@ARTICLE{cgUCL-KBBS20,
 	AUTHOR={Kamel, Dina and Bellizia, Davide and Bronchain, Olivier and Standaert, François-Xavier},
	TITLE={{Side-channel analysis of a learning parity with physical noise processor}},
	PUBLISHER={Springer Berlin Heidelberg},
	JOURNAL={Journal of Cryptographic Engineering},
	PAGES={1-9},
	MONTH={9},
	YEAR={2020},
}

@INPROCEEDINGS{cgUCL-BBCGGMPPS20,
 	AUTHOR={Bellizia, Davide and Bronchain, Olivier and Cassiers, Gaëtan and Grosso, Vincent and Guo, Chun and Momin, Charles and Pereira, Olivier and Peters, Thomas and Standaert, François-Xavier},
	TITLE={{Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle}},
	BOOKTITLE={Advances in Cryptology - CRYPTO 2020},
	PUBLISHER={Spinger},
	EDITOR={Daniele Micciancio and Thomas Ristenpart},
	PAGES={369--400},
	MONTH={8},
	YEAR={2020},
}

@ARTICLE{cgUCL-LBBS20,
 	AUTHOR={Levi, Itamar and Bellizia, Davide and Bol, David and Standaert, François-Xavier},
	TITLE={{Ask Less, Get More: Side-Channel Signal Hiding, Revisited}},
	PUBLISHER={IEEE},
	JOURNAL={ IEEE Transactions on Circuits and Systems I: Regular Papers},
	PAGES={1-14},
	MONTH={7},
	YEAR={2020},
}

@ARTICLE{cgUCL-BBBCDGLLLMPSUW20,
 	AUTHOR={Bellizia, Davide and Berti, Francesco and Bronchain, Olivier and Cassiers, Gaëtan and Duval, Sebastien and Guo, Chun and Leander, Gregor and Leurent, Gaëtan and Levi, Itamar and Momin, Charles and Pereira, Olivier and Standaert, François-Xavier and Udvarhelyi, Balazs and Wiemer, Friedrich},
	TITLE={{Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher}},
	PUBLISHER={IACR},
	JOURNAL={IACR Transactions on Symmetric Cryptology},
	PAGES={295-349},
	MONTH={6},
	YEAR={2020},
}

@ARTICLE{cgUCL-LBS20,
 	AUTHOR={Levi, Itamar and Bellizia, Davide and Standaert, François-Xavier},
	TITLE={{Beyond algorithmic noise or how to shuffle parallel implementations?}},
	PUBLISHER={Wiley},
	EDITOR={Wiley},
	JOURNAL={International Journal of Circuit Theory and Applications},
	MONTH={2},
	YEAR={2020},
}

@ARTICLE{cgUCL-LBS19,
 	AUTHOR={Levi, Itamar and Bellizia, Davide and Standaert, François-Xavier},
	TITLE={{Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations And an Explanation Based on Externally-Amplified Couplings}},
	PUBLISHER={IACR},
	JOURNAL={IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES)},
	VOLUME={2019},
	PAGES={293-317},
	MONTH={2},
	YEAR={2019},
}

@INPROCEEDINGS{cgUCL-NLSF18,
 	AUTHOR={Nawaz, Kashif and Levi, Itamar and Standaert, François-Xavier and Flandre, Denis},
	TITLE={{A Transient Noise Analysis of Secured Dual-Rail Based Logic Style}},
	BOOKTITLE={2nd New Generation of Circuits & Systems Conference, NGCAS},
	PUBLISHER={IEEE Circuits and Systems Society,  IEEE},
	NOTE={to appear},
	MONTH={11},
	YEAR={2018},
}

@INPROCEEDINGS{cgUCL-HBSFB18,
 	AUTHOR={Heidar Kamel, Dina and Bellizia, Davide and Standaert, François-Xavier and Flandre, Denis and Bol, David},
	TITLE={{Demonstrating an LPPN Processor}},
	PUBLISHER={ACM},
	JOURNAL={Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security},
	SERIES={ASHES '18},
	PAGES={18-23},
	MONTH={10},
	YEAR={2018},
}

