@INPROCEEDINGS{cgUCL-KA09,
 	AUTHOR={Kim, Chong Hee and Avoine, Gildas},
	TITLE={{RFID distance bounding protocol with mixed challenges to prevent relay attacks}},
	BOOKTITLE={The 8th International Conference on Cryptology and Network Security - CANS2009},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5888},
	PAGES={119-133},
	MONTH={12},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-KAKSP08,
 	AUTHOR={Kim, Chong Hee and Avoine, Gildas and Koeune, François and Standaert, François-Xavier and Pereira, Olivier},
	TITLE={{The Swiss-Knife RFID Distance Bounding Protocol}},
	BOOKTITLE={The 11th International Conference on Information Security and Cryptology - ICISC 2008},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5461},
	PAGES={98-115},
	MONTH={12},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-KQ08,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{Method for Detecting Vulnerability to Doubling Attacks}},
	BOOKTITLE={10th International Conference on Information and Communications Security - ICICS 2008},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5308},
	PAGES={97-110},
	MONTH={10},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-SK08,
 	AUTHOR={Schmidt, Jörn-Marc and Kim, Chong Hee},
	TITLE={{A Probing Attack on AES}},
	BOOKTITLE={The 9th International Workshop on Information Security Applications - WISA 2008},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	NOTE={to appear},
	MONTH={9},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-KQ08,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{New Differential Fault Analysis on AES Key Schedule: Two Faults are enough}},
	BOOKTITLE={Eighth Smart Card Research and Advanced Application IFIP Conference - CARDIS 2008},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5189},
	PAGES={48-60},
	MONTH={9},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-KBPQ08,
 	AUTHOR={Kim, Chong Hee and Bulens, Philippe and Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Fault Attacks on Public Key Elements: Application to DLP based Schemes}},
	BOOKTITLE={Fifth European PKI Workshop - EUROPKI 2008},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5057},
	PAGES={182-195},
	MONTH={6},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-KSQL07,
 	AUTHOR={Kim, Chong Hee and Shin, Jong Hoon and Quisquater, Jean-Jacques and Lee, Pil Joong},
	TITLE={{Safe-Error Attack on SPA-FA resistant exponentiations using a HW modular multiplier}},
	BOOKTITLE={The International Conference on Information Security and Cryptology - ICISC 2007},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4817},
	PAGES={273-281},
	MONTH={11},
	YEAR={2007},
}

@ARTICLE{cgUCL-KQ07,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{Faults, Injection Methods, and Fault Attacks}},
	PUBLISHER={IEEE Computer Society},
	JOURNAL={IEEE Design and Test of Computers},
	VOLUME={24},
	PAGES={544-545},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-KQ07,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{How can we overcome both side channel analysis and fault attacks on RSA-CRT?}},
	BOOKTITLE={4th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2007},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={21-29},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-KQ07,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures}},
	BOOKTITLE={Workshop in Information Security Theory and Practices: Smart cards, Mobile and Ubiquitous computing systems - WISTP 2007},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4462},
	PAGES={215-228},
	MONTH={5},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-KHL04,
 	AUTHOR={Kim, Chong Hee and Hwang, Yong Ho and Lee, Pil Joong},
	TITLE={{Practical Pay-TV Scheme using Traitor Tracing Scheme for Multiple Channels}},
	BOOKTITLE={Information Security Applications - WISA 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3325},
	PAGES={265-279},
	MONTH={8},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-KHL04,
 	AUTHOR={Kim, Chong Hee and Hwang, Yong Ho and Lee, Pil Joong},
	TITLE={{TTS without Revocation Capability Secure against CCA2}},
	BOOKTITLE={Information Security and Privacy - ACISP 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3108},
	PAGES={36-49},
	MONTH={7},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-HKL04,
 	AUTHOR={Hwang, Yong Ho and Kim, Chong Hee and Lee, Pil Joong},
	TITLE={{An Efficient Revocation Scheme for Stateless Receivers}},
	BOOKTITLE={Public Key Infrastructure - EuroPKI 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3093},
	PAGES={322-334},
	MONTH={6},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-KHL03,
 	AUTHOR={Kim, Chong Hee and Hwang, Yong Ho and Lee, Pil Joong},
	TITLE={{An Effcient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack}},
	BOOKTITLE={Advances in Cryptology - ASIACRYPT 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2894},
	PAGES={359-373},
	MONTH={11},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-HKL03,
 	AUTHOR={Hwang, Yong Ho and Kim, Chong Hee and Lee, Pil Joong},
	TITLE={{An Effcient Revocation Scheme with Minimal Message Length for Stateless Receivers}},
	BOOKTITLE={Information Security and Privacy - ACISP 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2727},
	PAGES={377-386},
	MONTH={7},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-KL01,
 	AUTHOR={Kim, Chong Hee and Lee, Pil Joong},
	TITLE={{New Key Recovery in WAKE protocol}},
	BOOKTITLE={Public Key Cryptography - PKC 2001},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1992},
	PAGES={325-338},
	MONTH={2},
	YEAR={2001},
}