@INPROCEEDINGS{cgUCL-BKLMMNSSSTV17,
 	AUTHOR={Bernstein, Daniel J.  and Koelbl, Stefan and Lucks, Stefan and Massolino, P M Costa and Mendel, Florian and Nawaz, Kashif and Schneider, Tobias and Schwabe, Peter  and Standaert, François-Xavier and Todo, Yosuke and Viguier, Benoît},
	TITLE={{Gimli: A Cross-Platform Permutation}},
	BOOKTITLE={CHES 2017},
	PUBLISHER={Spinger},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	NOTE={to appear},
	MONTH={9},
	YEAR={2017},
}

@ARTICLE{cgUCL-DSM17,
 	AUTHOR={Durvaux, François and Standaert, François-Xavier and Merino Del Pozo, Santos},
	TITLE={{Towards easy leakage certification: extended version}},
	JOURNAL={Journal of Cryptographic Engineering},
	VOLUME={7},
	PAGES={1-19},
	NOTE={http://dx.doi.org/10.1007/s13389-017-0150-0},
	MONTH={6},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-MS17,
 	AUTHOR={Merino Del Pozo, Santos and Standaert, François-Xavier},
	TITLE={{Getting the Most Out of Leakage Detection - Statistical tools and measurement setups hand in hand}},
	BOOKTITLE={Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	NOTE={to appear},
	MONTH={4},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-MSML17,
 	AUTHOR={Massart, Clément and Standaert, François-Xavier and Mouraux, André and Lange, Joseph},
	TITLE={{Side-Channel Attacks Against the Human Brain: the PIN Code Case Study}},
	BOOKTITLE={Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	NOTE={to appear},
	MONTH={4},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-NHSF17,
 	AUTHOR={Nawaz, Kashif and Heidar Kamel, Dina and Standaert, François-Xavier and Flandre, Denis},
	TITLE={{Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: a Case-Study}},
	BOOKTITLE={Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers},
	PUBLISHER={Springer},
	EDITOR={Sylvain Guilley},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	PAGES={19--33},
	NOTE={10.1007/978-3-319-64647-3_2},
	MONTH={4},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-HDMNSFB16,
 	AUTHOR={Heidar Kamel, Dina and de Streel, Guerric and Merino Del Pozo, Santos and Nawaz, Kashif and Standaert, François-Xavier and Flandre, Denis and Bol, David},
	TITLE={{Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers}},
	BOOKTITLE={Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings},
	PUBLISHER={Springer},
	EDITOR={C. Carlet and A. Hasan and V. Saraswat},
	SERIES={Lecture Notes in Computer Science},
	PAGES={233-248},
	NOTE={http://dx.doi.org/10.1007/978-3-319-49445-6_13},
	MONTH={12},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-BS16,
 	AUTHOR={Berti, Francesco and Standaert, François-Xavier},
	TITLE={{An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks}},
	PUBLISHER={Springer},
	EDITOR={Springer},
	JOURNAL={Proceedings of CARDIS 2016, Lecture Notes in Computer Science},
	SERIES={Lecture Notes in Computer Science},
	MONTH={11},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-DSM16,
 	AUTHOR={Durvaux, François and Standaert, François-Xavier and Merino Del Pozo, Santos},
	TITLE={{Towards Easy Leakage Certification}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, California, USA, August 17-19, 2016, Proceedings},
	PUBLISHER={Springer},
	EDITOR={B. Gierlichs and A. Poschmann},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9813},
	PAGES={40-60},
	NOTE={http://dx.doi.org/10.1007/978-3-662-53140-2_3},
	MONTH={8},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-GS15,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?}},
	BOOKTITLE={Asiacrypt},
	PUBLISHER={Springer},
	EDITOR={T. Iwata & J. H. Cheon},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={9452},
	MONTH={12},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-PGS15,
 	AUTHOR={Poussier, Romain and Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations}},
	BOOKTITLE={CARDIS},
	PUBLISHER={Springer},
	EDITOR={N. Homma & M. Medwed},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={11},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-PSV15,
 	AUTHOR={Pereira, Olivier and Standaert, François-Xavier and Vivek, Srinivas},
	TITLE={{Leakage-Resilient Authentication and Encryption from Symmetric Primitives}},
	BOOKTITLE={Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
	PUBLISHER={ACM},
	PAGES={96-108},
	MONTH={10},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-MS15,
 	AUTHOR={Merino Del Pozo, Santos and Standaert, François-Xavier},
	TITLE={{Blind Source Separation from Single Measurements using Singular Spectrum Analysis}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
	PUBLISHER={Springer},
	EDITOR={T. Güneysu, and H. Handschuh},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9293},
	PAGES={42-59},
	NOTE={http://dx.doi.org/10.1007/978-3-662-48324-4_3},
	MONTH={9},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-LPBMS15,
 	AUTHOR={Lerman, Liran and Poussier, Romain and Bontempi, Gianluca and Markowitch, Olivier and Standaert, François-Xavier},
	TITLE={{Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)}},
	BOOKTITLE={Constructive Side-Channel Analysis and Secure Design},
	PUBLISHER={Springer},
	EDITOR={Stefan Mangard and Axel Y. Poschmann},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	PAGES={20-33},
	MONTH={4},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-MSHM15,
 	AUTHOR={Merino Del Pozo, Santos and Standaert, François-Xavier and Heidar Kamel, Dina and Moradi, Amir},
	TITLE={{Si­de-Chan­nel At­tacks from Sta­tic Power: When Should we Care?}},
	BOOKTITLE={Proceedings of the 2015 De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2015, Gre­no­ble, Fran­ce, March 9 - 13, 2015},
	EDITOR={W. Nebel, and D. Atienza},
	PAGES={145-150},
	NOTE={http://dl.acm.org/citation.cfm?id=2755785},
	MONTH={3},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-GGPSS15,
 	AUTHOR={Glowacz, Cezary and Grosso, Vincent and Poussier, Romain and Schüth, Joachim and Standaert, François-Xavier},
	TITLE={{Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment}},
	BOOKTITLE={FSE 2015},
	PUBLISHER={Springer},
	EDITOR={Gregor Leander},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={3},
	YEAR={2015},
}

