg},
	EDITOR={Crampton, Jason and Jajodia, Sushil and Mayes, Keith},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={8134},
	PAGES={481-498},
	MONTH={9},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-SPY13,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu},
	TITLE={{Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions}},
	BOOKTITLE={Advances in Cryptology – CRYPTO 2013 },
	SERIES={Lecture Notes in Computer Science},
	PAGES={335--352},
	NOTE={Full version from http://eprint.iacr.org/2013/370},
	MONTH={8},
	YEAR={2013},
}

@ARTICLE{cgUCL-BBBDEFKMMPPSWW13,
 	AUTHOR={Bell, Susan and Benaloh, Josh and Byrne, Mike and DeBeauvoir, Dana and Eakin, Bryce and Fischer, Gail and Kortum, Philip and McBurnett, Neal and Montoya, Julian and Parker, Michelle and Pereira, Olivier and Stark, Philip and Wallach, Dan and Winn, Michael},
	TITLE={{STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System}},
	PUBLISHER={Usenix},
	JOURNAL={USENIX Journal of Election Technology and Systems (JETS)},
	VOLUME={1},
	PAGES={18--37},
	MONTH={8},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-ACMPV13,
 	AUTHOR={Aly, Abdelrahaman and Cuvelier, Édouard and Mawet, Sophie and Pereira, Olivier and Vanvyve, Mathieu},
	TITLE={{Securly Solving Simple Combinatorial Graph Problems}},
	BOOKTITLE={Financial Cryptography and Data Security 2013},
	PUBLISHER={Springer Berlin Heidelberg},
	EDITOR={Sadeghi, Ahmad-Reza},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={7859},
	PAGES={239-257},
	MONTH={4},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-BPW12,
 	AUTHOR={Bernhard, David and Pereira, Olivier and Warinschi, Bogdan},
	TITLE={{How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios}},
	BOOKTITLE={ASIACRYPT 2012},
	PUBLISHER={Springer},
	EDITOR={X. Wang and K. Sako},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={7658},
	PAGES={626--643},
	MONTH={12},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-BCPW12,
 	AUTHOR={Bernhard, David and Cortier, Veronique and Pereira, Olivier and Warinschi, Bogdan},
	TITLE={{Measuring vote privacy, revisited}},
	BOOKTITLE={ACM Conference on Computer and Communications Security},
	PUBLISHER={ACM},
	EDITOR={Ting Yu and George Danezis and Virgil D. Gligor},
	PAGES={941-952},
	MONTH={10},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-PP11,
 	AUTHOR={Palmieri, Paolo and Pereira, Olivier},
	TITLE={{Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering}},
	BOOKTITLE={14th International Conference on Information Security and Cryptology (ICISC 2011)},
	PUBLISHER={Springer},
	EDITOR={Howon Kim},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={7259},
	PAGES={332–345},
	MONTH={12},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-HDP11,
 	AUTHOR={Haustenne, Laurie and De Neyer, Quentin and Pereira, Olivier},
	TITLE={{Elliptic Curve Cryptography in JavaScript}},
	BOOKTITLE={ECRYPT Workshop on Lightweight Cryptography},
	EDITOR={G. Leander and F.-X. Standaert},
	MONTH={11},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-PP11,
 	AUTHOR={Palmieri, Paolo and Pereira, Olivier},
	TITLE={{Secure Two-Party Computation Over a Z-Channel}},
	BOOKTITLE={ProvSec 2011},
	PUBLISHER={Springer},
	EDITOR={X. Boyen and X. Chen},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6980},
	PAGES={3-15},
	MONTH={10},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BCPSW11,
 	AUTHOR={Bernhard, David and Cortier, Veronique and Pereira, Olivier and Smyth, Ben and Warinschi, Bogdan},
	TITLE={{Adapting Helios for provable ballot privacy}},
	BOOKTITLE={Computer Security – ESORICS 2011},
	PUBLISHER={Springer},
	EDITOR={Vijay Atluri, Claudia Diaz},
	SERIES={Lecture Notes in Computer Science},
	MONTH={9},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BDKPPSY11,
 	AUTHOR={Barak, Boaz and Dodis, Yevgeniy and Krawczyk, Hugo and Pereira, Olivier and Pietrzak, Krzysztof and Standaert, François-Xavier and Yu, Yu},
	TITLE={{Leftover Hash Lemma, Revisited}},
	BOOKTITLE={Advances in Cryptology - CRYPTO 2011},
	PUBLISHER={Springer-Verlag},
	EDITOR={Phillip Rogaway},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6841},
	PAGES={1-20},
	MONTH={8},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BGP11,
 	AUTHOR={Bulens, Philippe and Giry, Damien and Pereira, Olivier},
	TITLE={{Running Mixnet-Based Elections with Helios}},
	BOOKTITLE={Electronic Voting Technology Workshop/Workshop on Trustworthy Elections},
	PUBLISHER={Usenix},
	EDITOR={H. Shacham and V. Teague},
	MONTH={8},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-P11,
 	AUTHOR={Pereira, Olivier},
	TITLE={{Leakage-resilient Stream Ciphers: an Overview}},
	BOOKTITLE={2011 Grande Region Security and Reliability Day},
	EDITOR={Ralf Küsters, Michaël Rusinowitch},
	MONTH={3},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-CCDP10,
 	AUTHOR={Canard, Sébastien and Coisel, Iwen and de Meulenaer, Giacomo and Pereira, Olivier},
	TITLE={{Group Signatures are Suitable for Constrained Devices}},
	BOOKTITLE={ICISC 2010},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={12},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-MPP10,
 	AUTHOR={Mawet, Sophie and Pereira, Olivier and Petit, Christophe},
	TITLE={{Equitable cake cutting without mediator}},
	BOOKTITLE={5th Benelux Workshop on Information and System Security},
	EDITOR={Svetla Nikova and Lejla Batina},
	MONTH={11},
	YEAR={2010},
}

