@ARTICLE{cgUCL-PQ13,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Rubik's for cryptographers}},
	JOURNAL={Notices of the American Mathematical Society},
	VOLUME={60},
	PAGES={733-739},
	MONTH={6},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-PQ12,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{On polynomial systems arising from a Weil descent}},
	BOOKTITLE={Asiacrypt 2012},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={12},
	YEAR={2012},
}

@INBOOK{cgUCL-PQ11,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Cayley hash functions}},
	BOOKTITLE={Encyclopedia of cryptography and security - 2nd edition},
	PUBLISHER={Springer},
	EDITOR={Henk C. A. van Tilborg and  Sushil Jajodia},
	MONTH={1},
	YEAR={2011},
}

@ARTICLE{cgUCL-LQY10,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques and Yung, Moti},
	TITLE={{Key Evolution Systems in Untrusted Update Environments}},
	JOURNAL={ACM Transactions on Information and System Security (TISSEC)},
	VOLUME={13},
	MONTH={12},
	YEAR={2010},
}

@INBOOK{cgUCL-SPYQYO10,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu and Quisquater, Jean-Jacques and Yung, Moti and Oswald, Elisabeth},
	TITLE={{Leakage Resilient Cryptography in Practice}},
	BOOKTITLE={Towards Hardware Intrinsic Security: Foundation and Practice},
	PUBLISHER={Springer},
	PAGES={105-139},
	MONTH={11},
	YEAR={2010},
}

@ARTICLE{cgUCL-BSQ10,
 	AUTHOR={Bulens, Philippe and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{How to Strongly Link Data and its Medium: the Paper Case}},
	JOURNAL={IET Information Security},
	VOLUME={2},
	PAGES={125-236},
	MONTH={9},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-PQ10,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Preimages for the Tillich-Zémor hash function}},
	BOOKTITLE={SAC2010 Selected Areas in Cryptography},
	PUBLISHER={Springer},
	EDITOR={Alex Biryukov and Guang Gong and Douglas R. Stinson},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6544},
	PAGES={282-301},
	MONTH={8},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-CNQ09,
 	AUTHOR={Cathalo, Julien and Naccache, David and Quisquater, Jean-Jacques},
	TITLE={{Comparing with RSA}},
	BOOKTITLE={Twelfth IMA International Conference on Cryptography and Coding},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	MONTH={12},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-ADEQ09,
 	AUTHOR={Aboudagga, Nidal and de Meulenaer, Giacomo and Eltoweissy, Mohamed and Quisquater, Jean-Jacques},
	TITLE={{IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups}},
	BOOKTITLE={IEEE Conference on Local Computer Networks (LCN 2009)},
	PUBLISHER={IEEE Computer Society},
	MONTH={10},
	YEAR={2009},
}

@BOOK{cgUCL-MBHMQ09,
 	AUTHOR={Markowitch, Olivier and Bilas, Angelos and Hoepman, Jaap-Henk and Mitchell, Chris and Quisquater, Jean-Jacques},
	TITLE={{3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice (WISTP 2009)}},
	PUBLISHER={Spinger},
	SERIES={Lecture Notes in Computer Sciences},
	VOLUME={5746},
	MONTH={9},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-ADPQ09,
 	AUTHOR={Adida, Ben and de Marneffe, Olivier and Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios}},
	BOOKTITLE={Electronic Voting Technology Workshop/Workshop on Trustworthy Elections},
	PUBLISHER={Usenix},
	EDITOR={D. Jefferson, J.L. Hall, T. Moran},
	MONTH={8},
	YEAR={2009},
}

@ARTICLE{cgUCL-DPQ09,
 	AUTHOR={de Meulenaer, Giacomo and Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?}},
	JOURNAL={Cryptology ePrint Archive},
	NOTE={Report 2009/229},
	MONTH={5},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-PQTZ09,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques and Tillich, Jean-Pierre and Zémor, Gilles},
	TITLE={{Hard and Easy Components of Collision Search for the Zémor-Tillich Hash Function : new Attacks and reduced variants with equival}},
	BOOKTITLE={CT-RSA},
	PUBLISHER={Springer},
	EDITOR={Marc Fischlin},
	SERIES={Lecture Notes in Computer Science},
	PAGES={182-194},
	MONTH={4},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-MLKBQ09,
 	AUTHOR={Manulis, Mark and Leroy, Damien and Koeune, François and Bonaventure, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home}},
	BOOKTITLE={ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009)},
	EDITOR={R. Safavi-Naini and V. Varadharajan},
	NOTE={to appear},
	MONTH={3},
	YEAR={2009},
}

@ARTICLE{cgUCL-CNQ09,
 	AUTHOR={Cathalo, Julien and Naccache, David and Quisquater, Jean-Jacques},
	TITLE={{Comparing With RSA}},
	JOURNAL={Cryptology ePrint Archive},
	NOTE={Report 2009/021},
	MONTH={1},
	YEAR={2009},
}

@ARTICLE{cgUCL-RMDLJKKDPBQ08,
 	AUTHOR={Robert, Romain and Manulis, Mark and De Villenfagne, Florence and Leroy, Damien and Jost, Julien and Koeune, François and Ker, Caroline and Dinant, Jean-Marc and Poullet, Yves and Bonaventure, Olivier and Quisquater, Jean-Jacques},
	TITLE={{WiFi Roaming: Legal Implications and Security Constraints}},
	PUBLISHER={Oxford University Press},
	JOURNAL={International Journal of Law and Information Technology},
	VOLUME={16},
	PAGES={205-241},
	MONTH={10},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-KQ08,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{Method for Detecting Vulnerability to Doubling Attacks}},
	BOOKTITLE={10th International Conference on Information and Communications Security - ICICS 2008},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5308},
	PAGES={97-110},
	MONTH={10},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-PLQ08,
 	AUTHOR={Petit, Christophe and Lauter, Kristin and Quisquater, Jean-Jacques},
	TITLE={{Full Cryptanalysis of LPS and Morgenstern Hash Functions}},
	BOOKTITLE={SCN 2008 - Sixth Conference on Security and Cryptography for Networks},
	PUBLISHER={Springer Verlag},
	EDITOR={Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5229},
	PAGES={263-277},
	MONTH={9},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-KQ08,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{New Differential Fault Analysis on AES Key Schedule: Two Faults are enough}},
	BOOKTITLE={Eighth Smart Card Research and Advanced Application IFIP Conference - CARDIS 2008},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5189},
	PAGES={48-60},
	MONTH={9},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-PQV08,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques and Veyrat-Charvillon, Nicolas},
	TITLE={{Efficiency and Pseudo-randomness of a Variant of Zémor-Tillich Hash Function}},
	BOOKTITLE={ICECS2008 - IEEE International Conference on Electronics, Circuits, and Systems},
	PUBLISHER={IEEE},
	EDITOR={Joseph Micallef },
	PAGES={906-909},
	MONTH={8},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-KBPQ08,
 	AUTHOR={Kim, Chong Hee and Bulens, Philippe and Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Fault Attacks on Public Key Elements: Application to DLP based Schemes}},
	BOOKTITLE={Fifth European PKI Workshop - EUROPKI 2008},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5057},
	PAGES={182-195},
	MONTH={6},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-BSQPR08,
 	AUTHOR={Bulens, Philippe and Standaert, François-Xavier and Quisquater, Jean-Jacques and Pellegrin, Pascal and Rouvroy, Gaël},
	TITLE={{Implementation of the AES-128 on Virtex-5 FPGAs}},
	BOOKTITLE={Progress in Cryptology - AfricaCrypt 2008},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5023},
	PAGES={16-26},
	MONTH={6},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-GSQ08,
 	AUTHOR={Gosset, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementation of SQUASH}},
	BOOKTITLE={Twenty-ninth Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-QCS08,
 	AUTHOR={Quisquater, Jean-Jacques and Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent}},
	BOOKTITLE={ Fast Software Encryption 2008},
	PUBLISHER={Springer},
	SERIES={Lecture Notes on Computer Science},
	VOLUME={5086},
	PAGES={382-397},
	MONTH={2},
	YEAR={2008},
}