@ARTICLE{cgUCL-BGS15,
 	AUTHOR={Belaid, Sonia and Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Masking and leakage-resilient primitives: One, the other(s) or both?}},
	PUBLISHER={Spinger},
	EDITOR={Claude Carlet and Pierre{-}Alain Fouque},
	JOURNAL={Cryptography and Communications},
	VOLUME={7},
	PAGES={163-184},
	MONTH={1},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-GPSG14,
 	AUTHOR={Grosso, Vincent and Poussier, Romain and Standaert, François-Xavier and Gaspar, Lubos},
	TITLE={{Combining Leakage-Resilient PRFs and Shuffling}},
	BOOKTITLE={CARDIS 2014},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={11},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-BGGRS14,
 	AUTHOR={Balasch, Josep and Gierlichs, Benedikt and Grosso, Vincent and Reparaz, Oscar and Standaert, François-Xavier},
	TITLE={{On the Cost of Lazy Engineering for Masked Software Implementations}},
	BOOKTITLE={CARDIS 2014},
	PUBLISHER={Spinger},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={11},
	YEAR={2014},
}

@ARTICLE{cgUCL-PRS14,
 	AUTHOR={Petit, Christophe and Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{On a particular case of the bisymmetric equation for quasigroups}},
	PUBLISHER={Spinger},
	JOURNAL={Acta Mathematica Hungarica},
	NOTE={DOI 10.1007/s10474-014-0428-y},
	MONTH={6},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-GS14,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Efficient Masked S-Boxes Processing – A Step Forward –}},
	BOOKTITLE={ AFRICACRYPT 2014},
	PUBLISHER={Spinger},
	EDITOR={D. Pointcheval D. Vergnaud},
	SERIES={Lecture Notes in Computer Science},
	MONTH={5},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-GLSV14,
 	AUTHOR={Grosso, Vincent and Leurent, Gaëtan and Standaert, François-Xavier and Varici, Kerem},
	TITLE={{LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations}},
	BOOKTITLE={FSE 2014},
	PUBLISHER={Spinger},
	EDITOR={Carlos Cid and Christian Rechberger},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={3},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-GS13,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Low Entropy Masking Schemes, Revisited}},
	BOOKTITLE={CARDIS 2013},
	PUBLISHER={Springer},
	EDITOR={Aurélien Francillon and Pankaj Rohatgi},
	SERIES={Lecture Notes in Computer Science},
	MONTH={11},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-GSF13,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier and Faust, Sebastian},
	TITLE={{Masking vs. Multiparty Computation: How Large Is the Gap for AES?}},
	BOOKTITLE={CHES},
	PUBLISHER={Spinger},
	EDITOR={Guido Bertoni and Jean-Sébastien Coron},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={8086},
	PAGES={400-416},
	MONTH={8},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-GGNS13,
 	AUTHOR={Gérard, Benoit and Grosso, Vincent and Naya-Plasencia, Maria and Standaert, François-Xavier},
	TITLE={{Block Ciphers That Are Easier to Mask: How Far Can We Go?}},
	BOOKTITLE={CHES},
	PUBLISHER={Spinger},
	EDITOR={Guido Bertoni and Jean-Sébastien Coron},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={8086},
	PAGES={383-399},
	MONTH={8},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-SPY13,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu},
	TITLE={{Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions}},
	BOOKTITLE={Advances in Cryptology – CRYPTO 2013 },
	SERIES={Lecture Notes in Computer Science},
	PAGES={335--352},
	NOTE={Full version from http://eprint.iacr.org/2013/370},
	MONTH={8},
	YEAR={2013},
}