@INPROCEEDINGS{cgUCL-NVSF18,
 	AUTHOR={Nawaz, Kashif and Van Brandt, Léopold and Standaert, François-Xavier and Flandre, Denis},
	TITLE={{Let's make it Noisy: A Simulation Methodology for adding Intrinsic Physical Noise to Cryptographic Designs}},
	BOOKTITLE={PhD Research in Microelectronics and Electronics (PRIME 2018), Prague, Czech Republic},
	PUBLISHER={IEEE Circuits and Systems Society,  IEEE},
	NOTE={10.1109/PRIME.2018.8430315},
	MONTH={7},
	YEAR={2018},
}

@INPROCEEDINGS{cgUCL-PGSCG17,
 	AUTHOR={Poussier, Romain and Guo, Qian and Standaert, François-Xavier and Carlet, Claude and Guillet, Sylvain},
	TITLE={{Connecting and Improving Direct Sum Masking and Inner Product Masking}},
	BOOKTITLE={CARDIS 2017},
	PUBLISHER={Springer},
	EDITOR={Thomas Eisenbarth & Yannick Teglia},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={11},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-PZS17,
 	AUTHOR={Poussier, Romain and Zhou, Ryan and Standaert, François-Xavier},
	TITLE={{A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks}},
	BOOKTITLE={CHES 2017},
	PUBLISHER={Springer},
	EDITOR={Wieland Fischer & Naofumi Homma},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={9},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-BKLMMNSSSTV17,
 	AUTHOR={Bernstein, Daniel J.  and Koelbl, Stefan and Lucks, Stefan and Massolino, P M Costa and Mendel, Florian and Nawaz, Kashif and Schneider, Tobias and Schwabe, Peter  and Standaert, François-Xavier and Todo, Yosuke and Viguier, Benoît},
	TITLE={{Gimli: A Cross-Platform Permutation}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
	PUBLISHER={Spinger},
	EDITOR={Wieland Fischer and  Naofumi Homma},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	PAGES={299--320},
	NOTE={10.1007/978-3-319-66787-4},
	MONTH={9},
	YEAR={2017},
}

@ARTICLE{cgUCL-PBPS17,
 	AUTHOR={Pereira, Olivier and Berti, Francesco and Peters, Thomas and Standaert, François-Xavier},
	TITLE={{On Leakage-Resilient Authenticated Encryption with Decryption Leakages}},
	PUBLISHER={IACR},
	JOURNAL={IACR Transactions on Symmetric Cryptology},
	VOLUME={3},
	PAGES={271-293},
	MONTH={9},
	YEAR={2017},
}