@ARTICLE{cgUCL-MSQ08,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementation(s) of a Scalable Encryption Algorithm}},
	PUBLISHER={IEEE Circuits and Systems Society,  IEEE},
	EDITOR={IEEE},
	JOURNAL={IEEE Transactions on Very Large Scale Integration (VLSI) Systems},
	VOLUME={16},
	PAGES={212-216},
	MONTH={2},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-KSQL07,
 	AUTHOR={Kim, Chong Hee and Shin, Jong Hoon and Quisquater, Jean-Jacques and Lee, Pil Joong},
	TITLE={{Safe-Error Attack on SPA-FA resistant exponentiations using a HW modular multiplier}},
	BOOKTITLE={The International Conference on Information Security and Cryptology - ICISC 2007},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4817},
	PAGES={273-281},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-CSQ07,
 	AUTHOR={Collard, Baudoin and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Improving the Time Complexity of Matsui's Linear Cryptanalysis}},
	BOOKTITLE={The International Conference on Information Security and Cryptology - ICISC 2007},
	PUBLISHER={Springer},
	EDITOR={K.-H. Nam and G. Rhee},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4817},
	PAGES={77-88},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-DPQ07,
 	AUTHOR={de Marneffe, Olivier and Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Simulation-Based Analysis of E2E Voting Systems}},
	BOOKTITLE={Proceedings of the First Conference on E-Voting and Identity (VOTE-ID 2007)},
	PUBLISHER={Springer},
	EDITOR={A. Alkassar and M. Volkamer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4896},
	PAGES={137-149},
	MONTH={11},
	YEAR={2007},
}

@ARTICLE{cgUCL-AEQ07,
 	AUTHOR={Aboudagga, Nidal and Eltoweissy, Mohamed and Quisquater, Jean-Jacques},
	TITLE={{Two-Level Signature Delegation For Mobile First Responder Authentication}},
	BOOKTITLE={The Second International Workshop on Trusted Collaboration, 2007},
	PUBLISHER={IEEE Computer Society},
	JOURNAL={TrustCol-2007},
	MONTH={11},
	YEAR={2007},
}

@ARTICLE{cgUCL-KQ07,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{Faults, Injection Methods, and Fault Attacks}},
	PUBLISHER={IEEE Computer Society},
	JOURNAL={IEEE Design and Test of Computers},
	VOLUME={24},
	PAGES={544-545},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-LQY07,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques and Yung, Moti},
	TITLE={{Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions}},
	BOOKTITLE={14th ACM Conference on Computer and Communications Security (ACM CCS'07)},
	PUBLISHER={ACM},
	EDITOR={S. De Capitani di Vimercati and P. Syverson},
	PAGES={266-275},
	MONTH={10},
	YEAR={2007},
}

@ARTICLE{cgUCL-AEQ07,
 	AUTHOR={Aboudagga, Nidal and Eltoweissy, Mohamed and Quisquater, Jean-Jacques},
	TITLE={{Group Authentication Protocol for Mobile Networks}},
	BOOKTITLE={3rd IEEE INTERNATIONAL CONFERENCE ON Wireless and Mobile Computing, Networking and Communications},
	PUBLISHER={IEEE Computer Society},
	JOURNAL={Wimob},
	PAGES={28},
	NOTE={http://doi.ieee},
	MONTH={10},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MBQ07,
 	AUTHOR={Meurice de Dormale, Guerric and Bulens, Philippe and Quisquater, Jean-Jacques},
	TITLE={{Collision Search for Elliptic Curve Discrete Logarithm over GF(2^m) with FPGA}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4727},
	PAGES={378-393},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-DGMQ07,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Elliptic Curve Factorization Method : Towards Better Exploitation of Reconfigurable Hardware}},
	BOOKTITLE={Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'07)},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-KQ07,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{How can we overcome both side channel analysis and fault attacks on RSA-CRT?}},
	BOOKTITLE={4th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2007},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={21-29},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MSQ07,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Simulation-Based Evaluation of Logic Styles to Counteract Side-Channel Attacks}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Sciences},
	VOLUME={4727},
	PAGES={427-442},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-SQC07,
 	AUTHOR={Standaert, François-Xavier and Quisquater, Jean-Jacques and Collard, Baudoin},
	TITLE={{Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent}},
	BOOKTITLE={Inscrypt 2007},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4990},
	PAGES={51-65},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MBQ07,
 	AUTHOR={Meurice de Dormale, Guerric and Bass, John and Quisquater, Jean-Jacques},
	TITLE={{Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --}},
	BOOKTITLE={International Conference on Field Programmable Logic and Applications (FPL 2007)},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={642-647},
	MONTH={8},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-LQ07,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Practical Time Capsule Signatures in the Standard Model from Bilinear Maps}},
	BOOKTITLE={1st International Conference on Pairing-based Cryptography (Pairing 2007)},
	PUBLISHER={Springer},
	EDITOR={T. Takagi and T. Okamoto},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4575},
	PAGES={23-38},
	MONTH={7},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MSQ07,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{ASIC Implementations of the Block Cipher SEA for Constrained Applications}},
	BOOKTITLE={Proceedings of the Third International Conference on RFID Security - RFIDSec 2007},
	PAGES={103-114},
	MONTH={7},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-KQ07,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures}},
	BOOKTITLE={Workshop in Information Security Theory and Practices: Smart cards, Mobile and Ubiquitous computing systems - WISTP 2007},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4462},
	PAGES={215-228},
	MONTH={5},
	YEAR={2007},
}

@ARTICLE{cgUCL-MQ07,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Area and Time Trade-offs for Iterative Modular Division over GF(2^m): Novel Algorithm and Implementations on FPGA}},
	PUBLISHER={Taylor & Francis},
	JOURNAL={International Journal of Electronics},
	VOLUME={94},
	PAGES={515-529},
	MONTH={5},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MBQ07,
 	AUTHOR={Meurice de Dormale, Guerric and Bass, John and Quisquater, Jean-Jacques},
	TITLE={{On Solving RC5 Challenges with FPGAs}},
	BOOKTITLE={IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07)},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={281-282},
	MONTH={4},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-DGMQ07,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware}},
	BOOKTITLE={IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07)},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={197-207},
	MONTH={4},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-LQY07,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques and Yung, Moti},
	TITLE={{Parallel Key-Insulated Public Key Encryption Without Random Oracles}},
	BOOKTITLE={Public Key Cryptography 2007 (PKC'07)},
	PUBLISHER={Springer},
	EDITOR={T. Okamoto and X. Wang},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4450},
	PAGES={298-314},
	MONTH={4},
	YEAR={2007},
}

@ARTICLE{cgUCL-MQ07,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{High-speed Hardware Implementations of Elliptic Curve Cryptography: A Survey}},
	PUBLISHER={Elsevier},
	EDITOR={N. Nedjah, L.M. Mourelle},
	JOURNAL={Journal of Systems Architecture, Special Issue on Embedded Hardware for Cryptosystems},
	VOLUME={53},
	PAGES={72-84},
	MONTH={2},
	YEAR={2007},
}

@ARTICLE{cgUCL-BKSQ07,
 	AUTHOR={Bulens, Philippe and Kalach, Kassem and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile}},
	PUBLISHER={SASC, January 31 - February 1, 2007},
	NOTE={http://sasc.cry},
	MONTH={1},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-AEQ06,
 	AUTHOR={Aboudagga, Nidal and Eltoweissy, Mohamed and Quisquater, Jean-Jacques},
	TITLE={{Fast Roaming Authentication in Wireless LANs}},
	BOOKTITLE={2nd International Computer Engineering Conference: Engineering the Information Society},
	SERIES={ICENCO 2006},
	MONTH={12},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-LQY06,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques and Yung, Moti},
	TITLE={{Efficient Intrusion-Resilient Signatures Without Random Oracles}},
	BOOKTITLE={Inscrypt 2006},
	PUBLISHER={Springer},
	EDITOR={H. Lipmaa and M. Yung},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4318},
	PAGES={27-41},
	MONTH={12},
	YEAR={2006},
}