@ARTICLE{cgUCL-SSJM12,
 	AUTHOR={Shariati, Saloomeh and Standaert, François-Xavier and Jacques, Laurent  and Macq, Benoit},
	TITLE={{Analysis and experimental evaluation of image-based PUFs}},
	PUBLISHER={Spinger-Verlag},
	JOURNAL={Journal of Cryptographic Engineering},
	VOLUME={2},
	MONTH={9},
	YEAR={2012},
}

@CGREPORT{cgUCL-DRKSS12,
 	AUTHOR={De Coninck, Joel and Rioboo, Romain and Koeune, François and Standaert, François-Xavier and Shariati, Saloomeh},
	TITLE={{Patent : LABELLING SYSTEM, WO/2012/122609}},
	EDITOR={	},
	MONTH={9},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-GS12,
 	AUTHOR={Gérard, Benoit and Standaert, François-Xavier},
	TITLE={{Unified and Optimized Linear Collision Attacks and Their Application in a Non-Profiled Setting}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012)},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={7428},
	PAGES={175--192},
	MONTH={9},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-SKS12,
 	AUTHOR={Shariati, Saloomeh and Koeune, François and Standaert, François-Xavier},
	TITLE={{Security Analysis of Image-Based PUFs for Anti-counterfeiting}},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={7394},
	PAGES={26-38},
	MONTH={9},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-GDKKS12,
 	AUTHOR={Gérard, Benoit and Durvaux, François and Kerckhof, Stéphanie and Koeune, François and Standaert, François-Xavier},
	TITLE={{Intellectual Property Protection for Integrated Systems using Soft Physical Hash Functions}},
	BOOKTITLE={Workshop on Information Security Applications (WISA 2012)},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	NOTE={To appear},
	MONTH={8},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-VGRS12,
 	AUTHOR={Veyrat-Charvillon, Nicolas and Gérard, Benoit and Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{An Optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks}},
	BOOKTITLE={Selected Areas in Cryptography (SAC 2012)},
	EDITOR={L. Knudsen},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	NOTE={To appear},
	MONTH={8},
	YEAR={2012},
}

@CGREPORT{cgUCL-GBGS12,
 	AUTHOR={Grosso, Vincent and Boura, Christina and Gérard, Benoit and Standaert, François-Xavier},
	TITLE={{A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks}},
	BOOKTITLE={Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-SPV12,
 	AUTHOR={Standaert, François-Xavier and Petit, Christophe and Veyrat-Charvillon, Nicolas},
	TITLE={{Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders}},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6805},
	PAGES={283-299},
	MONTH={1},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-KDVRMS11,
 	AUTHOR={Kerckhof, Stéphanie and Durvaux, François and Veyrat-Charvillon, Nicolas and Regazzoni, Francesco and Meurice de Dormale, Guerric and Standaert, François-Xavier},
	TITLE={{Low Cost FPGA Implementations of the SHA-3 Finalists}},
	BOOKTITLE={10th Smart Card Research and Advanced Application Conference (CARDIS) 2011},
	MONTH={9},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-MPRRS11,
 	AUTHOR={Medwed, Marcel and Petit, Christophe and Regazzoni, Francesco and Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks}},
	BOOKTITLE={10th Smart Card Research and Advanced Application Conference (CARDIS) 2011},
	MONTH={9},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BDKPPSY11,
 	AUTHOR={Barak, Boaz and Dodis, Yevgeniy and Krawczyk, Hugo and Pereira, Olivier and Pietrzak, Krzysztof and Standaert, François-Xavier and Yu, Yu},
	TITLE={{Leftover Hash Lemma, Revisited}},
	BOOKTITLE={Advances in Cryptology - CRYPTO 2011},
	PUBLISHER={Springer-Verlag},
	EDITOR={Phillip Rogaway},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6841},
	PAGES={1-20},
	MONTH={8},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-KCS11,
 	AUTHOR={Kerckhof, Stéphanie and Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{FPGA Implementation of a Statistical Saturation Attack against PRESENT}},
	BOOKTITLE={Progress in Cryptology – AFRICACRYPT 2011},
	PUBLISHER={Springer},
	EDITOR={Nitaj, Abderrahmane and Pointcheval, David},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6737},
	PAGES={100-116},
	MONTH={7},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BHBSRK11,
 	AUTHOR={Barenghi, Alessandro and Hocquet, Cédric and Bol, David and Standaert, François-Xavier and Regazzoni, Francesco and Koren, Israel},
	TITLE={{Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an Example of a 65nm AES Implementation}},
	BOOKTITLE={7th Workshop on RFID Security and Privacy (RFIDSec) 2011},
	MONTH={6},
	YEAR={2011},
}

@ARTICLE{cgUCL-BRBSI11,
 	AUTHOR={Bayrak, Ali Galip and Regazzoni, Francesco and Brisk, Philip and Standaert, François-Xavier and Ienne, Paolo},
	TITLE={{A First Step Towards Automatic Application of Power Analysis Countermeasures}},
	BOOKTITLE={Proceedings of 48th Design Automation Conference (DAC) 2011},
	JOURNAL={Proceedings of 48th Design Automation Conference (DAC)},
	MONTH={6},
	YEAR={2011},
}