@ARTICLE{cgUCL-DSM17,
 	AUTHOR={Durvaux, François and Standaert, François-Xavier and Merino Del Pozo, Santos},
	TITLE={{Towards easy leakage certification: extended version}},
	JOURNAL={Journal of Cryptographic Engineering},
	VOLUME={7},
	PAGES={1-19},
	NOTE={http://dx.doi.org/10.1007/s13389-017-0150-0},
	MONTH={6},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-MS17,
 	AUTHOR={Merino Del Pozo, Santos and Standaert, François-Xavier},
	TITLE={{Getting the Most Out of Leakage Detection - Statistical tools and measurement setups hand in hand}},
	BOOKTITLE={Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	NOTE={to appear},
	MONTH={4},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-MSML17,
 	AUTHOR={Massart, Clément and Standaert, François-Xavier and Mouraux, André and Lange, Joseph},
	TITLE={{Side-Channel Attacks Against the Human Brain: the PIN Code Case Study}},
	BOOKTITLE={Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	NOTE={to appear},
	MONTH={4},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-NHSF17,
 	AUTHOR={Nawaz, Kashif and Heidar Kamel, Dina and Standaert, François-Xavier and Flandre, Denis},
	TITLE={{Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: a Case-Study}},
	BOOKTITLE={Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers},
	PUBLISHER={Springer},
	EDITOR={Sylvain Guilley},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	PAGES={19--33},
	NOTE={10.1007/978-3-319-64647-3_2},
	MONTH={4},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-HDMNSFB16,
 	AUTHOR={Heidar Kamel, Dina and de Streel, Guerric and Merino Del Pozo, Santos and Nawaz, Kashif and Standaert, François-Xavier and Flandre, Denis and Bol, David},
	TITLE={{Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers}},
	BOOKTITLE={Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings},
	PUBLISHER={Springer},
	EDITOR={C. Carlet and A. Hasan and V. Saraswat},
	SERIES={Lecture Notes in Computer Science},
	PAGES={233-248},
	NOTE={http://dx.doi.org/10.1007/978-3-319-49445-6_13},
	MONTH={12},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-PCS16,
 	AUTHOR={Poussier, Romain and Choudary, Omar and Standaert, François-Xavier},
	TITLE={{Score-based vs. Probability-based Enumeration -- a Cautionary Note --}},
	BOOKTITLE={INDOCRYPT 2016},
	PUBLISHER={Springer},
	EDITOR={Orr Dunkelman & Somitra Kumar Sanadhya},
	SERIES={Lecture Note in Computer Science},
	MONTH={12},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-BS16,
 	AUTHOR={Berti, Francesco and Standaert, François-Xavier},
	TITLE={{An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks}},
	PUBLISHER={Springer},
	EDITOR={Springer},
	JOURNAL={Proceedings of CARDIS 2016, Lecture Notes in Computer Science},
	SERIES={Lecture Notes in Computer Science},
	MONTH={11},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-PSG16,
 	AUTHOR={Poussier, Romain and Standaert, François-Xavier and Grosso, Vincent},
	TITLE={{Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach}},
	BOOKTITLE={CHES 2016},
	PUBLISHER={Springer},
	EDITOR={Benedikt Gierlichs & Axel Poschmann},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={8},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-DSM16,
 	AUTHOR={Durvaux, François and Standaert, François-Xavier and Merino Del Pozo, Santos},
	TITLE={{Towards Easy Leakage Certification}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, California, USA, August 17-19, 2016, Proceedings},
	PUBLISHER={Springer},
	EDITOR={B. Gierlichs and A. Poschmann},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9813},
	PAGES={40-60},
	NOTE={http://dx.doi.org/10.1007/978-3-662-53140-2_3},
	MONTH={8},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-GS15,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?}},
	BOOKTITLE={Asiacrypt},
	PUBLISHER={Springer},
	EDITOR={T. Iwata & J. H. Cheon},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={9452},
	MONTH={12},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-PGS15,
 	AUTHOR={Poussier, Romain and Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations}},
	BOOKTITLE={CARDIS},
	PUBLISHER={Springer},
	EDITOR={N. Homma & M. Medwed},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={11},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-PSV15,
 	AUTHOR={Pereira, Olivier and Standaert, François-Xavier and Vivek, Srinivas},
	TITLE={{Leakage-Resilient Authentication and Encryption from Symmetric Primitives}},
	BOOKTITLE={Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
	PUBLISHER={ACM},
	PAGES={96-108},
	MONTH={10},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-MS15,
 	AUTHOR={Merino Del Pozo, Santos and Standaert, François-Xavier},
	TITLE={{Blind Source Separation from Single Measurements using Singular Spectrum Analysis}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
	PUBLISHER={Springer},
	EDITOR={T. Güneysu, and H. Handschuh},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9293},
	PAGES={42-59},
	NOTE={http://dx.doi.org/10.1007/978-3-662-48324-4_3},
	MONTH={9},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-LPBMS15,
 	AUTHOR={Lerman, Liran and Poussier, Romain and Bontempi, Gianluca and Markowitch, Olivier and Standaert, François-Xavier},
	TITLE={{Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)}},
	BOOKTITLE={Constructive Side-Channel Analysis and Secure Design},
	PUBLISHER={Springer},
	EDITOR={Stefan Mangard and Axel Y. Poschmann},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	PAGES={20-33},
	MONTH={4},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-MSHM15,
 	AUTHOR={Merino Del Pozo, Santos and Standaert, François-Xavier and Heidar Kamel, Dina and Moradi, Amir},
	TITLE={{Si­de-Chan­nel At­tacks from Sta­tic Power: When Should we Care?}},
	BOOKTITLE={Proceedings of the 2015 De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2015, Gre­no­ble, Fran­ce, March 9 - 13, 2015},
	EDITOR={W. Nebel, and D. Atienza},
	PAGES={145-150},
	NOTE={http://dl.acm.org/citation.cfm?id=2755785},
	MONTH={3},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-GGPSS15,
 	AUTHOR={Glowacz, Cezary and Grosso, Vincent and Poussier, Romain and Schüth, Joachim and Standaert, François-Xavier},
	TITLE={{Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment}},
	BOOKTITLE={FSE 2015},
	PUBLISHER={Springer},
	EDITOR={Gregor Leander},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={3},
	YEAR={2015},
}