@ARTICLE{cgUCL-DDRLQM06,
 	AUTHOR={Descampe, Antonin and Devaux, François-Olivier and Rouvroy, Gaël and Legat, Jean-Didier and Quisquater, Jean-Jacques and Macq, Benoit},
	TITLE={{A Flexible, Hardware JPEG 2000 Decoder for Digital Cinema}},
	PUBLISHER={IEEE},
	JOURNAL={IEEE Transactions on Circuits and Systems for Video},
	VOLUME={16},
	PAGES={1397-1410},
	MONTH={11},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SPAQ06,
 	AUTHOR={Standaert, François-Xavier and Peeters, Eric and Archambeau, Cédric and Quisquater, Jean-Jacques},
	TITLE={{Towards Security Limits of Side-Channel Attacks}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2006},
	PUBLISHER={Springer},
	EDITOR={Louis Goubin and Mitsuru Matsui},
	SERIES={LNCS},
	VOLUME={4249},
	PAGES={30-45},
	MONTH={10},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-APSQ06,
 	AUTHOR={Archambeau, Cédric and Peeters, Eric and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Template Attacks in Principal Subspaces}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2006},
	PUBLISHER={Springer},
	EDITOR={Louis Goubin and Mitsuru Matsui},
	SERIES={LNCS},
	VOLUME={4249},
	PAGES={1--14},
	MONTH={10},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-MABQL06,
 	AUTHOR={Meurice de Dormale, Guerric and Ambroise, Renaud and Bol, David and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Low-Cost Elliptic Curve Digital Signature Coprocessor}},
	BOOKTITLE={Application-specific Systems, Architectures and Processors (ASAP'06)},
	EDITOR={Nikitas Dimopoulos, Sanjay Rajopadhye, Wayne Luk, and Yvon S},
	PAGES={347-353},
	MONTH={9},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-LLQ06,
 	AUTHOR={Laguillaumie, Fabien and Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Universal Designated Verifier Signatures Without Random Oracles or Non-Black Box Assumptions}},
	BOOKTITLE={Security and Cryptography for Networks (SCN'06)},
	PUBLISHER={Springer},
	EDITOR={R. De Prisco and M. Yung},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4116},
	PAGES={63-77},
	NOTE={To Appear},
	MONTH={9},
	YEAR={2006},
}

@ARTICLE{cgUCL-PSQ06,
 	AUTHOR={Peeters, Eric and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Power and Electromagnetic Analysis: Improved Model, Consequences and Comparisons}},
	PUBLISHER={Elsevier},
	EDITOR={Nadia Nedjah, Luiza de Macedo Mourelle},
	JOURNAL={Special Issue of Integration, The VLSI Journal: Embedded Cryptographic Hardware},
	NOTE={To Appear},
	MONTH={9},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-NPMQ06,
 	AUTHOR={Neve, Michael and Peeters, Eric and Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Faster and smaller hardware implementation of XTR}},
	BOOKTITLE={Advanced Signal Processing Algorithms, Architectures, and Implementations XVI},
	EDITOR={Franklin T. Luk},
	SERIES={Proceedings of SPIE},
	VOLUME={6313},
	MONTH={8},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SRQ06,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks}},
	BOOKTITLE={proceedings of FPL 2006},
	MONTH={8},
	YEAR={2006},
}

@ARTICLE{cgUCL-PQ06,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{On the Impossibility of Building Secure Cliques-type Authenticated Group Key Agreement Protocols}},
	PUBLISHER={IOS Press},
	EDITOR={R. Focardi},
	JOURNAL={Journal of Computer Security},
	VOLUME={14},
	PAGES={197-246},
	MONTH={5},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-LQ06,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{On Constructing Certificateless Cryptosystems from Identity Based Encryption}},
	BOOKTITLE={Public Key Cryptography 2006 (PKC'06)},
	PUBLISHER={Springer},
	EDITOR={M. Yung},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3958},
	PAGES={474-490},
	MONTH={4},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-BMQ06,
 	AUTHOR={Bulens, Philippe and Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Hardware for Collision Search on Elliptic Curve over GF(2^m)}},
	BOOKTITLE={Special-purpose Hardware for Attacking Cryptographic Systems (SHARCS'06)},
	MONTH={4},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SPGQ06,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Gershenfeld, Neil and Quisquater, Jean-Jacques},
	TITLE={{SEA: a Scalable Encryption Algorithm for Small Embedded Applications}},
	BOOKTITLE={CARDIS},
	PUBLISHER={Springer-Verlag},
	MONTH={4},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-MQ06,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Iterative Modular Division over GF(2^m): Novel Algorithm and Implementations on FPGA}},
	BOOKTITLE={International Workshop on Applied Reconfigurable Computing (ARC2006)},
	PUBLISHER={Springer},
	EDITOR={K. Bertels, J.M.P. Cardoso, and S. Vassiliadis},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3985},
	PAGES={370-382},
	MONTH={3},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SMPQ06,
 	AUTHOR={Standaert, François-Xavier and Mace, François and Peeters, Eric and Quisquater, Jean-Jacques},
	TITLE={{Updates on the Security of FPGAs Against Power Analysis Attacks}},
	BOOKTITLE={ARC},
	VOLUME={3985},
	PAGES={335-346},
	MONTH={3},
	YEAR={2006},
}

@ARTICLE{cgUCL-SPRQ06,
 	AUTHOR={Standaert, François-Xavier and Peeters, Eric and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays}},
	PUBLISHER={IEEE},
	JOURNAL={Proceedings of the IEEE},
	VOLUME={94},
	MONTH={2},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-PCQ06,
 	AUTHOR={Pandey, Omkant and Cathalo, Julien and Quisquater, Jean-Jacques},
	TITLE={{Fair Identification}},
	BOOKTITLE={CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006},
	PUBLISHER={Spinger},
	EDITOR={D. Pointcheval},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3860},
	PAGES={52-63},
	MONTH={2},
	YEAR={2006},
}

@ARTICLE{cgUCL-SPRQ06,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of the ICEBERG Block Cipher}},
	PUBLISHER={Elsevier},
	JOURNAL={The VLSI Journal},
	MONTH={2},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-BLMQ05,
 	AUTHOR={Barreto, Paulo S. L. M. and Libert, Benoit and McCullagh, Noel and Quisquater, Jean-Jacques},
	TITLE={{Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps}},
	BOOKTITLE={Asiacrypt 2005},
	PUBLISHER={Springer},
	EDITOR={B. Roy},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3788},
	PAGES={515-532},
	MONTH={12},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-CLQ05,
 	AUTHOR={Cathalo, Julien and Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Efficient and Non-Interactive Timed-Release Encryption}},
	BOOKTITLE={Information and Communications Security: 7th International Conference, ICICS 2005},
	PUBLISHER={Springer},
	EDITOR={S. Qing, W. Mao, J. Lopez and G. Wang},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3783},
	PAGES={291-303},
	MONTH={12},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-AREDQ05,
 	AUTHOR={Aboudagga, Nidal and Refaei, Mohamed Tamer and Eltoweissy, Mohamed and DaSilva, Luiz A and Quisquater, Jean-Jacques},
	TITLE={{Authentication protocols for ad hoc networks: Taxonomy and research issues}},
	BOOKTITLE={Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks},
	MONTH={10},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSQL05,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Design Methodology for Secured ICs Using Dynamic Current Mode Logic}},
	BOOKTITLE={Power and Timing Modeling, Optimization and Simulation - Proceedings of PATMOS 2005},
	PUBLISHER={Springer},
	EDITOR={V. Paliouras},
	SERIES={Lecture Notes in Computer Science},
	PAGES={550-560},
	MONTH={9},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-PSDQ05,
 	AUTHOR={Peeters, Eric and Standaert, François-Xavier and Donckers, Nicolas and Quisquater, Jean-Jacques},
	TITLE={{Improved Higher Order Side-Channel Attacks with FPGA experiments}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2005},
	PUBLISHER={Spinger-Verlag},
	EDITOR={Josyula R. Rao, Berk Sunar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3659},
	PAGES={309-323},
	MONTH={8},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPGQ05,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Gershenfeld, Neil and Quisquater, Jean-Jacques},
	TITLE={{SEA: a Scalable Encryption Algorithm for Small Embedded Applications}},
	BOOKTITLE={Workshop on Lightweight Crypto},
	MONTH={7},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-LQ05,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Identity Based Encryption without Redundancy}},
	BOOKTITLE={3rd Applied Cryptography and Network Security conference (ACNS'05)},
	PUBLISHER={Springer},
	EDITOR={J. Ioannidis, A. Keromytis and  M. Yung},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3531},
	PAGES={285-300},
	MONTH={6},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-LSRQ05,
 	AUTHOR={Léglise, Philippe and Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{Efficient Implementation of Recent Stream Ciphers on Reconfigurable Hardware Devices}},
	BOOKTITLE={26th Symposium on Information Theory in the Benelux},
	PAGES={261-268},
	MONTH={5},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPQ05,
 	AUTHOR={Standaert, François-Xavier and Peeters, Eric and Quisquater, Jean-Jacques},
	TITLE={{On the Masking Countermeasure and Higher-Order Power Analysis Attacks}},
	BOOKTITLE={ITCC 2005},
	PUBLISHER={IEEE Computer Society},
	VOLUME={1},
	PAGES={562-567},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPRQ05,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of the ICEBERG Block Cipher}},
	BOOKTITLE={ITCC 2005},
	NOTE={To appear},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SLRQML05,
 	AUTHOR={Standaert, François-Xavier and Lefèbvre, Frédéric and Rouvroy, Gaël and Quisquater, Jean-Jacques and Macq, Benoit and Legat, Jean-Didier},
	TITLE={{Practical Evaluation of a Radial Soft Hash Algorithm}},
	BOOKTITLE={ITCC 2005},
	NOTE={To appear},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSLQ05,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Legat, Jean-Didier and Quisquater, Jean-Jacques},
	TITLE={{Recommendations for Secure IC's and ASIC's}},
	BOOKTITLE={CEPA2 Workshop - What Technologies in Defence Applications for Digital Signal Processing Now and in the Future},
	PAGES={NA},
	MONTH={3},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-QS05,
 	AUTHOR={Quisquater, Jean-Jacques and Standaert, François-Xavier},
	TITLE={{Exhaustive Key Search of the DES: Updates and Refinements}},
	BOOKTITLE={SHARCS 2005},
	NOTE={To appear},
	MONTH={2},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-PQ05,
 	AUTHOR={Piret, Gilles and Quisquater, Jean-Jacques},
	TITLE={{Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results}},
	BOOKTITLE={Selected Areas in Cryptography, 11th Annual International Workshop, SAC 2004},
	PUBLISHER={Springer-Verlag},
	EDITOR={H. Handschuh and A. Hasan},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3357},
	PAGES={100-115},
	MONTH={1},
	YEAR={2005},
}