@ARTICLE{cgUCL-HHRLFBS11,
 	AUTHOR={Hocquet, Cédric and Heidar Kamel, Dina and Regazzoni, Francesco and Legat, Jean-Didier and Flandre, Denis and Bol, David and Standaert, François-Xavier},
	TITLE={{Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags}},
	PUBLISHER={Spinger},
	JOURNAL={Journal of Cryptographic Engineering},
	SERIES={Lecture Notes in Computer Science},
	MONTH={4},
	YEAR={2011},
}

@ARTICLE{cgUCL-RYS11,
 	AUTHOR={Regazzoni, Francesco and Yi, Wang and Standaert, François-Xavier},
	TITLE={{FPGA Implementations of the AES Masked Against Power Analysis Attacks}},
	JOURNAL={Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE)},
	MONTH={2},
	YEAR={2011},
}

@INBOOK{cgUCL-SPYQYO10,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu and Quisquater, Jean-Jacques and Yung, Moti and Oswald, Elisabeth},
	TITLE={{Leakage Resilient Cryptography in Practice}},
	BOOKTITLE={Towards Hardware Intrinsic Security: Foundation and Practice},
	PUBLISHER={Springer},
	PAGES={105-139},
	MONTH={11},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-YSPY10,
 	AUTHOR={Yu, Yu and Standaert, François-Xavier and Pereira, Olivier and Yung, Moti},
	TITLE={{Practical leakage-resilient pseudorandom generators}},
	BOOKTITLE={Proceedings of the 17th ACM conference on Computer and communications security},
	PUBLISHER={ACM},
	PAGES={141--151},
	MONTH={10},
	YEAR={2010},
}

@ARTICLE{cgUCL-SJSMSA10,
 	AUTHOR={Shariati, Saloomeh and Jacques, Laurent  and Standaert, François-Xavier and Macq, Benoit and Salhi, Mohamad Amine  and Antoine, Philippe},
	TITLE={{Randomly Driven Fuzzy Key Extraction of Uncloneable Images}},
	JOURNAL={The International Conference on Image Processing (ICIP)},
	MONTH={9},
	YEAR={2010},
}

@ARTICLE{cgUCL-BSQ10,
 	AUTHOR={Bulens, Philippe and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{How to Strongly Link Data and its Medium: the Paper Case}},
	JOURNAL={IET Information Security},
	VOLUME={2},
	PAGES={125-236},
	MONTH={9},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-HHSFB10,
 	AUTHOR={Heidar Kamel, Dina and Hocquet, Cédric and Standaert, François-Xavier and Flandre, Denis and Bol, David},
	TITLE={{Glitch-Induced Within-Die Variations of Dynamic Energy in Voltage-Scaled Nano-CMOS Circuits}},
	BOOKTITLE={proceedings of ESSCIRC 2010},
	MONTH={9},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-S10,
 	AUTHOR={Standaert, François-Xavier},
	TITLE={{How Leaky is an Extractor?}},
	BOOKTITLE={proceedings of LatinCrypt 2010},
	PUBLISHER={Spinger},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6212},
	PAGES={294-304},
	MONTH={8},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-RS10,
 	AUTHOR={Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Representation-, Leakage- and Cipher- Dependencies in Algebraic Side-Channel Attacks}},
	BOOKTITLE={industrial track of ACNS 2010},
	MONTH={6},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-CS10,
 	AUTHOR={Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{Multi-Trail Statistical Saturation Attacks}},
	BOOKTITLE={ACNS 2010},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6487},
	PAGES={123-138},
	MONTH={6},
	YEAR={2010},
}

@ARTICLE{cgUCL-SSJMSA10,
 	AUTHOR={Shariati, Saloomeh and Standaert, François-Xavier and Jacques, Laurent  and Macq, Benoit and Salhi, Mohamad Amine  and Antoine, Philippe},
	TITLE={{Random Profiles of Laser Marks}},
	JOURNAL={Proceedings of the 31th symposium on Information Theory in the Benelux},
	PAGES={27-34},
	MONTH={5},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-DS10,
 	AUTHOR={de Meulenaer, Giacomo and Standaert, François-Xavier},
	TITLE={{Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks}},
	BOOKTITLE={2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT 2010)},
	PUBLISHER={Springer's Lecture Notes of ICST - LNICST},
	MONTH={5},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-MSGR10,
 	AUTHOR={Medwed, Marcel and Standaert, François-Xavier and Großschädl, Johann and Regazzoni, Francesco},
	TITLE={{Fresh Re-Keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices}},
	BOOKTITLE={Progress in Cryptology - Africacrypt 2010},
	PUBLISHER={Springer Verlag},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6055},
	PAGES={279-296},
	MONTH={5},
	YEAR={2010},
}