@ARTICLE{cgUCL-BGS15,
 	AUTHOR={Belaid, Sonia and Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Masking and leakage-resilient primitives: One, the other(s) or both?}},
	PUBLISHER={Spinger},
	EDITOR={Claude Carlet and Pierre{-}Alain Fouque},
	JOURNAL={Cryptography and Communications},
	VOLUME={7},
	PAGES={163-184},
	MONTH={1},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-GPSG14,
 	AUTHOR={Grosso, Vincent and Poussier, Romain and Standaert, François-Xavier and Gaspar, Lubos},
	TITLE={{Combining Leakage-Resilient PRFs and Shuffling}},
	BOOKTITLE={CARDIS 2014},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={11},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-BGGRS14,
 	AUTHOR={Balasch, Josep and Gierlichs, Benedikt and Grosso, Vincent and Reparaz, Oscar and Standaert, François-Xavier},
	TITLE={{On the Cost of Lazy Engineering for Masked Software Implementations}},
	BOOKTITLE={CARDIS 2014},
	PUBLISHER={Spinger},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={11},
	YEAR={2014},
}

@ARTICLE{cgUCL-PRS14,
 	AUTHOR={Petit, Christophe and Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{On a particular case of the bisymmetric equation for quasigroups}},
	PUBLISHER={Spinger},
	JOURNAL={Acta Mathematica Hungarica},
	NOTE={DOI 10.1007/s10474-014-0428-y},
	MONTH={6},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-GS14,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Efficient Masked S-Boxes Processing – A Step Forward –}},
	BOOKTITLE={ AFRICACRYPT 2014},
	PUBLISHER={Spinger},
	EDITOR={D. Pointcheval D. Vergnaud},
	SERIES={Lecture Notes in Computer Science},
	MONTH={5},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-GLSV14,
 	AUTHOR={Grosso, Vincent and Leurent, Gaëtan and Standaert, François-Xavier and Varici, Kerem},
	TITLE={{LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations}},
	BOOKTITLE={FSE 2014},
	PUBLISHER={Spinger},
	EDITOR={Carlos Cid and Christian Rechberger},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={3},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-GS13,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Low Entropy Masking Schemes, Revisited}},
	BOOKTITLE={CARDIS 2013},
	PUBLISHER={Springer},
	EDITOR={Aurélien Francillon and Pankaj Rohatgi},
	SERIES={Lecture Notes in Computer Science},
	MONTH={11},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-GSF13,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier and Faust, Sebastian},
	TITLE={{Masking vs. Multiparty Computation: How Large Is the Gap for AES?}},
	BOOKTITLE={CHES},
	PUBLISHER={Spinger},
	EDITOR={Guido Bertoni and Jean-Sébastien Coron},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={8086},
	PAGES={400-416},
	MONTH={8},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-GGNS13,
 	AUTHOR={Gérard, Benoit and Grosso, Vincent and Naya-Plasencia, Maria and Standaert, François-Xavier},
	TITLE={{Block Ciphers That Are Easier to Mask: How Far Can We Go?}},
	BOOKTITLE={CHES},
	PUBLISHER={Spinger},
	EDITOR={Guido Bertoni and Jean-Sébastien Coron},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={8086},
	PAGES={383-399},
	MONTH={8},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-SPY13,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu},
	TITLE={{Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions}},
	BOOKTITLE={Advances in Cryptology – CRYPTO 2013 },
	SERIES={Lecture Notes in Computer Science},
	PAGES={335--352},
	NOTE={Full version from http://eprint.iacr.org/2013/370},
	MONTH={8},
	YEAR={2013},
}

