@INPROCEEDINGS{cgUCL-SPY13,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu},
	TITLE={{Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions}},
	BOOKTITLE={Advances in Cryptology – CRYPTO 2013 },
	SERIES={Lecture Notes in Computer Science},
	PAGES={335--352},
	NOTE={Full version from http://eprint.iacr.org/2013/370},
	MONTH={8},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-BDKPPSY11,
 	AUTHOR={Barak, Boaz and Dodis, Yevgeniy and Krawczyk, Hugo and Pereira, Olivier and Pietrzak, Krzysztof and Standaert, François-Xavier and Yu, Yu},
	TITLE={{Leftover Hash Lemma, Revisited}},
	BOOKTITLE={Advances in Cryptology - CRYPTO 2011},
	PUBLISHER={Springer-Verlag},
	EDITOR={Phillip Rogaway},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6841},
	PAGES={1-20},
	MONTH={8},
	YEAR={2011},
}

@INBOOK{cgUCL-SPYQYO10,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu and Quisquater, Jean-Jacques and Yung, Moti and Oswald, Elisabeth},
	TITLE={{Leakage Resilient Cryptography in Practice}},
	BOOKTITLE={Towards Hardware Intrinsic Security: Foundation and Practice},
	PUBLISHER={Springer},
	PAGES={105-139},
	MONTH={11},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-YSPY10,
 	AUTHOR={Yu, Yu and Standaert, François-Xavier and Pereira, Olivier and Yung, Moti},
	TITLE={{Practical leakage-resilient pseudorandom generators}},
	BOOKTITLE={Proceedings of the 17th ACM conference on Computer and communications security},
	PUBLISHER={ACM},
	PAGES={141--151},
	MONTH={10},
	YEAR={2010},
}