@CGREPORT{cgUCL-DS10,
 	AUTHOR={de Meulenaer, Giacomo and Standaert, François-Xavier},
	TITLE={{Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks}},
	NOTE={Extended abstract of the poster presented at the third ACM conference on Wireless Network Security (WiSec ’10)},
	MONTH={3},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-RS09,
 	AUTHOR={Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Algebraic Side-Channel Attacks}},
	BOOKTITLE={Information Security and Cryptology (INSCRYPT) 2009},
	PUBLISHER={Springer},
	EDITOR={Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6151},
	PAGES={393-410},
	MONTH={12},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-HBSF09,
 	AUTHOR={Heidar Kamel, Dina and Bol, David and Standaert, François-Xavier and Flandre, Denis},
	TITLE={{Comparison of Ultra-Low-Power and static CMOS full adders in 0.15 μm FD SOI CMOS}},
	BOOKTITLE={SOI Conference},
	PUBLISHER={IEEE},
	MONTH={10},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-RCSBKBLI09,
 	AUTHOR={Regazzoni, Francesco and Cevrero, Alessandro and Standaert, François-Xavier and Badel, Stephane and Kluter, Theo and Brisk, Philip and Leblebici, Yusuf and Ienne, Paolo},
	TITLE={{A Design Flow and Evaluation Framework for DPA-resistant Instruction Set Extensions}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5747},
	PAGES={205-219},
	MONTH={9},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-RSV09,
 	AUTHOR={Renauld, Mathieu and Standaert, François-Xavier and Veyrat-Charvillon, Nicolas},
	TITLE={{Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5747},
	PAGES={97-111},
	MONTH={9},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-SKS09,
 	AUTHOR={Standaert, François-Xavier and Koeune, François and Schindler, Werner},
	TITLE={{How to Compare Profiled Side-Channel Attacks}},
	BOOKTITLE={proceedings of ACNS 2009},
	PUBLISHER={Spinger},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5536},
	PAGES={485-498},
	MONTH={6},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-RS09,
 	AUTHOR={Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Combining Algebraic and Side-Channel Cryptanalysis against Block Ciphers}},
	BOOKTITLE={30-th Symposium on Information Theory in the Benelux},
	JOURNAL={Proceedings of the 30th symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-HSF09,
 	AUTHOR={Heidar Kamel, Dina and Standaert, François-Xavier and Flandre, Denis},
	TITLE={{Scaling trends of the AES S-Box low power consumption in 130 and 65 nm CMOS technology nodes}},
	BOOKTITLE={ISCAS},
	PUBLISHER={IEEE Circuits and Systems Society,  IEEE},
	MONTH={5},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-CS09,
 	AUTHOR={Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{A Statistical Saturation Attack on the Block Cipher PRESENT}},
	BOOKTITLE={CT-RSA 2009},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5473},
	PAGES={195-210},
	MONTH={4},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-KAKSP08,
 	AUTHOR={Kim, Chong Hee and Avoine, Gildas and Koeune, François and Standaert, François-Xavier and Pereira, Olivier},
	TITLE={{The Swiss-Knife RFID Distance Bounding Protocol}},
	BOOKTITLE={The 11th International Conference on Information Security and Cryptology - ICISC 2008},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5461},
	PAGES={98-115},
	MONTH={12},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-DGSP08,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Standaert, François-Xavier and Pereira, Olivier},
	TITLE={{On the Energy Cost of Communications and Cryptography in Wireless Sensor Networks}},
	BOOKTITLE={(extended version), IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob'2008)},
	JOURNAL={IEEE International Conference on Wireless & Mobile Computing, Networking & Communication},
	PAGES={580-585},
	MONTH={10},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-BSQPR08,
 	AUTHOR={Bulens, Philippe and Standaert, François-Xavier and Quisquater, Jean-Jacques and Pellegrin, Pascal and Rouvroy, Gaël},
	TITLE={{Implementation of the AES-128 on Virtex-5 FPGAs}},
	BOOKTITLE={Progress in Cryptology - AfricaCrypt 2008},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5023},
	PAGES={16-26},
	MONTH={6},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-DGSV08,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Standaert, François-Xavier and Vandendorpe, Luc},
	TITLE={{On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks}},
	BOOKTITLE={Twenty-ninth Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-GSQ08,
 	AUTHOR={Gosset, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementation of SQUASH}},
	BOOKTITLE={Twenty-ninth Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-PSPMY08,
 	AUTHOR={Petit, Christophe and Standaert, François-Xavier and Pereira, Olivier and Malkin, Tal G. and Yung, Moti},
	TITLE={{A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery}},
	BOOKTITLE={ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security},
	PUBLISHER={ACM},
	EDITOR={M. Abe and V. Gligor},
	PAGES={56--65},
	MONTH={3},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-QCS08,
 	AUTHOR={Quisquater, Jean-Jacques and Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent}},
	BOOKTITLE={ Fast Software Encryption 2008},
	PUBLISHER={Springer},
	SERIES={Lecture Notes on Computer Science},
	VOLUME={5086},
	PAGES={382-397},
	MONTH={2},
	YEAR={2008},
}