@INBOOK{cgUCL-SPYQYO10,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu and Quisquater, Jean-Jacques and Yung, Moti and Oswald, Elisabeth},
	TITLE={{Leakage Resilient Cryptography in Practice}},
	BOOKTITLE={Towards Hardware Intrinsic Security: Foundation and Practice},
	PUBLISHER={Springer},
	PAGES={105-139},
	MONTH={11},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-PP10,
 	AUTHOR={Palmieri, Paolo and Pereira, Olivier},
	TITLE={{Building Oblivious Transfer on Channel Delays}},
	BOOKTITLE={6th China International Conference on Information Security and Cryptology (Inscrypt 2010)},
	PUBLISHER={Springer},
	EDITOR={X. Lai, M. Yung and D. Lin},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6584},
	PAGES={125-138},
	MONTH={10},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-YSPY10,
 	AUTHOR={Yu, Yu and Standaert, François-Xavier and Pereira, Olivier and Yung, Moti},
	TITLE={{Practical leakage-resilient pseudorandom generators}},
	BOOKTITLE={Proceedings of the 17th ACM conference on Computer and communications security},
	PUBLISHER={ACM},
	PAGES={141--151},
	MONTH={10},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-AP10,
 	AUTHOR={Adida, Ben and Pereira, Olivier},
	TITLE={{State of Helios 2010: features and deployments}},
	BOOKTITLE={EVT/WOTE'10 -- Rump Session Talk},
	MONTH={8},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-DKP09,
 	AUTHOR={Delaune, Stephanie and Kremer, Steve and Pereira, Olivier},
	TITLE={{Simulation based security in the applied pi calculus}},
	BOOKTITLE={Foundations of Software Technology and Theoretical Computer Science - FSTTCS 2009},
	EDITOR={R. Kannan and K. Kumar},
	SERIES={Leibniz International Proceedings in Informatics},
	MONTH={12},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-ADPQ09,
 	AUTHOR={Adida, Ben and de Marneffe, Olivier and Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios}},
	BOOKTITLE={Electronic Voting Technology Workshop/Workshop on Trustworthy Elections},
	PUBLISHER={Usenix},
	EDITOR={D. Jefferson, J.L. Hall, T. Moran},
	MONTH={8},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-PP09,
 	AUTHOR={Palmieri, Paolo and Pereira, Olivier},
	TITLE={{Building Oblivious Transfer from communication delays}},
	BOOKTITLE={30-th Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-KAKSP08,
 	AUTHOR={Kim, Chong Hee and Avoine, Gildas and Koeune, François and Standaert, François-Xavier and Pereira, Olivier},
	TITLE={{The Swiss-Knife RFID Distance Bounding Protocol}},
	BOOKTITLE={The 11th International Conference on Information Security and Cryptology - ICISC 2008},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5461},
	PAGES={98-115},
	MONTH={12},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-GMPSS08,
 	AUTHOR={Gajek, Sebastian and Manulis, Mark and Pereira, Olivier and Sadeghi, Ahmad-Reza and Schwenk, Joerg},
	TITLE={{Universally Composable Security Analysis of TLS}},
	BOOKTITLE={2nd International Conference on Provable Security (ProvSec 2008)},
	PUBLISHER={Springer},
	SERIES={LNCS},
	VOLUME={5324},
	PAGES={313-327},
	MONTH={10},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-DGSP08,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Standaert, François-Xavier and Pereira, Olivier},
	TITLE={{On the Energy Cost of Communications and Cryptography in Wireless Sensor Networks}},
	BOOKTITLE={(extended version), IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob'2008)},
	JOURNAL={IEEE International Conference on Wireless & Mobile Computing, Networking & Communication},
	PAGES={580-585},
	MONTH={10},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-CCKLP08,
 	AUTHOR={Canetti, Ran and Cheung, Ling and Kaynar, Dilsun and Lynch, Nancy and Pereira, Olivier},
	TITLE={{Modeling Computational Security in Long-Lived Systems}},
	BOOKTITLE={CONCUR 2008 - Concurrency Theory},
	PUBLISHER={Springer},
	EDITOR={van Breugel, Franck; Chechik, Marsha},
	SERIES={LNCS},
	VOLUME={5201},
	MONTH={8},
	YEAR={2008},
}