@CGREPORT{cgUCL-MQ05,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Left-to-right modular multiplication without large integer comparisons}},
	MONTH={1},
	YEAR={2005},
}

@CGREPORT{cgUCL-MQ05,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Karatsuba-like Squaring}},
	MONTH={1},
	YEAR={2005},
}

@CGREPORT{cgUCL-MQ05,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Low-Cost Elliptic Curve Digital Signature Cryptoprocessor Based on Affine Coordinates – First Results}},
	MONTH={1},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MQ05,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Novel iterative digit-serial modular division over GF(2^m)}},
	BOOKTITLE={CRyptographic Advances in Secure Hardware -- CRASH 2005},
	MONTH={1},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MBQ04,
 	AUTHOR={Meurice de Dormale, Guerric and Bulens, Philippe and Quisquater, Jean-Jacques},
	TITLE={{An Improved Montgomery Modular Inversion Targeted for Efficient Implementation on FPGA}},
	BOOKTITLE={International Conference on Field-Programmable Technology - FPT 2004},
	EDITOR={O. Diessel & J.A. Williams},
	PAGES={441-444},
	MONTH={12},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-AQ04,
 	AUTHOR={Aboudagga, Nidal and Quisquater, Jean-Jacques},
	TITLE={{Wireless Security and Roaming Overview}},
	BOOKTITLE={ DIMACS  Workshop: Mobile and Wireless Security 2004},
	MONTH={11},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-MSHQL04,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Hassoune, Ilham and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Dynamic Current Mode Logic to Counteract Power Analysis Attacks}},
	BOOKTITLE={DCIS 2004 - 19th Conference on Design of Circuits and Integrated Systems},
	PAGES={186-191},
	MONTH={11},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-MBQ04,
 	AUTHOR={Meurice de Dormale, Guerric and Bulens, Philippe and Quisquater, Jean-Jacques},
	TITLE={{Efficient Modular Division Implementation --ECC over GF(p) Affine Coordinates Application--}},
	BOOKTITLE={The 14th International Conference on Field Programmable Logic and Applications --- FPL 2004},
	PUBLISHER={Springer},
	EDITOR={J. Becker, M. Platzner, S. Vernalde},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3203},
	PAGES={231-240},
	MONTH={9},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-CLQ04,
 	AUTHOR={Cathalo, Julien and Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Cryptanalysis of a Verifiably Committed Signature Scheme based on GPS and RSA}},
	BOOKTITLE={Information Security Conference (ISC) 2004},
	PUBLISHER={Springer-Verlag},
	EDITOR={Kan Zhang, Yuliang Zheng},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3225},
	PAGES={52-60},
	MONTH={9},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-LQ04,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Improved Signcryption from q-Diffie-Hellman Problems}},
	BOOKTITLE={4h Conference on Security in Communication Networks '04 (SCN'04)},
	PUBLISHER={Spinger-Verlag},
	EDITOR={Carlo Blundo},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3352},
	PAGES={220-234},
	MONTH={9},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-RLSMQL04,
 	AUTHOR={Rouvroy, Gaël and Lefèbvre, Frédéric and Standaert, François-Xavier and Macq, Benoit and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Hardware Implementation of a Fingerprinting Algorithm Suited for Digital Cinema}},
	BOOKTITLE={Eusipco 2004},
	MONTH={9},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-PSRQ04,
 	AUTHOR={Piret, Gilles and Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{On the Security of the DeKart Primitive}},
	BOOKTITLE={Smart Card Research and Advanced Applications (CARDIS 2004)},
	PUBLISHER={Kluwer Academic Publishers},
	EDITOR={J.-J. Quisquater, P. Paradinas, Y. Deswarte, and A.A. El Kal},
	PAGES={241-254},
	MONTH={8},
	YEAR={2004},
}

@CGREPORT{cgUCL-CNPQ04,
 	AUTHOR={Ciet, Mathieu and Neve, Michael and Peeters, Eric and Quisquater, Jean-Jacques},
	TITLE={{Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended Version}},
	MONTH={7},
	YEAR={2004},
}

@ARTICLE{cgUCL-QNPS04,
 	AUTHOR={Quisquater, Jean-Jacques and Neve, Michael and Peeters, Eric and Standaert, François-Xavier},
	TITLE={{L'émission rayonnée des cartes à puces : une vue d'ensemble}},
	JOURNAL={Revue de l'Electricité et de l'Electronique},
	MONTH={6},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-PQ04,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols}},
	BOOKTITLE={Proceedings of the 17-th IEEE Computer Security Foundations Workshop -- CSFW-17},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={16-29},
	MONTH={6},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-AGQ04,
 	AUTHOR={Aboudagga, Nidal and Giry, Damien and Quisquater, Jean-Jacques},
	TITLE={{Wireless Security Design Overview}},
	BOOKTITLE={Twenty-fifth Symposium on Information Theory in the Benelux},
	PUBLISHER={Werkgemeenschap voor Informatie- en Comm},
	EDITOR={R. Pellikaan},
	PAGES={153-160},
	MONTH={6},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-LQ04,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved}},
	BOOKTITLE={First European PKI Workshop (EuroPKI'04)},
	PUBLISHER={Springer-Verlag},
	EDITOR={S. Katsikas, S. Gritzalis, J. Lopez},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3093},
	PAGES={57-70},
	MONTH={6},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-RSQL04,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Compact and Efficient Encryption/Decryption Module for FPGA Implementation of AES Rijndael Very Well Suited for Small Embedd}},
	BOOKTITLE={ITCC 2004, special session on embedded cryptographic hardware},
	PUBLISHER={IEEE Computer Society},
	VOLUME={2},
	PAGES={583-587},
	MONTH={4},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-LQ04,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups}},
	BOOKTITLE={Public Key Cryptography 2004 (PKC'04)},
	PUBLISHER={Spinger-Verlag},
	EDITOR={F. Bao},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2947},
	PAGES={187-200},
	MONTH={3},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-LQ04,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Identity Based Undeniable Signatures}},
	BOOKTITLE={Cryptographer's Track -- RSA 2004},
	PUBLISHER={Springer-Verlag},
	EDITOR={T. Okamoto},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2964},
	PAGES={112-125},
	MONTH={2},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-SPRQL04,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{ICEBERG: an Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware}},
	BOOKTITLE={FSE 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3017},
	PAGES={279-298},
	MONTH={2},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-CSQ04,
 	AUTHOR={Ciet, Mathieu and Sica, Francesco and Quisquater, Jean-Jacques},
	TITLE={{On the security of certain DPA countermeasures}},
	BOOKTITLE={Proceedings of the 25th Symposium on Information Theory in the Benelux},
	EDITOR={H. van Tilborg},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-DQ04,
 	AUTHOR={Deswarte, Yves and Quisquater, Jean-Jacques},
	TITLE={{Remote Integrity Checking}},
	BOOKTITLE={Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS)},
	PUBLISHER={Kluwer Academic Publishers},
	EDITOR={Sushil Jajodia; Leon Strous},
	PAGES={1-11},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-QS04,
 	AUTHOR={Quisquater, Jean-Jacques and Standaert, François-Xavier},
	TITLE={{Time-Memory Tradeoffs}},
	BOOKTITLE={Encycolpedia of Cryptography and Security},
	PUBLISHER={Springer-Verlag},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-SOQP04,
 	AUTHOR={Standaert, François-Xavier and Ors, Siddika Berna and Quisquater, Jean-Jacques and Preneel, Bart},
	TITLE={{Power Analysis Attacks against FPGA Implementations of the DES}},
	BOOKTITLE={FPL 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	PAGES={84-94},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-RSLQML04,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Lefèbvre, Frédéric and Quisquater, Jean-Jacques and Macq, Benoit and Legat, Jean-Didier},
	TITLE={{Reconfigurable Hardware Solutions for the Digital Rights Management of Digital Cinema}},
	BOOKTITLE={DRM 2004},
	PUBLISHER={ACM},
	PAGES={40-53},
	MONTH={1},
	YEAR={2004},
}