@ARTICLE{cgUCL-MSQ08,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementation(s) of a Scalable Encryption Algorithm}},
	PUBLISHER={IEEE Circuits and Systems Society,  IEEE},
	EDITOR={IEEE},
	JOURNAL={IEEE Transactions on Very Large Scale Integration (VLSI) Systems},
	VOLUME={16},
	PAGES={212-216},
	MONTH={2},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-CSQ07,
 	AUTHOR={Collard, Baudoin and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Improving the Time Complexity of Matsui's Linear Cryptanalysis}},
	BOOKTITLE={The International Conference on Information Security and Cryptology - ICISC 2007},
	PUBLISHER={Springer},
	EDITOR={K.-H. Nam and G. Rhee},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4817},
	PAGES={77-88},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MSQ07,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Simulation-Based Evaluation of Logic Styles to Counteract Side-Channel Attacks}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Sciences},
	VOLUME={4727},
	PAGES={427-442},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-SQC07,
 	AUTHOR={Standaert, François-Xavier and Quisquater, Jean-Jacques and Collard, Baudoin},
	TITLE={{Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent}},
	BOOKTITLE={Inscrypt 2007},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4990},
	PAGES={51-65},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MSQ07,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{ASIC Implementations of the Block Cipher SEA for Constrained Applications}},
	BOOKTITLE={Proceedings of the Third International Conference on RFID Security - RFIDSec 2007},
	PAGES={103-114},
	MONTH={7},
	YEAR={2007},
}

@ARTICLE{cgUCL-BKSQ07,
 	AUTHOR={Bulens, Philippe and Kalach, Kassem and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile}},
	PUBLISHER={SASC, January 31 - February 1, 2007},
	NOTE={http://sasc.cry},
	MONTH={1},
	YEAR={2007},
}

@ARTICLE{cgUCL-S06,
 	AUTHOR={Standaert, François-Xavier},
	TITLE={{A Didactic Classification of Some Illustrative Leakage Functions}},
	BOOKTITLE={proceedings of WISSEC 2006},
	MONTH={11},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-KS06,
 	AUTHOR={Koeune, François and Standaert, François-Xavier},
	TITLE={{ A Tutorial on Physical Security and Side-Channel Attacks}},
	BOOKTITLE={ Foundations of Security Analysis and Design III : FOSAD 2004/2005},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3655},
	PAGES={78-108},
	MONTH={11},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SPAQ06,
 	AUTHOR={Standaert, François-Xavier and Peeters, Eric and Archambeau, Cédric and Quisquater, Jean-Jacques},
	TITLE={{Towards Security Limits of Side-Channel Attacks}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2006},
	PUBLISHER={Springer},
	EDITOR={Louis Goubin and Mitsuru Matsui},
	SERIES={LNCS},
	VOLUME={4249},
	PAGES={30-45},
	MONTH={10},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-APSQ06,
 	AUTHOR={Archambeau, Cédric and Peeters, Eric and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Template Attacks in Principal Subspaces}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2006},
	PUBLISHER={Springer},
	EDITOR={Louis Goubin and Mitsuru Matsui},
	SERIES={LNCS},
	VOLUME={4249},
	PAGES={1--14},
	MONTH={10},
	YEAR={2006},
}

@ARTICLE{cgUCL-PSQ06,
 	AUTHOR={Peeters, Eric and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Power and Electromagnetic Analysis: Improved Model, Consequences and Comparisons}},
	PUBLISHER={Elsevier},
	EDITOR={Nadia Nedjah, Luiza de Macedo Mourelle},
	JOURNAL={Special Issue of Integration, The VLSI Journal: Embedded Cryptographic Hardware},
	NOTE={To Appear},
	MONTH={9},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SRQ06,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks}},
	BOOKTITLE={proceedings of FPL 2006},
	MONTH={8},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SPGQ06,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Gershenfeld, Neil and Quisquater, Jean-Jacques},
	TITLE={{SEA: a Scalable Encryption Algorithm for Small Embedded Applications}},
	BOOKTITLE={CARDIS},
	PUBLISHER={Springer-Verlag},
	MONTH={4},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SMPQ06,
 	AUTHOR={Standaert, François-Xavier and Mace, François and Peeters, Eric and Quisquater, Jean-Jacques},
	TITLE={{Updates on the Security of FPGAs Against Power Analysis Attacks}},
	BOOKTITLE={ARC},
	VOLUME={3985},
	PAGES={335-346},
	MONTH={3},
	YEAR={2006},
}

@ARTICLE{cgUCL-SPRQ06,
 	AUTHOR={Standaert, François-Xavier and Peeters, Eric and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays}},
	PUBLISHER={IEEE},
	JOURNAL={Proceedings of the IEEE},
	VOLUME={94},
	MONTH={2},
	YEAR={2006},
}