@ARTICLE{cgUCL-AP08,
 	AUTHOR={Adida, Ben and Pereira, Olivier},
	TITLE={{Proceedings of WOTE 2008 -- IAVoSS Workshop On Trustworthy Elections }},
	MONTH={7},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-PSPMY08,
 	AUTHOR={Petit, Christophe and Standaert, François-Xavier and Pereira, Olivier and Malkin, Tal G. and Yung, Moti},
	TITLE={{A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery}},
	BOOKTITLE={ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security},
	PUBLISHER={ACM},
	EDITOR={M. Abe and V. Gligor},
	PAGES={56--65},
	MONTH={3},
	YEAR={2008},
}

@ARTICLE{cgUCL-PLLKCSC08,
 	AUTHOR={Pereira, Olivier and Lynch, Nancy and Liskov, Moses and Kaynar, Dilsun and Cheung, Ling and Segala, Roberto and Canetti, Ran},
	TITLE={{Analyzing Security Protocols Using Time-Bounded Task-PIOAs}},
	PUBLISHER={Springer},
	EDITOR={Xi-Ren Cao},
	JOURNAL={Discrete Event Dynamic Systems},
	VOLUME={18},
	PAGES={111-159},
	MONTH={3},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-DPQ07,
 	AUTHOR={de Marneffe, Olivier and Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Simulation-Based Analysis of E2E Voting Systems}},
	BOOKTITLE={Proceedings of the First Conference on E-Voting and Identity (VOTE-ID 2007)},
	PUBLISHER={Springer},
	EDITOR={A. Alkassar and M. Volkamer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4896},
	PAGES={137-149},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-CCKLP07,
 	AUTHOR={Canetti, Ran and Cheung, Ling and Kaynar, Dilsun and Lynch, Nancy and Pereira, Olivier},
	TITLE={{Compositional Security for Task-PIOAs}},
	BOOKTITLE={Proceedings of the 20th IEEE Computer Security Foundations Symposium},
	PUBLISHER={IEEE Computer Society Press},
	EDITOR={A. Sabelfeld},
	PAGES={125-139},
	MONTH={7},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-AP07,
 	AUTHOR={Araragi, Tadashi and Pereira, Olivier},
	TITLE={{Automatic Verification of Simulatability in Security Protocols}},
	BOOKTITLE={Workshop on Formal and Computational Cryptography - FCC 2007},
	EDITOR={M. Backes and Y. Lakhnech},
	NOTE={To appear},
	MONTH={7},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-CCLP07,
 	AUTHOR={Canetti, Ran and Cheung, Ling and Lynch, Nancy and Pereira, Olivier},
	TITLE={{On the Role of Scheduling in Simulation-Based Security}},
	BOOKTITLE={Proceedings of the 7th International Workshop on Issues in the Theory of Security (WITS 2007)},
	EDITOR={R. Focardi},
	PAGES={22--37},
	MONTH={3},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-CCKLLPS06,
 	AUTHOR={Canetti, Ran and Cheung, Ling and Kaynar, Dilsun and Liskov, Moses and Lynch, Nancy and Pereira, Olivier and Segala, Roberto},
	TITLE={{Time-bounded Task-PIOAs: A Framework for Analyzing Security Protocols}},
	BOOKTITLE={20th International Symposium on Distributed Computing (DISC 2006)},
	PUBLISHER={Springer},
	EDITOR={S. Dolev},
	SERIES={LNCS},
	VOLUME={4167},
	PAGES={238--253},
	NOTE={Invited paper},
	MONTH={9},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-CCKLLPS06,
 	AUTHOR={Canetti, Ran and Cheung, Ling and Kaynar, Dilsun and Liskov, Moses and Lynch, Nancy and Pereira, Olivier and Segala, Roberto},
	TITLE={{Formal and computational analysis of cryptographic protocols based on task-PIOAs}},
	BOOKTITLE={2006 Workshop on Cryptography and Related Mathematics},
	EDITOR={Tsutomu Sekiguchi},
	JOURNAL={Chuo University, Tokyo, Japan},
	PAGES={151--158},
	MONTH={8},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-CCKLLPS06,
 	AUTHOR={Canetti, Ran and Cheung, Ling and Kaynar, Dilsun and Liskov, Moses and Lynch, Nancy and Pereira, Olivier and Segala, Roberto},
	TITLE={{Task-Structured Probabilistic I/O Automata}},
	BOOKTITLE={Proceedings the 8th International Workshop on Discrete Event Systems (WODES'06)},
	PUBLISHER={IEEE},
	PAGES={207-214},
	MONTH={7},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-CCKLLPS06,
 	AUTHOR={Canetti, Ran and Cheung, Ling and Kaynar, Dilsun and Liskov, Moses and Lynch, Nancy and Pereira, Olivier and Segala, Roberto},
	TITLE={{Using Task-Structured Probabilistic I/O Automata to Analyze Cryptographic Protocols}},
	BOOKTITLE={Workshop on Formal and Computational Cryptography - FCC 2006},
	EDITOR={V. Cortier, S. Kremer},
	PAGES={34--39},
	MONTH={7},
	YEAR={2006},
}