@INBOOK{cgUCL-RSQL04,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Compact and Efficient Encryption/Decryption Module for FPGA Implementation of AES}},
	BOOKTITLE={Embedded Cryptographic Hardware: Design and Security},
	PUBLISHER={Nova Science Publishers},
	EDITOR={Nadia Nedjah and Luiza de Macedo Mourelle},
	MONTH={1},
	YEAR={2004},
}

@CGREPORT{cgUCL-PQ03,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{An attack against Barua et al. authenticated group key agreement protocol}},
	MONTH={10},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-CKQ03,
 	AUTHOR={Cathalo, Julien and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{A New Type of Timing Attack: Application to GPS}},
	BOOKTITLE={Fifth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003)},
	PUBLISHER={Springer},
	EDITOR={C. Walter, C. K. Koc, C. Paar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2779},
	PAGES={291-303},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SVSQ03,
 	AUTHOR={Standaert, François-Xavier and van Oldeneel tot Oldenzeel, Loic and Samyde, David and Quisquater, Jean-Jacques},
	TITLE={{Differential Power Analysis of FPGAs : How Practical is the Attack?}},
	BOOKTITLE={FPL 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2778},
	PAGES={701-709},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SRQL03,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs}},
	BOOKTITLE={CHES 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2523},
	PAGES={334-350},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-QP03,
 	AUTHOR={Quisquater, Jean-Jacques and Piret, Gilles},
	TITLE={{A Differential Fault Attack Technique Against SPN Structures, with Application to the AES and KHAZAD}},
	BOOKTITLE={Fifth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003)},
	PUBLISHER={Springer-Verlag},
	EDITOR={C. Walter, C. K. Koc, C. Paar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2779},
	PAGES={77-88},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Design Strategies and Modifed Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Tri}},
	BOOKTITLE={FPL 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2778},
	PAGES={181-193},
	MONTH={9},
	YEAR={2003},
}

@ARTICLE{cgUCL-PQ03,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Some attacks upon authenticated group key agreement protocols}},
	PUBLISHER={IOSPress},
	JOURNAL={Journal of Computer Security},
	VOLUME={11},
	PAGES={555-580},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-CLSQ03,
 	AUTHOR={Ciet, Mathieu and Lange, Tanja and Sica, Francesco and Quisquater, Jean-Jacques},
	TITLE={{Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms}},
	BOOKTITLE={Advances in Cryptology - EUROCRYPT 2003, Warsaw, Poland},
	PUBLISHER={Springer-Verlag},
	EDITOR={Eli Biham},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2656},
	MONTH={5},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-CPQ03,
 	AUTHOR={Ciet, Mathieu and Piret, Gilles and Quisquater, Jean-Jacques},
	TITLE={{A Structure of Block Ciphers achieving some Resistance against Fault Attacks}},
	BOOKTITLE={24 th Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SPRQL03,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Key-Dependent Approximations in Cryptanalysis}},
	BOOKTITLE={the 24th Symposium on Information Theory in the Benelux},
	PAGES={53-62},
	MONTH={5},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient FPGA implementation of block cipher MISTY1}},
	BOOKTITLE={RAW 2003},
	PAGES={7pp},
	MONTH={4},
	YEAR={2003},
}

@ARTICLE{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient Uses of FPGAs for Implementations of the DES and its Experimental Linear Cryptanalysis}},
	VOLUME={32},
	PAGES={473-482},
	MONTH={4},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SRQL03,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Methodology to Implement Block Ciphers in Reconfigurable Hardware and its Application to Fast and Compact AES Rijndael}},
	BOOKTITLE={FPGA 2003},
	PAGES={216-224},
	MONTH={2},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-LQ03,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{New identity based signcryption schemes from pairings}},
	BOOKTITLE={IEEE Information Theory Workshop 2003},
	PAGES={155-158},
	NOTE={extended versio},
	MONTH={1},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-LQ03,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Efficient Revocation and Threshold Pairing Based Cryptosystems}},
	BOOKTITLE={22nd Symposium on Principles of Distributed Computing (PODC 2003)},
	PUBLISHER={ACM Press},
	PAGES={163-171},
	MONTH={1},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-BNSQ03,
 	AUTHOR={Bohy, Lilian and Neve, Michael and Samyde, David and Quisquater, Jean-Jacques},
	TITLE={{Principal and Independent Component Analysis for Cryptographic systems with Hardware Unmasked Units}},
	BOOKTITLE={e-Smart 2003},
	MONTH={1},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-CNPQ03,
 	AUTHOR={Ciet, Mathieu and Neve, Michael and Peeters, Eric and Quisquater, Jean-Jacques},
	TITLE={{Parallel FPGA implementation of RSA with residue number systems -- Can side-channel threats be avoided? --}},
	BOOKTITLE={IEEE Midwest International Symposium on Circuits and Systems 2003 (Special session on Security and Cryptographic Hardware Implementations)},
	MONTH={1},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-NPSQ03,
 	AUTHOR={Neve, Michael and Peeters, Eric and Samyde, David and Quisquater, Jean-Jacques},
	TITLE={{Memories: A Survey of their Secure Uses in Smart Cards}},
	BOOKTITLE={Second International IEEE Security in Storage Workshop - Proceedings of SISW 2003},
	MONTH={1},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-QS02,
 	AUTHOR={Quisquater, Jean-Jacques and Samyde, David},
	TITLE={{Automatic Code Recognition for Smartcards Using a Kohonen Neural Network}},
	BOOKTITLE={Proceedings of the Fifth Smart Card Research and Advanced Application Conference (CARDIS '02), San Jose, CA, USA},
	MONTH={11},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-SRQL02,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1}},
	BOOKTITLE={The Third NESSIE Workshop},
	PAGES={10pp},
	MONTH={11},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-QS02,
 	AUTHOR={Quisquater, Jean-Jacques and Samyde, David},
	TITLE={{Eddy current for Magnetic Analysis with Active Sensor}},
	BOOKTITLE={Esmart 2002, Nice, France},
	MONTH={9},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-QS02,
 	AUTHOR={Quisquater, Jean-Jacques and Samyde, David},
	TITLE={{Side Channel Cryptanalysis}},
	BOOKTITLE={Invited talk in SEcurité de la Communication sur Internet (SECI 02). Tunis, Tunisia},
	NOTE={Invited talk},
	MONTH={9},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-HQ02,
 	AUTHOR={Hachez, Gaël and Quisquater, Jean-Jacques},
	TITLE={{Which Directions for Asymmetric Watermarking ?}},
	BOOKTITLE={Proceedings of the XI European Signal Processing Conference (EUSIPCO 2002), Toulouse, France},
	MONTH={9},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-QSRDL02,
 	AUTHOR={Quisquater, Jean-Jacques and Standaert, François-Xavier and Rouvroy, Gaël and David, Jean-Pierre and Legat, Jean-Didier},
	TITLE={{A Cryptanalytic Time-Memory Tradeoff : First FPGA Implementation}},
	BOOKTITLE={FPL 2002},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	PAGES={780-789},
	MONTH={9},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-KRSQDL02,
 	AUTHOR={Koeune, François and Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and David, Jean-Pierre and Legat, Jean-Didier},
	TITLE={{A FPGA Implementation of the Linear Cryptanalysis}},
	BOOKTITLE={FPL 2002},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2438},
	PAGES={845-852},
	MONTH={9},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-SCQ02,
 	AUTHOR={Sica, Francesco and Ciet, Mathieu and Quisquater, Jean-Jacques},
	TITLE={{Analysis of the Gallant-Lambert-Vanstone Method based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves}},
	BOOKTITLE={Proceedings of Selected Areas in Cryptography (SAC 2002), St. John's, Canada},
	PUBLISHER={Springer-Verlag},
	EDITOR={K. Nyberg, H. Heys},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2595},
	PAGES={21-36},
	MONTH={8},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-Q02,
 	AUTHOR={Quisquater, Jean-Jacques},
	TITLE={{CHES: Past Present and Future}},
	BOOKTITLE={Invited Talk at the Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), San Francisco Bay (Redwood City), USA},
	MONTH={8},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-CQS02,
 	AUTHOR={Ciet, Mathieu and Quisquater, Jean-Jacques and Sica, Francesco},
	TITLE={{Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002). San Francisco Bay (Redwood City), USA},
	PUBLISHER={Springer-Verlag},
	EDITOR={B. Kaliski, Jr., Ç. K. Koç and C. Paar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2523},
	PAGES={540-550},
	MONTH={8},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-SRQL02,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Time-Memory Tradeoff using Distinguished Points : New Analysis and FPGA Results}},
	BOOKTITLE={CHES 2002},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2523},
	PAGES={593-609},
	MONTH={8},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-BCPPQ02,
 	AUTHOR={Bresson, Emmanuel and Chevassut, Olivier and Pereira, Olivier and Pointcheval, David and Quisquater, Jean-Jacques},
	TITLE={{Two Formal Views of Authenticated Group Diffie-Hellman Key Exchange}},
	BOOKTITLE={DIMACS Workshop on Cryptographic Protocols in Complex Environments},
	MONTH={5},
	YEAR={2002},
}