@ARTICLE{cgUCL-SPRQ06,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of the ICEBERG Block Cipher}},
	PUBLISHER={Elsevier},
	JOURNAL={The VLSI Journal},
	MONTH={2},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-MSQL05,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Design Methodology for Secured ICs Using Dynamic Current Mode Logic}},
	BOOKTITLE={Power and Timing Modeling, Optimization and Simulation - Proceedings of PATMOS 2005},
	PUBLISHER={Springer},
	EDITOR={V. Paliouras},
	SERIES={Lecture Notes in Computer Science},
	PAGES={550-560},
	MONTH={9},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSY05,
 	AUTHOR={Malkin, Tal G. and Standaert, François-Xavier and Yung, Moti},
	TITLE={{A Comparative Cost/Security Analysis of Fault Attack Countermeasures}},
	BOOKTITLE={FDTC 2005/2006},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4236},
	PAGES={159-172},
	MONTH={9},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-PSDQ05,
 	AUTHOR={Peeters, Eric and Standaert, François-Xavier and Donckers, Nicolas and Quisquater, Jean-Jacques},
	TITLE={{Improved Higher Order Side-Channel Attacks with FPGA experiments}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2005},
	PUBLISHER={Spinger-Verlag},
	EDITOR={Josyula R. Rao, Berk Sunar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3659},
	PAGES={309-323},
	MONTH={8},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPGQ05,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Gershenfeld, Neil and Quisquater, Jean-Jacques},
	TITLE={{SEA: a Scalable Encryption Algorithm for Small Embedded Applications}},
	BOOKTITLE={Workshop on Lightweight Crypto},
	MONTH={7},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-LSRQ05,
 	AUTHOR={Léglise, Philippe and Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{Efficient Implementation of Recent Stream Ciphers on Reconfigurable Hardware Devices}},
	BOOKTITLE={26th Symposium on Information Theory in the Benelux},
	PAGES={261-268},
	MONTH={5},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPQ05,
 	AUTHOR={Standaert, François-Xavier and Peeters, Eric and Quisquater, Jean-Jacques},
	TITLE={{On the Masking Countermeasure and Higher-Order Power Analysis Attacks}},
	BOOKTITLE={ITCC 2005},
	PUBLISHER={IEEE Computer Society},
	VOLUME={1},
	PAGES={562-567},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPRQ05,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of the ICEBERG Block Cipher}},
	BOOKTITLE={ITCC 2005},
	NOTE={To appear},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SLRQML05,
 	AUTHOR={Standaert, François-Xavier and Lefèbvre, Frédéric and Rouvroy, Gaël and Quisquater, Jean-Jacques and Macq, Benoit and Legat, Jean-Didier},
	TITLE={{Practical Evaluation of a Radial Soft Hash Algorithm}},
	BOOKTITLE={ITCC 2005},
	NOTE={To appear},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSLQ05,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Legat, Jean-Didier and Quisquater, Jean-Jacques},
	TITLE={{Recommendations for Secure IC's and ASIC's}},
	BOOKTITLE={CEPA2 Workshop - What Technologies in Defence Applications for Digital Signal Processing Now and in the Future},
	PAGES={NA},
	MONTH={3},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-QS05,
 	AUTHOR={Quisquater, Jean-Jacques and Standaert, François-Xavier},
	TITLE={{Exhaustive Key Search of the DES: Updates and Refinements}},
	BOOKTITLE={SHARCS 2005},
	NOTE={To appear},
	MONTH={2},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSHQL04,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Hassoune, Ilham and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Dynamic Current Mode Logic to Counteract Power Analysis Attacks}},
	BOOKTITLE={DCIS 2004 - 19th Conference on Design of Circuits and Integrated Systems},
	PAGES={186-191},
	MONTH={11},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-RLSMQL04,
 	AUTHOR={Rouvroy, Gaël and Lefèbvre, Frédéric and Standaert, François-Xavier and Macq, Benoit and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Hardware Implementation of a Fingerprinting Algorithm Suited for Digital Cinema}},
	BOOKTITLE={Eusipco 2004},
	MONTH={9},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-PSRQ04,
 	AUTHOR={Piret, Gilles and Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{On the Security of the DeKart Primitive}},
	BOOKTITLE={Smart Card Research and Advanced Applications (CARDIS 2004)},
	PUBLISHER={Kluwer Academic Publishers},
	EDITOR={J.-J. Quisquater, P. Paradinas, Y. Deswarte, and A.A. El Kal},
	PAGES={241-254},
	MONTH={8},
	YEAR={2004},
}

