@INPROCEEDINGS{cgUCL-KSQL07,
 	AUTHOR={Kim, Chong Hee and Shin, Jong Hoon and Quisquater, Jean-Jacques and Lee, Pil Joong},
	TITLE={{Safe-Error Attack on SPA-FA resistant exponentiations using a HW modular multiplier}},
	BOOKTITLE={The International Conference on Information Security and Cryptology - ICISC 2007},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4817},
	PAGES={273-281},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-KHL04,
 	AUTHOR={Kim, Chong Hee and Hwang, Yong Ho and Lee, Pil Joong},
	TITLE={{Practical Pay-TV Scheme using Traitor Tracing Scheme for Multiple Channels}},
	BOOKTITLE={Information Security Applications - WISA 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3325},
	PAGES={265-279},
	MONTH={8},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-KHL04,
 	AUTHOR={Kim, Chong Hee and Hwang, Yong Ho and Lee, Pil Joong},
	TITLE={{TTS without Revocation Capability Secure against CCA2}},
	BOOKTITLE={Information Security and Privacy - ACISP 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3108},
	PAGES={36-49},
	MONTH={7},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-HKL04,
 	AUTHOR={Hwang, Yong Ho and Kim, Chong Hee and Lee, Pil Joong},
	TITLE={{An Efficient Revocation Scheme for Stateless Receivers}},
	BOOKTITLE={Public Key Infrastructure - EuroPKI 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3093},
	PAGES={322-334},
	MONTH={6},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-KHL03,
 	AUTHOR={Kim, Chong Hee and Hwang, Yong Ho and Lee, Pil Joong},
	TITLE={{An Effcient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack}},
	BOOKTITLE={Advances in Cryptology - ASIACRYPT 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2894},
	PAGES={359-373},
	MONTH={11},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-HKL03,
 	AUTHOR={Hwang, Yong Ho and Kim, Chong Hee and Lee, Pil Joong},
	TITLE={{An Effcient Revocation Scheme with Minimal Message Length for Stateless Receivers}},
	BOOKTITLE={Information Security and Privacy - ACISP 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2727},
	PAGES={377-386},
	MONTH={7},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-KL01,
 	AUTHOR={Kim, Chong Hee and Lee, Pil Joong},
	TITLE={{New Key Recovery in WAKE protocol}},
	BOOKTITLE={Public Key Cryptography - PKC 2001},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1992},
	PAGES={325-338},
	MONTH={2},
	YEAR={2001},
}