@BOOK{cgUCL-MQ02,
 	AUTHOR={Macq, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Proceedings of the 23rd Symposium on INFORMATION THEORY in the BENELUX, Louvain-La-Neuve, Belgium}},
	MONTH={5},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-CPQ02,
 	AUTHOR={Ciet, Mathieu and Piret, Gilles and Quisquater, Jean-Jacques},
	TITLE={{Related-Key and Slide Attacks: Analysis, Connections, and Improvements - Extended Abstract}},
	BOOKTITLE={23rd Symposium on INFORMATION THEORY in the BENELUX, Louvain-la-Neuve, Belgium},
	EDITOR={B. Macq and J.-J. Quisquater},
	PAGES={315-325},
	MONTH={5},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-CQS02,
 	AUTHOR={Ciet, Mathieu and Quisquater, Jean-Jacques and Sica, Francesco},
	TITLE={{A Short Note on Irreductible Trinomials in Binary Fields}},
	BOOKTITLE={23rd Symposium on INFORMATION THEORY in the BENELUX, Louvain-la-Neuve, Belgium},
	EDITOR={B. Macq and J.-J. Quisquater},
	PAGES={233-234},
	MONTH={5},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-JQYY02,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques and Yen, Sung-Ming and Yung, Moti},
	TITLE={{Observability Analysis: Detecting when Improved Cryptosystems Fail}},
	BOOKTITLE={RSA Conference 2002, San Jose, USA},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2271},
	PAGES={17-29},
	MONTH={2},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-CQS01,
 	AUTHOR={Ciet, Mathieu and Quisquater, Jean-Jacques and Sica, Francesco},
	TITLE={{A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography}},
	BOOKTITLE={Progress in Cryptology - INDOCRYPT 2001},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2247},
	PAGES={108-116},
	MONTH={12},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-JQ01,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{On Rabin-type Signatures}},
	BOOKTITLE={Cryptography and Coding - 8th IMA International Conference on Cryptography and Coding},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2260},
	PAGES={99-113},
	MONTH={12},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-SKQ01,
 	AUTHOR={Schindler, Werner and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{Improving Divide and Conquer Attacks Against Cryptosystems by Better Error Detection Correction Strategies}},
	BOOKTITLE={Cryptography and Coding - 8th IMA International Conference on Cryptography and Coding},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2260},
	PAGES={245-267},
	MONTH={12},
	YEAR={2001},
}

@CGREPORT{cgUCL-PQ01,
 	AUTHOR={Piret, Gilles and Quisquater, Jean-Jacques},
	TITLE={{Impossible Differential and Square Attacks: Cryptanalytic Link and Application to Skipjack}},
	MONTH={12},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-BCPQ01,
 	AUTHOR={Bresson, Emmanuel and Chevassut, Olivier and Pointcheval, David and Quisquater, Jean-Jacques},
	TITLE={{Authenticated Group Diffie-Hellman Key Exchange}},
	BOOKTITLE={Proceedings of the 8th ACM Conference on Computer and Communications Security},
	PAGES={255-264},
	MONTH={11},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-QS01,
 	AUTHOR={Quisquater, Jean-Jacques and Samyde, David},
	TITLE={{ElectroMagnetic Analysis (EMA): Measures and Couter-Measures for Smard Cards}},
	BOOKTITLE={Smart Card Programming and Security (E-smart 2001)},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2140},
	PAGES={200-210},
	MONTH={9},
	YEAR={2001},
}

@ARTICLE{cgUCL-JQT01,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques and Takagi, Tsuyoshi},
	TITLE={{How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves}},
	PUBLISHER={Kluwer Publishers},
	JOURNAL={Designs, Codes and Cryptography},
	VOLUME={23},
	PAGES={297-316},
	MONTH={8},
	YEAR={2001},
}

@ARTICLE{cgUCL-GUQ01,
 	AUTHOR={Guillou, Louis and Ugon, Michel and Quisquater, Jean-Jacques},
	TITLE={{Cryptographic authentication protocols for smart cards}},
	PUBLISHER={Elsevier},
	JOURNAL={Computer Networks},
	VOLUME={36},
	PAGES={437-451},
	MONTH={7},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-PQ01,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{A Security Analysis of the Cliques Protocols Suites}},
	BOOKTITLE={Proceedings of the 14th IEEE Computer Security Foundations Workshop},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={73-81},
	MONTH={6},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-PQ01,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Security Analysis of the Cliques Protocols Suites: 1st Results}},
	BOOKTITLE={Proceedings of IFIP Sec'01},
	PUBLISHER={Kluwer Publishers},
	PAGES={151-166},
	MONTH={6},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-JQ01,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Hessian Elliptic Curves and Side-Channel Attacks}},
	BOOKTITLE={Proceedings of  Cryptographic Hardware and Embedded Systems - CHES 2001},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2162},
	PAGES={402-410},
	MONTH={5},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-JQY01,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques and Yung, Moti},
	TITLE={{On the power of misbehaving adversaries and security analysis of the original EPOC}},
	BOOKTITLE={Topics in Cryptology - CT-RSA 2001},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2020},
	PAGES={208-222},
	MONTH={4},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-HDJQV00,
 	AUTHOR={Hachez, Gaël and Den, Laurent and Jalali, Mehrdad and Quisquater, Jean-Jacques and Vasserot, Christophe},
	TITLE={{Towards a Practical Secure Framework for Mobile Code Commerce}},
	BOOKTITLE={Third International Information Security Workshop (ISW 2000)},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1975},
	PAGES={164-178},
	MONTH={12},
	YEAR={2000},
}

@INPROCEEDINGS{cgUCL-HKQ00,
 	AUTHOR={Hachez, Gaël and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{Biometrics, access control, smart cards: a not so simple combination}},
	BOOKTITLE={Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000)},
	PUBLISHER={Kluwer Academic Publishers},
	EDITOR={J. Domingo-Ferrer, D. Chan, A. Watson},
	SERIES={IFIP Conference Proceedings},
	VOLUME={180},
	PAGES={273-288},
	MONTH={9},
	YEAR={2000},
}

@INPROCEEDINGS{cgUCL-HQ00,
 	AUTHOR={Hachez, Gaël and Quisquater, Jean-Jacques},
	TITLE={{Montgomery exponentiation with no final subtraction: Improved results}},
	BOOKTITLE={Proceedings of  Cryptographic Hardware and Embedded Systems - CHES 2000},
	PUBLISHER={Springer-Verlag},
	EDITOR={Ç.K. Koç, C. Paar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1965},
	PAGES={293-301},
	MONTH={7},
	YEAR={2000},
}

@INPROCEEDINGS{cgUCL-PQ00,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{On the Perfect Encryption Assumption}},
	BOOKTITLE={Proceedings of the Workshop on Issues in the Theory of Security (WITS 2000)},
	EDITOR={P. Degano},
	PAGES={42-45},
	MONTH={7},
	YEAR={2000},
}

@INPROCEEDINGS{cgUCL-QG00,
 	AUTHOR={Quisquater, Jean-Jacques and Guillou, Louis},
	TITLE={{The new Guillou-Quisquater Scheme}},
	BOOKTITLE={Proceedings of the RSA 2000 conference},
	MONTH={1},
	YEAR={2000},
}