@ARTICLE{cgUCL-SSJM12,
 	AUTHOR={Shariati, Saloomeh and Standaert, François-Xavier and Jacques, Laurent  and Macq, Benoit},
	TITLE={{Analysis and experimental evaluation of image-based PUFs}},
	PUBLISHER={Spinger-Verlag},
	JOURNAL={Journal of Cryptographic Engineering},
	VOLUME={2},
	MONTH={9},
	YEAR={2012},
}

@CGREPORT{cgUCL-DRKSS12,
 	AUTHOR={De Coninck, Joel and Rioboo, Romain and Koeune, François and Standaert, François-Xavier and Shariati, Saloomeh},
	TITLE={{Patent : LABELLING SYSTEM, WO/2012/122609}},
	EDITOR={	},
	MONTH={9},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-GS12,
 	AUTHOR={Gérard, Benoit and Standaert, François-Xavier},
	TITLE={{Unified and Optimized Linear Collision Attacks and Their Application in a Non-Profiled Setting}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012)},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={7428},
	PAGES={175--192},
	MONTH={9},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-SKS12,
 	AUTHOR={Shariati, Saloomeh and Koeune, François and Standaert, François-Xavier},
	TITLE={{Security Analysis of Image-Based PUFs for Anti-counterfeiting}},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={7394},
	PAGES={26-38},
	MONTH={9},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-GDKKS12,
 	AUTHOR={Gérard, Benoit and Durvaux, François and Kerckhof, Stéphanie and Koeune, François and Standaert, François-Xavier},
	TITLE={{Intellectual Property Protection for Integrated Systems using Soft Physical Hash Functions}},
	BOOKTITLE={Workshop on Information Security Applications (WISA 2012)},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	NOTE={To appear},
	MONTH={8},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-VGRS12,
 	AUTHOR={Veyrat-Charvillon, Nicolas and Gérard, Benoit and Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{An Optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks}},
	BOOKTITLE={Selected Areas in Cryptography (SAC 2012)},
	EDITOR={L. Knudsen},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	NOTE={To appear},
	MONTH={8},
	YEAR={2012},
}

@CGREPORT{cgUCL-GBGS12,
 	AUTHOR={Grosso, Vincent and Boura, Christina and Gérard, Benoit and Standaert, François-Xavier},
	TITLE={{A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks}},
	BOOKTITLE={Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-SPV12,
 	AUTHOR={Standaert, François-Xavier and Petit, Christophe and Veyrat-Charvillon, Nicolas},
	TITLE={{Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders}},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6805},
	PAGES={283-299},
	MONTH={1},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-KDVRMS11,
 	AUTHOR={Kerckhof, Stéphanie and Durvaux, François and Veyrat-Charvillon, Nicolas and Regazzoni, Francesco and Meurice de Dormale, Guerric and Standaert, François-Xavier},
	TITLE={{Low Cost FPGA Implementations of the SHA-3 Finalists}},
	BOOKTITLE={10th Smart Card Research and Advanced Application Conference (CARDIS) 2011},
	MONTH={9},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-MPRRS11,
 	AUTHOR={Medwed, Marcel and Petit, Christophe and Regazzoni, Francesco and Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks}},
	BOOKTITLE={10th Smart Card Research and Advanced Application Conference (CARDIS) 2011},
	MONTH={9},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BDKPPSY11,
 	AUTHOR={Barak, Boaz and Dodis, Yevgeniy and Krawczyk, Hugo and Pereira, Olivier and Pietrzak, Krzysztof and Standaert, François-Xavier and Yu, Yu},
	TITLE={{Leftover Hash Lemma, Revisited}},
	BOOKTITLE={Advances in Cryptology - CRYPTO 2011},
	PUBLISHER={Springer-Verlag},
	EDITOR={Phillip Rogaway},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6841},
	PAGES={1-20},
	MONTH={8},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-KCS11,
 	AUTHOR={Kerckhof, Stéphanie and Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{FPGA Implementation of a Statistical Saturation Attack against PRESENT}},
	BOOKTITLE={Progress in Cryptology – AFRICACRYPT 2011},
	PUBLISHER={Springer},
	EDITOR={Nitaj, Abderrahmane and Pointcheval, David},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6737},
	PAGES={100-116},
	MONTH={7},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BHBSRK11,
 	AUTHOR={Barenghi, Alessandro and Hocquet, Cédric and Bol, David and Standaert, François-Xavier and Regazzoni, Francesco and Koren, Israel},
	TITLE={{Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an Example of a 65nm AES Implementation}},
	BOOKTITLE={7th Workshop on RFID Security and Privacy (RFIDSec) 2011},
	MONTH={6},
	YEAR={2011},
}

