@ARTICLE{cgUCL-GLQ98,
 	AUTHOR={Gilmont, Tanguy and Legat, Jean-Didier and Quisquater, Jean-Jacques},
	TITLE={{An architecture of security management unit for safe hosting of multiple agents}},
	BOOKTITLE={Proceedings of COST 254},
	PAGES={79-82},
	MONTH={11},
	YEAR={1998},
}

@BOOK{cgUCL-98,
 	TITLE={{Proceedings of the 5th European Symposium on Research in Computer Security  (ESORICS 98),  Proceedings of the 5th European Sympo}},
	PUBLISHER={Springer-Verlag},
	SERIES={Lectures Notes in Computer Security},
	MONTH={9},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-ADF98,
 	AUTHOR={Augot, D. and Delaigle, Jean-François and Fontaine, C.},
	TITLE={{DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System}},
	BOOKTITLE={Proceedings of the 5th European Symposium on Research in Computer Security  (ESORICS 98)},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Security},
	VOLUME={1485},
	PAGES={241-256},
	MONTH={9},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-DHQ98,
 	AUTHOR={Desmedt, Yvo and Hou, S. and Quisquater, Jean-Jacques},
	TITLE={{Cerebral Cryptography}},
	BOOKTITLE={Proceedings of Information Hiding, Second International Workshop},
	PAGES={62-72},
	MONTH={4},
	YEAR={1998},
}

@ARTICLE{cgUCL-GQ98,
 	AUTHOR={Gilbert, H. and Quisquater, Jean-Jacques},
	TITLE={{Attacks on Shamir's 'RSA for paranoids'}},
	JOURNAL={Information Processing Letters 68},
	PAGES={197-199},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-S98,
 	AUTHOR={Stern, Julien},
	TITLE={{A New and Efficient All-Or-Nothing Disclosure of Secrets}},
	BOOKTITLE={Proceedings of Asiacrypt'98},
	PUBLISHER={Springer-Verlag},
	EDITOR={K. Ohta and D. Pei},
	SERIES={Lectures Notes in Computer Science},
	VOLUME={1514},
	PAGES={357-371},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-HQ98,
 	AUTHOR={Hou, S. and Quisquater, Jean-Jacques},
	TITLE={{Audio and Optical Cryptography}},
	BOOKTITLE={Proceedings of Asiacrypt'98},
	PUBLISHER={Springer-Verlag},
	EDITOR={K. Ohta and D. Pei},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1514},
	PAGES={392-404},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-DKLMQW98,
 	AUTHOR={Dhem, Jean-François and Koeune, François and Leroux, Philippe-Alexandre and Mestré, Patrick and Quisquater, Jean-Jacques and Willems, Jean-Louis},
	TITLE={{A practical implementation of the timing attack}},
	BOOKTITLE={Proceedings of the Third Working Conference on Smart Card Research and Advanced Applications (CARDIS 1998)},
	PUBLISHER={Springer-Verlag},
	EDITOR={Jean-Jacques Quisquater and Bruce Schneier},
	SERIES={LNCS},
	VOLUME={1820},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-JQ98,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Cryptanalysis of RSA-type cryptosystems: a visit}},
	BOOKTITLE={Network Threats},
	PUBLISHER={American Mathematical Society},
	EDITOR={R. N. Wright and P. G. Neumann},
	SERIES={DIMACS Series in Discrete Mathematics an},
	PAGES={21-31},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-JQ98,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams}},
	BOOKTITLE={Designs, Codes and Cryptography},
	VOLUME={14},
	PAGES={53-56},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-JQT98,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques and Takagi, Tsuyoshi},
	TITLE={{Are strong primes really stronger?}},
	BOOKTITLE={Proc. of the Eighth National Symposium on Information Security},
	EDITOR={D.J. Guan},
	PAGES={355-367},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-98,
 	TITLE={{Specifying Security in a Composite System}},
	BOOKTITLE={Information Security Workshop (ISW'1997)},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Note in Computer Science},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-L98,
 	AUTHOR={Lobelle, Marc},
	TITLE={{Threats in Distance Learning Systems}},
	BOOKTITLE={International World Conference on Continuous Engineering Education, 7th WCCEE 98},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-98,
 	TITLE={{Towards an Object Based Access Control model}},
	BOOKTITLE={Global-IT Security, IFIP-SEC 1998},
	EDITOR={G.Papp},
	MONTH={1},
	YEAR={1998},
}

@INPROCEEDINGS{cgUCL-DDQM98,
 	AUTHOR={Darmstaedter, V. and Delaigle, Jean-François and Quisquater, Jean-Jacques and Macq, Benoit},
	TITLE={{Low-cost spatial watermarking}},
	BOOKTITLE={Computer & Graphics},
	VOLUME={22},
	PAGES={417-424},
	MONTH={1},
	YEAR={1998},
}