@BOOK{cgUCL-QS00,
 	AUTHOR={Quisquater, Jean-Jacques and Schneier, Bruce},
	TITLE={{Proceedings of CARDIS 1998}},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1820},
	MONTH={1},
	YEAR={2000},
}

@INPROCEEDINGS{cgUCL-DQ00,
 	AUTHOR={Dhem, Jean-François and Quisquater, Jean-Jacques},
	TITLE={{Recent results on modular multiplications for smart cards}},
	BOOKTITLE={Proceedings of CARDIS 1998},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Security},
	VOLUME={1820},
	PAGES={350-366},
	MONTH={1},
	YEAR={2000},
}

@ARTICLE{cgUCL-MSQ99,
 	AUTHOR={Massias, Henri and Serret, Xavier and Quisquater, Jean-Jacques},
	TITLE={{Design of a secure timestamping service with minimal trust requirement}},
	BOOKTITLE={Information Theory in the Benelux},
	EDITOR={In A. Barbé, E.C. van der Meulen and P. Vanroose},
	JOURNAL={Proceedings of the 20th symposium on Information Theory in the Benelux},
	PAGES={79-86},
	MONTH={5},
	YEAR={1999},
}

@ARTICLE{cgUCL-NFQ99,
 	AUTHOR={Neve, Amaury and Flandre, Denis and Quisquater, Jean-Jacques},
	TITLE={{Feasibility of Smart Cards in Silicon-On-Insulator (SOI) Technology}},
	BOOKTITLE={In Proceedings of the USENIX Workshop on Smartcard Technolgy: Smartcard '99},
	PAGES={1-7},
	MONTH={5},
	YEAR={1999},
}

@ARTICLE{cgUCL-HFQ99,
 	AUTHOR={Hachez, Gaël and François,  and Quisquater, Jean-Jacques},
	TITLE={{cAESar results: Implementation of Four AES Candidates on Two Smart Cards}},
	BOOKTITLE={In Proceedings of the second Advanced Encryption Standard candidate conference},
	PAGES={95-108},
	MONTH={5},
	YEAR={1999},
}

@ARTICLE{cgUCL-GLQ99,
 	AUTHOR={Gilmont, Tanguy and Legat, Jean-Didier and Quisquater, Jean-Jacques},
	TITLE={{Hardware security for software privacy support}},
	JOURNAL={IEE Electronics Letters},
	VOLUME={35},
	PAGES={2096-2098},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-DVQ99,
 	AUTHOR={Desmedt, Yvo and V., Tri and Quisquater, Jean-Jacques},
	TITLE={{Nonbinary audio cryptography}},
	BOOKTITLE={Proceedings of Info Hiding '99},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={1768},
	PAGES={478-489},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-PHKQ99,
 	AUTHOR={P., Julien and Hachez, Gaël and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{Robust object watermarking: application to code}},
	BOOKTITLE={Proceedings of Info Hiding '99},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1768},
	PAGES={368-378},
	MONTH={1},
	YEAR={1999},
}

@ARTICLE{cgUCL-LJQ99,
 	AUTHOR={Lenstra, Arjen K. and Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Chinese remaindering cryptosystems in the presence of faults}},
	PUBLISHER={Springer},
	JOURNAL={Journal of Cryptology},
	VOLUME={12},
	PAGES={241-245},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-GLQ99,
 	AUTHOR={Gilmont, Tanguy and Legat, Jean-Didier and Quisquater, Jean-Jacques},
	TITLE={{Enhancing the security in the management unit}},
	BOOKTITLE={Proceedings of the 25th EuroMicro Conference},
	PAGES={449-456},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-MSQ99,
 	AUTHOR={Massias, Henri and Serret, Xavier and Quisquater, Jean-Jacques},
	TITLE={{Timestamps: Main issues on their use and implementation}},
	BOOKTITLE={Proceedings of IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collabo},
	PAGES={178-183},
	NOTE={ISBN 0-7695-036},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-KQL99,
 	AUTHOR={Kabasele, Jean-Marie and Quisquater, Jean-Jacques and Lobelle, Marc},
	TITLE={{Deriving a role-based access control model from the OBBAC model}},
	BOOKTITLE={Proceedings of IEEE 8th International Workshops on enabling Technologies: Infrastructure for Collabo},
	PAGES={147-151},
	NOTE={ISBN 0-7695-036},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-JQYY99,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques and Yen, Sung-Ming and Yung, Moti},
	TITLE={{Security paradoxes: How improving a cryptosystem may weaken it}},
	BOOKTITLE={Ninth National Conference on Information Security, Taichung, Taiwan},
	PAGES={27-32},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-HKQ99,
 	AUTHOR={Hachez, Gaël and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{Timing attack: what can be achieved by a powerful adversary?}},
	BOOKTITLE={Proceedings of the 20th symposium on Information Theory in the Benelux},
	EDITOR={A. Barbé, E.C. van der Meulen and P. Vanroose},
	PAGES={63-70},
	MONTH={1},
	YEAR={1999},
}

@ARTICLE{cgUCL-GLQ98,
 	AUTHOR={Gilmont, Tanguy and Legat, Jean-Didier and Quisquater, Jean-Jacques},
	TITLE={{An architecture of security management unit for safe hosting of multiple agents}},
	BOOKTITLE={Proceedings of COST 254},
	PAGES={79-82},
	MONTH={11},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-DHQ98,
 	AUTHOR={Desmedt, Yvo and Hou, S. and Quisquater, Jean-Jacques},
	TITLE={{Cerebral Cryptography}},
	BOOKTITLE={Proceedings of Information Hiding, Second International Workshop},
	PAGES={62-72},
	MONTH={4},
	YEAR={1998},
}

@ARTICLE{cgUCL-GQ98,
 	AUTHOR={Gilbert, H. and Quisquater, Jean-Jacques},
	TITLE={{Attacks on Shamir's 'RSA for paranoids'}},
	JOURNAL={Information Processing Letters 68},
	PAGES={197-199},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-HQ98,
 	AUTHOR={Hou, S. and Quisquater, Jean-Jacques},
	TITLE={{Audio and Optical Cryptography}},
	BOOKTITLE={Proceedings of Asiacrypt'98},
	PUBLISHER={Springer-Verlag},
	EDITOR={K. Ohta and D. Pei},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1514},
	PAGES={392-404},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-DKLMQW98,
 	AUTHOR={Dhem, Jean-François and Koeune, François and Leroux, Philippe-Alexandre and Mestré, Patrick and Quisquater, Jean-Jacques and Willems, Jean-Louis},
	TITLE={{A practical implementation of the timing attack}},
	BOOKTITLE={Proceedings of the Third Working Conference on Smart Card Research and Advanced Applications (CARDIS 1998)},
	PUBLISHER={Springer-Verlag},
	EDITOR={Jean-Jacques Quisquater and Bruce Schneier},
	SERIES={LNCS},
	VOLUME={1820},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-JQ98,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Cryptanalysis of RSA-type cryptosystems: a visit}},
	BOOKTITLE={Network Threats},
	PUBLISHER={American Mathematical Society},
	EDITOR={R. N. Wright and P. G. Neumann},
	SERIES={DIMACS Series in Discrete Mathematics an},
	PAGES={21-31},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-JQ98,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams}},
	BOOKTITLE={Designs, Codes and Cryptography},
	VOLUME={14},
	PAGES={53-56},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-JQT98,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques and Takagi, Tsuyoshi},
	TITLE={{Are strong primes really stronger?}},
	BOOKTITLE={Proc. of the Eighth National Symposium on Information Security},
	EDITOR={D.J. Guan},
	PAGES={355-367},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-DDQM98,
 	AUTHOR={Darmstaedter, V. and Delaigle, Jean-François and Quisquater, Jean-Jacques and Macq, Benoit},
	TITLE={{Low-cost spatial watermarking}},
	BOOKTITLE={Computer & Graphics},
	VOLUME={22},
	PAGES={417-424},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-JQ97,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Protocol failures for RSA-like functions using Lucas sequences and elliptic curves}},
	BOOKTITLE={Security Protocols 1996},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1189},
	PAGES={93-100},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-QMJDB97,
 	AUTHOR={Quisquater, Jean-Jacques and Macq, Benoit and Joye, Marc and Degand, N. and Bernard, A.},
	TITLE={{Practical solution to authentication of images with a secure camera}},
	BOOKTITLE={Storage and Retrieval for Image and Video Databases},
	PUBLISHER={SPIE},
	EDITOR={I.K. Sethi and R.C. Jain},
	VOLUME={3022},
	PAGES={290-297},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-Q97,
 	AUTHOR={Quisquater, Jean-Jacques},
	TITLE={{The adolescence of smart cards}},
	BOOKTITLE={Future Generation Computer Systems},
	PAGES={3-7},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-GJQ97,
 	AUTHOR={Gillet, A. and Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Cautionary note for protocols designers: Security proof is not enough}},
	BOOKTITLE={DIMACS Workshop on Design and Formal Verification of Security Protocols},
	EDITOR={H. Orman and C. Meadows},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-BJQ97,
 	AUTHOR={Bleichenbacher, D. and Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{A new and optimal chosen-message attack on RSA-type cryptosystems}},
	BOOKTITLE={Information and Communications Security (ICICS'97)},
	PUBLISHER={Springer-Verlag},
	EDITOR={Y. Han, T. Okamoto and S. Qing},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1334},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-DJQ97,
 	AUTHOR={Dhem, Jean-François and Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{RSA-type signatures in the presence of transient faults}},
	BOOKTITLE={Cryptography and Coding},
	PUBLISHER={Springer-Verlag},
	EDITOR={M. Darnell},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1355},
	PAGES={155-160},
	MONTH={1},
	YEAR={1997},
}