@ARTICLE{cgUCL-PQ06,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{On the Impossibility of Building Secure Cliques-type Authenticated Group Key Agreement Protocols}},
	PUBLISHER={IOS Press},
	EDITOR={R. Focardi},
	JOURNAL={Journal of Computer Security},
	VOLUME={14},
	PAGES={197-246},
	MONTH={5},
	YEAR={2006},
}

@ARTICLE{cgUCL-CKCLLPS05,
 	AUTHOR={Canetti, Ran and Kaynar, Dilsun and Cheung, Ling and Liskov, Moses and Lynch, Nancy and Pereira, Olivier and Segala, Roberto},
	TITLE={{Using Probabilistic I/O Automata to Improve the Analysis of Cryptographic Protocols.}},
	BOOKTITLE={Special: Security and Trust Management},
	JOURNAL={ERCIM News},
	PAGES={40--41},
	MONTH={10},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-PQ04,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols}},
	BOOKTITLE={Proceedings of the 17-th IEEE Computer Security Foundations Workshop -- CSFW-17},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={16-29},
	MONTH={6},
	YEAR={2004},
}

@CGREPORT{cgUCL-PQ03,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{An attack against Barua et al. authenticated group key agreement protocol}},
	MONTH={10},
	YEAR={2003},
}

@ARTICLE{cgUCL-PQ03,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Some attacks upon authenticated group key agreement protocols}},
	PUBLISHER={IOSPress},
	JOURNAL={Journal of Computer Security},
	VOLUME={11},
	PAGES={555-580},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-BCPPQ02,
 	AUTHOR={Bresson, Emmanuel and Chevassut, Olivier and Pereira, Olivier and Pointcheval, David and Quisquater, Jean-Jacques},
	TITLE={{Two Formal Views of Authenticated Group Diffie-Hellman Key Exchange}},
	BOOKTITLE={DIMACS Workshop on Cryptographic Protocols in Complex Environments},
	MONTH={5},
	YEAR={2002},
}

@ARTICLE{cgUCL-PW01,
 	AUTHOR={Pereira, Olivier and Wolsey, Laurence},
	TITLE={{On the Wagner-Whitin lot-sizing polyhedron}},
	JOURNAL={Mathematics of Operations Research},
	VOLUME={26},
	PAGES={591-600},
	MONTH={8},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-PQ01,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{A Security Analysis of the Cliques Protocols Suites}},
	BOOKTITLE={Proceedings of the 14th IEEE Computer Security Foundations Workshop},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={73-81},
	MONTH={6},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-PQ01,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Security Analysis of the Cliques Protocols Suites: 1st Results}},
	BOOKTITLE={Proceedings of IFIP Sec'01},
	PUBLISHER={Kluwer Publishers},
	PAGES={151-166},
	MONTH={6},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-PQ00,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{On the Perfect Encryption Assumption}},
	BOOKTITLE={Proceedings of the Workshop on Issues in the Theory of Security (WITS 2000)},
	EDITOR={P. Degano},
	PAGES={42-45},
	MONTH={7},
	YEAR={2000},
}