@ARTICLE{cgUCL-BRBSI11,
 	AUTHOR={Bayrak, Ali Galip and Regazzoni, Francesco and Brisk, Philip and Standaert, François-Xavier and Ienne, Paolo},
	TITLE={{A First Step Towards Automatic Application of Power Analysis Countermeasures}},
	BOOKTITLE={Proceedings of 48th Design Automation Conference (DAC) 2011},
	JOURNAL={Proceedings of 48th Design Automation Conference (DAC)},
	MONTH={6},
	YEAR={2011},
}

@ARTICLE{cgUCL-HHRLFBS11,
 	AUTHOR={Hocquet, Cédric and Heidar Kamel, Dina and Regazzoni, Francesco and Legat, Jean-Didier and Flandre, Denis and Bol, David and Standaert, François-Xavier},
	TITLE={{Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags}},
	PUBLISHER={Spinger},
	JOURNAL={Journal of Cryptographic Engineering},
	SERIES={Lecture Notes in Computer Science},
	MONTH={4},
	YEAR={2011},
}

@ARTICLE{cgUCL-RYS11,
 	AUTHOR={Regazzoni, Francesco and Yi, Wang and Standaert, François-Xavier},
	TITLE={{FPGA Implementations of the AES Masked Against Power Analysis Attacks}},
	JOURNAL={Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE)},
	MONTH={2},
	YEAR={2011},
}

@INBOOK{cgUCL-SPYQYO10,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu and Quisquater, Jean-Jacques and Yung, Moti and Oswald, Elisabeth},
	TITLE={{Leakage Resilient Cryptography in Practice}},
	BOOKTITLE={Towards Hardware Intrinsic Security: Foundation and Practice},
	PUBLISHER={Springer},
	PAGES={105-139},
	MONTH={11},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-YSPY10,
 	AUTHOR={Yu, Yu and Standaert, François-Xavier and Pereira, Olivier and Yung, Moti},
	TITLE={{Practical leakage-resilient pseudorandom generators}},
	BOOKTITLE={Proceedings of the 17th ACM conference on Computer and communications security},
	PUBLISHER={ACM},
	PAGES={141--151},
	MONTH={10},
	YEAR={2010},
}

@ARTICLE{cgUCL-SJSMSA10,
 	AUTHOR={Shariati, Saloomeh and Jacques, Laurent  and Standaert, François-Xavier and Macq, Benoit and Salhi, Mohamad Amine  and Antoine, Philippe},
	TITLE={{Randomly Driven Fuzzy Key Extraction of Uncloneable Images}},
	JOURNAL={The International Conference on Image Processing (ICIP)},
	MONTH={9},
	YEAR={2010},
}

@ARTICLE{cgUCL-BSQ10,
 	AUTHOR={Bulens, Philippe and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{How to Strongly Link Data and its Medium: the Paper Case}},
	JOURNAL={IET Information Security},
	VOLUME={2},
	PAGES={125-236},
	MONTH={9},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-HHSFB10,
 	AUTHOR={Heidar Kamel, Dina and Hocquet, Cédric and Standaert, François-Xavier and Flandre, Denis and Bol, David},
	TITLE={{Glitch-Induced Within-Die Variations of Dynamic Energy in Voltage-Scaled Nano-CMOS Circuits}},
	BOOKTITLE={proceedings of ESSCIRC 2010},
	MONTH={9},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-S10,
 	AUTHOR={Standaert, François-Xavier},
	TITLE={{How Leaky is an Extractor?}},
	BOOKTITLE={proceedings of LatinCrypt 2010},
	PUBLISHER={Spinger},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6212},
	PAGES={294-304},
	MONTH={8},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-RS10,
 	AUTHOR={Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Representation-, Leakage- and Cipher- Dependencies in Algebraic Side-Channel Attacks}},
	BOOKTITLE={industrial track of ACNS 2010},
	MONTH={6},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-CS10,
 	AUTHOR={Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{Multi-Trail Statistical Saturation Attacks}},
	BOOKTITLE={ACNS 2010},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6487},
	PAGES={123-138},
	MONTH={6},
	YEAR={2010},
}