@ARTICLE{cgUCL-JQ97,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Authentication of sequences with the SL2 hash function: Application to video sequences}},
	JOURNAL={Journal of Computer Security},
	VOLUME={5},
	PAGES={213-223},
	MONTH={1},
	YEAR={1997},
}

@ARTICLE{cgUCL-JQ97,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Cryptosystem of Chua and Ling}},
	JOURNAL={Electronic Letters},
	VOLUME={33},
	PAGES={1938},
	MONTH={1},
	YEAR={1997},
}

@ARTICLE{cgUCL-JQBD97,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques and Bao, Feng and Deng, Robert H.},
	TITLE={{RSA-type cryptosystems in the presence of transient faults}},
	PUBLISHER={Springer-Verlag},
	EDITOR={M. Darnell},
	JOURNAL={Cryptography and Coding},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1355},
	PAGES={155-160},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-BLMQ96,
 	AUTHOR={Boucqueau, Jean-Marc and Lacroix, Sylvie and Macq, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Equitable conditionnal access and copyright protection for image based on trusted third parties}},
	BOOKTITLE={Second International COST 237 Workshop},
	PUBLISHER={Springer-Verlag},
	EDITOR={D. Hutchinson, H. Christiansen, G. Coulson and A. Danthine},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1052},
	PAGES={229-243},
	MONTH={1},
	YEAR={1996},
}

@ARTICLE{cgUCL-JQ96,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Efficient computation of full Lucas sequences}},
	JOURNAL={IEE Electronics Letters},
	VOLUME={32},
	PAGES={537-538},
	MONTH={1},
	YEAR={1996},
}

@INPROCEEDINGS{cgUCL-LBQM96,
 	AUTHOR={Lacroix, Sylvie and Boucqueau, Jean-Marc and Quisquater, Jean-Jacques and Macq, Benoit},
	TITLE={{Providing equitable conditionnal access by use of trusted third parties}},
	BOOKTITLE={European Conference on Multimedia Applications, Services and Techniques (ECMAST 96)},
	EDITOR={P. Delogne et al.},
	PAGES={763-781},
	MONTH={1},
	YEAR={1996},
}

@INPROCEEDINGS{cgUCL-DBQM96,
 	AUTHOR={Delaigle, Jean-François and Boucqueau, Jean-Marc and Quisquater, Jean-Jacques and Macq, Benoit},
	TITLE={{Digital images protection techniques in a broadcast framework: An overview}},
	BOOKTITLE={European Conference on Multimedia Applications, Services and Techniques (ECMAST 96)},
	EDITOR={P. Delogne et al.},
	PAGES={711-727},
	MONTH={1},
	YEAR={1996},
}

@ARTICLE{cgUCL-DVQ96,
 	AUTHOR={Dhem, Jean-François and Veithen, D. and Quisquater, Jean-Jacques},
	TITLE={{SCALPS: Smart Card Applied to Limited Payment Systems}},
	JOURNAL={IEEE Micro},
	VOLUME={16},
	PAGES={42-51},
	MONTH={1},
	YEAR={1996},
}

@INPROCEEDINGS{cgUCL-DQL96,
 	AUTHOR={Dhem, Jean-François and Quisquater, Jean-Jacques and Lecat, R.},
	TITLE={{Progress towards efficient lossless compression algorithms for smart cards}},
	BOOKTITLE={Smart card Research and Advanced Applications -- Cardis '96},
	EDITOR={P. H. Hartel, et al.},
	PAGES={73-88},
	MONTH={1},
	YEAR={1996},
}

@INPROCEEDINGS{cgUCL-FMMQW96,
 	AUTHOR={Ferreira, R. and Malzahn, R. and Marissen, P. and Quisquater, Jean-Jacques and Wille, T.},
	TITLE={{FAME: A 3rd generation coprocessor for optimising public key cryptosystems in smart card applications}},
	BOOKTITLE={Smart card Research and Advanced Applications -- Cardis '96},
	EDITOR={P. H. Hartel et al.},
	PAGES={59-72},
	MONTH={1},
	YEAR={1996},
}

@BOOK{cgUCL-HPQ96,
 	AUTHOR={Hartel, Pieter and Paradinas, Pierre and Quisquater, Jean-Jacques},
	TITLE={{Smart card Research and Advanced Applications -- CARDIS '96}},
	SERIES={Stichting Mathematisch Centrum},
	MONTH={1},
	YEAR={1996},
}

@BOOK{cgUCL-DHMQ96,
 	AUTHOR={Delogne, Paul and Hutchinson, D. and Macq, Benoit and Quisquater, Jean-Jacques},
	TITLE={{ECMAST '96, European Conference on Multimedia Applications, Services and Techniques}},
	MONTH={1},
	YEAR={1996},
}

@ARTICLE{cgUCL-Q95,
 	AUTHOR={Quisquater, Jean-Jacques},
	TITLE={{How to avoid a successful cryptanalysis of your random prime generator (abstract)}},
	BOOKTITLE={Cryptography Workshop '95, Luminy},
	PAGES={17},
	MONTH={9},
	YEAR={1995},
}

@INPROCEEDINGS{cgUCL-MQ95,
 	AUTHOR={Macq, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Cryptology for digital TV broadcasting}},
	BOOKTITLE={Proceedings of the IEEE},
	VOLUME={83},
	PAGES={944-957},
	MONTH={6},
	YEAR={1995},
}

@INPROCEEDINGS{cgUCL-BQM95,
 	AUTHOR={Bruyndonckx, O. and Quisquater, Jean-Jacques and Macq, Benoit},
	TITLE={{Spatial method of copyright labeling of digital images}},
	BOOKTITLE={IEEE Workshop on Nonlinear Images/Signal Processing, Thessal},
	MONTH={6},
	YEAR={1995},
}

@INPROCEEDINGS{cgUCL-BBLMMQ95,
 	AUTHOR={Boucqueau, Jean-Marc and Bruyndonckx, O. and Lacroix, Sylvie and Mertes, Jean-Yves and Macq, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Acces Control and Copyright Protection for Images}},
	BOOKTITLE={16th Symposium on Information Theory in the Benelux},
	PAGES={17-24},
	MONTH={5},
	YEAR={1995},
}

@INPROCEEDINGS{cgUCL-BQ95,
 	AUTHOR={Béguin, Philippe and Quisquater, Jean-Jacques},
	TITLE={{Secure acceleration of DSS signatures using insecure server}},
	BOOKTITLE={Advances in Cryptology -- Asiacrypt '94},
	PUBLISHER={Springer-Verlag},
	EDITOR={J. Pieprzyk and R. Safavi-Naini},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={917},
	PAGES={248-259},
	MONTH={1},
	YEAR={1995},
}

@INPROCEEDINGS{cgUCL-BQ95,
 	AUTHOR={Béguin, Philippe and Quisquater, Jean-Jacques},
	TITLE={{Fast server-aided RSA signatures secure against active attacks}},
	BOOKTITLE={Advances in Cryptology -- Crypto '95},
	PUBLISHER={Springer-Verlag},
	EDITOR={D. Coppersmith},
	SERIES={D. Coppersmith},
	VOLUME={963},
	PAGES={57-69},
	MONTH={1},
	YEAR={1995},
}

@BOOK{cgUCL-GQ95,
 	AUTHOR={Guillou, Louis and Quisquater, Jean-Jacques},
	TITLE={{Advances in Cryptology -- Eurocrypt '95}},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={921},
	MONTH={1},
	YEAR={1995},
}