@ARTICLE{cgUCL-QNPS04,
 	AUTHOR={Quisquater, Jean-Jacques and Neve, Michael and Peeters, Eric and Standaert, François-Xavier},
	TITLE={{L'émission rayonnée des cartes à puces : une vue d'ensemble}},
	JOURNAL={Revue de l'Electricité et de l'Electronique},
	MONTH={6},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-RSQL04,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Compact and Efficient Encryption/Decryption Module for FPGA Implementation of AES Rijndael Very Well Suited for Small Embedd}},
	BOOKTITLE={ITCC 2004, special session on embedded cryptographic hardware},
	PUBLISHER={IEEE Computer Society},
	VOLUME={2},
	PAGES={583-587},
	MONTH={4},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-SPRQL04,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{ICEBERG: an Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware}},
	BOOKTITLE={FSE 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3017},
	PAGES={279-298},
	MONTH={2},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-QS04,
 	AUTHOR={Quisquater, Jean-Jacques and Standaert, François-Xavier},
	TITLE={{Time-Memory Tradeoffs}},
	BOOKTITLE={Encycolpedia of Cryptography and Security},
	PUBLISHER={Springer-Verlag},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-SOP04,
 	AUTHOR={Standaert, François-Xavier and Ors, Siddika Berna and Preneel, Bart},
	TITLE={{Power Analysis of an FPGA Implementation of Rijndael: Is Pipelining a DPA Countermeasure?}},
	BOOKTITLE={CHES 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	PAGES={30-44},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-SOQP04,
 	AUTHOR={Standaert, François-Xavier and Ors, Siddika Berna and Quisquater, Jean-Jacques and Preneel, Bart},
	TITLE={{Power Analysis Attacks against FPGA Implementations of the DES}},
	BOOKTITLE={FPL 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	PAGES={84-94},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-RSLQML04,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Lefèbvre, Frédéric and Quisquater, Jean-Jacques and Macq, Benoit and Legat, Jean-Didier},
	TITLE={{Reconfigurable Hardware Solutions for the Digital Rights Management of Digital Cinema}},
	BOOKTITLE={DRM 2004},
	PUBLISHER={ACM},
	PAGES={40-53},
	MONTH={1},
	YEAR={2004},
}

@INBOOK{cgUCL-RSQL04,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Compact and Efficient Encryption/Decryption Module for FPGA Implementation of AES}},
	BOOKTITLE={Embedded Cryptographic Hardware: Design and Security},
	PUBLISHER={Nova Science Publishers},
	EDITOR={Nadia Nedjah and Luiza de Macedo Mourelle},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-SRQL03,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs}},
	BOOKTITLE={CHES 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2523},
	PAGES={334-350},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Design Strategies and Modifed Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Tri}},
	BOOKTITLE={FPL 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2778},
	PAGES={181-193},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SVSQ03,
 	AUTHOR={Standaert, François-Xavier and van Oldeneel tot Oldenzeel, Loic and Samyde, David and Quisquater, Jean-Jacques},
	TITLE={{Differential Power Analysis of FPGAs : How Practical is the Attack?}},
	BOOKTITLE={FPL 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2778},
	PAGES={701-709},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SPRQL03,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Key-Dependent Approximations in Cryptanalysis}},
	BOOKTITLE={the 24th Symposium on Information Theory in the Benelux},
	PAGES={53-62},
	MONTH={5},
	YEAR={2003},
}

@ARTICLE{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient Uses of FPGAs for Implementations of the DES and its Experimental Linear Cryptanalysis}},
	VOLUME={32},
	PAGES={473-482},
	MONTH={4},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient FPGA implementation of block cipher MISTY1}},
	BOOKTITLE={RAW 2003},
	PAGES={7pp},
	MONTH={4},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SRQL03,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Methodology to Implement Block Ciphers in Reconfigurable Hardware and its Application to Fast and Compact AES Rijndael}},
	BOOKTITLE={FPGA 2003},
	PAGES={216-224},
	MONTH={2},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SRQL02,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1}},
	BOOKTITLE={The Third NESSIE Workshop},
	PAGES={10pp},
	MONTH={11},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-KRSQDL02,
 	AUTHOR={Koeune, François and Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and David, Jean-Pierre and Legat, Jean-Didier},
	TITLE={{A FPGA Implementation of the Linear Cryptanalysis}},
	BOOKTITLE={FPL 2002},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2438},
	PAGES={845-852},
	MONTH={9},
	YEAR={2002},
}

@ARTICLE{cgUCL-RS02,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier},
	TITLE={{Implementation of Cryptographic Standards and Cryptanalysis using FPGA's : Extended Abstract}},
	JOURNAL={Revue E Tijdschrift - 118ème année/118de jaargang},
	MONTH={9},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-QSRDL02,
 	AUTHOR={Quisquater, Jean-Jacques and Standaert, François-Xavier and Rouvroy, Gaël and David, Jean-Pierre and Legat, Jean-Didier},
	TITLE={{A Cryptanalytic Time-Memory Tradeoff : First FPGA Implementation}},
	BOOKTITLE={FPL 2002},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	PAGES={780-789},
	MONTH={9},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-SRQL02,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Time-Memory Tradeoff using Distinguished Points : New Analysis and FPGA Results}},
	BOOKTITLE={CHES 2002},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2523},
	PAGES={593-609},
	MONTH={8},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-RS02,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier},
	TITLE={{FPGA's as Cryptanalytic Tools, IEEE Student Paper Contest Finalist}},
	BOOKTITLE={IEEE Melecon 2002 conference},
	PAGES={209-214},
	MONTH={5},
	YEAR={2002},
}