@INPROCEEDINGS{cgUCL-CCDP10,
 	AUTHOR={Canard, Sébastien and Coisel, Iwen and de Meulenaer, Giacomo and Pereira, Olivier},
	TITLE={{Group Signatures are Suitable for Constrained Devices}},
	BOOKTITLE={ICISC 2010},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={12},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-DS10,
 	AUTHOR={de Meulenaer, Giacomo and Standaert, François-Xavier},
	TITLE={{Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks}},
	BOOKTITLE={2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT 2010)},
	PUBLISHER={Springer's Lecture Notes of ICST - LNICST},
	MONTH={5},
	YEAR={2010},
}

@CGREPORT{cgUCL-DS10,
 	AUTHOR={de Meulenaer, Giacomo and Standaert, François-Xavier},
	TITLE={{Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks}},
	NOTE={Extended abstract of the poster presented at the third ACM conference on Wireless Network Security (WiSec ’10)},
	MONTH={3},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-ADEQ09,
 	AUTHOR={Aboudagga, Nidal and de Meulenaer, Giacomo and Eltoweissy, Mohamed and Quisquater, Jean-Jacques},
	TITLE={{IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups}},
	BOOKTITLE={IEEE Conference on Local Computer Networks (LCN 2009)},
	PUBLISHER={IEEE Computer Society},
	MONTH={10},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-BBBBBBVDFGGKLMPRSU09,
 	AUTHOR={Bailey, Daniel V. and Baldwin, Brian  and Batina, Lejla  and Bernstein, Daniel J.  and Birkner, Peter  and Bos, Joppe W.  and van Damme, Gauthier and de Meulenaer, Giacomo and Fan, Junfeng  and Gurkaynak, Frank  and Güneysu, Tim  and Kleinjung, Thorsten  and Lange, Tanja and Mentens, Nele  and Paar, Christof  and Regazzoni, Francesco and Schwabe, Peter  and Uhsadel, Leif },
	TITLE={{The Certicom Challenges ECC2-X}},
	BOOKTITLE={Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'09)},
	MONTH={9},
	YEAR={2009},
}

@ARTICLE{cgUCL-DPQ09,
 	AUTHOR={de Meulenaer, Giacomo and Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?}},
	JOURNAL={Cryptology ePrint Archive},
	NOTE={Report 2009/229},
	MONTH={5},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-DGSP08,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Standaert, François-Xavier and Pereira, Olivier},
	TITLE={{On the Energy Cost of Communications and Cryptography in Wireless Sensor Networks}},
	BOOKTITLE={(extended version), IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob'2008)},
	JOURNAL={IEEE International Conference on Wireless & Mobile Computing, Networking & Communication},
	PAGES={580-585},
	MONTH={10},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-DGSV08,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Standaert, François-Xavier and Vandendorpe, Luc},
	TITLE={{On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks}},
	BOOKTITLE={Twenty-ninth Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-DGMQ07,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Elliptic Curve Factorization Method : Towards Better Exploitation of Reconfigurable Hardware}},
	BOOKTITLE={Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'07)},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-DGMQ07,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware}},
	BOOKTITLE={IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07)},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={197-207},
	MONTH={4},
	YEAR={2007},
}