@ARTICLE{cgUCL-SSJMSA10,
 	AUTHOR={Shariati, Saloomeh and Standaert, François-Xavier and Jacques, Laurent  and Macq, Benoit and Salhi, Mohamad Amine  and Antoine, Philippe},
	TITLE={{Random Profiles of Laser Marks}},
	JOURNAL={Proceedings of the 31th symposium on Information Theory in the Benelux},
	PAGES={27-34},
	MONTH={5},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-DS10,
 	AUTHOR={de Meulenaer, Giacomo and Standaert, François-Xavier},
	TITLE={{Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks}},
	BOOKTITLE={2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT 2010)},
	PUBLISHER={Springer's Lecture Notes of ICST - LNICST},
	MONTH={5},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-MSGR10,
 	AUTHOR={Medwed, Marcel and Standaert, François-Xavier and Großschädl, Johann and Regazzoni, Francesco},
	TITLE={{Fresh Re-Keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices}},
	BOOKTITLE={Progress in Cryptology - Africacrypt 2010},
	PUBLISHER={Springer Verlag},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6055},
	PAGES={279-296},
	MONTH={5},
	YEAR={2010},
}

@CGREPORT{cgUCL-DS10,
 	AUTHOR={de Meulenaer, Giacomo and Standaert, François-Xavier},
	TITLE={{Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks}},
	NOTE={Extended abstract of the poster presented at the third ACM conference on Wireless Network Security (WiSec ’10)},
	MONTH={3},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-RS09,
 	AUTHOR={Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Algebraic Side-Channel Attacks}},
	BOOKTITLE={Information Security and Cryptology (INSCRYPT) 2009},
	PUBLISHER={Springer},
	EDITOR={Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6151},
	PAGES={393-410},
	MONTH={12},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-HBSF09,
 	AUTHOR={Heidar Kamel, Dina and Bol, David and Standaert, François-Xavier and Flandre, Denis},
	TITLE={{Comparison of Ultra-Low-Power and static CMOS full adders in 0.15 μm FD SOI CMOS}},
	BOOKTITLE={SOI Conference},
	PUBLISHER={IEEE},
	MONTH={10},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-RCSBKBLI09,
 	AUTHOR={Regazzoni, Francesco and Cevrero, Alessandro and Standaert, François-Xavier and Badel, Stephane and Kluter, Theo and Brisk, Philip and Leblebici, Yusuf and Ienne, Paolo},
	TITLE={{A Design Flow and Evaluation Framework for DPA-resistant Instruction Set Extensions}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5747},
	PAGES={205-219},
	MONTH={9},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-RSV09,
 	AUTHOR={Renauld, Mathieu and Standaert, François-Xavier and Veyrat-Charvillon, Nicolas},
	TITLE={{Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5747},
	PAGES={97-111},
	MONTH={9},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-SKS09,
 	AUTHOR={Standaert, François-Xavier and Koeune, François and Schindler, Werner},
	TITLE={{How to Compare Profiled Side-Channel Attacks}},
	BOOKTITLE={proceedings of ACNS 2009},
	PUBLISHER={Spinger},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5536},
	PAGES={485-498},
	MONTH={6},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-RS09,
 	AUTHOR={Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Combining Algebraic and Side-Channel Cryptanalysis against Block Ciphers}},
	BOOKTITLE={30-th Symposium on Information Theory in the Benelux},
	JOURNAL={Proceedings of the 30th symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-HSF09,
 	AUTHOR={Heidar Kamel, Dina and Standaert, François-Xavier and Flandre, Denis},
	TITLE={{Scaling trends of the AES S-Box low power consumption in 130 and 65 nm CMOS technology nodes}},
	BOOKTITLE={ISCAS},
	PUBLISHER={IEEE Circuits and Systems Society,  IEEE},
	MONTH={5},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-CS09,
 	AUTHOR={Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{A Statistical Saturation Attack on the Block Cipher PRESENT}},
	BOOKTITLE={CT-RSA 2009},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5473},
	PAGES={195-210},
	MONTH={4},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-KAKSP08,
 	AUTHOR={Kim, Chong Hee and Avoine, Gildas and Koeune, François and Standaert, François-Xavier and Pereira, Olivier},
	TITLE={{The Swiss-Knife RFID Distance Bounding Protocol}},
	BOOKTITLE={The 11th International Conference on Information Security and Cryptology - ICISC 2008},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5461},
	PAGES={98-115},
	MONTH={12},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-DGSP08,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Standaert, François-Xavier and Pereira, Olivier},
	TITLE={{On the Energy Cost of Communications and Cryptography in Wireless Sensor Networks}},
	BOOKTITLE={(extended version), IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob'2008)},
	JOURNAL={IEEE International Conference on Wireless & Mobile Computing, Networking & Communication},
	PAGES={580-585},
	MONTH={10},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-BSQPR08,
 	AUTHOR={Bulens, Philippe and Standaert, François-Xavier and Quisquater, Jean-Jacques and Pellegrin, Pascal and Rouvroy, Gaël},
	TITLE={{Implementation of the AES-128 on Virtex-5 FPGAs}},
	BOOKTITLE={Progress in Cryptology - AfricaCrypt 2008},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5023},
	PAGES={16-26},
	MONTH={6},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-DGSV08,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Standaert, François-Xavier and Vandendorpe, Luc},
	TITLE={{On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks}},
	BOOKTITLE={Twenty-ninth Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-GSQ08,
 	AUTHOR={Gosset, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementation of SQUASH}},
	BOOKTITLE={Twenty-ninth Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-PSPMY08,
 	AUTHOR={Petit, Christophe and Standaert, François-Xavier and Pereira, Olivier and Malkin, Tal G. and Yung, Moti},
	TITLE={{A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery}},
	BOOKTITLE={ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security},
	PUBLISHER={ACM},
	EDITOR={M. Abe and V. Gligor},
	PAGES={56--65},
	MONTH={3},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-QCS08,
 	AUTHOR={Quisquater, Jean-Jacques and Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent}},
	BOOKTITLE={ Fast Software Encryption 2008},
	PUBLISHER={Springer},
	SERIES={Lecture Notes on Computer Science},
	VOLUME={5086},
	PAGES={382-397},
	MONTH={2},
	YEAR={2008},
}

@ARTICLE{cgUCL-MSQ08,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementation(s) of a Scalable Encryption Algorithm}},
	PUBLISHER={IEEE Circuits and Systems Society,  IEEE},
	EDITOR={IEEE},
	JOURNAL={IEEE Transactions on Very Large Scale Integration (VLSI) Systems},
	VOLUME={16},
	PAGES={212-216},
	MONTH={2},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-CSQ07,
 	AUTHOR={Collard, Baudoin and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Improving the Time Complexity of Matsui's Linear Cryptanalysis}},
	BOOKTITLE={The International Conference on Information Security and Cryptology - ICISC 2007},
	PUBLISHER={Springer},
	EDITOR={K.-H. Nam and G. Rhee},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4817},
	PAGES={77-88},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MSQ07,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Simulation-Based Evaluation of Logic Styles to Counteract Side-Channel Attacks}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Sciences},
	VOLUME={4727},
	PAGES={427-442},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-SQC07,
 	AUTHOR={Standaert, François-Xavier and Quisquater, Jean-Jacques and Collard, Baudoin},
	TITLE={{Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent}},
	BOOKTITLE={Inscrypt 2007},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4990},
	PAGES={51-65},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MSQ07,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{ASIC Implementations of the Block Cipher SEA for Constrained Applications}},
	BOOKTITLE={Proceedings of the Third International Conference on RFID Security - RFIDSec 2007},
	PAGES={103-114},
	MONTH={7},
	YEAR={2007},
}

@ARTICLE{cgUCL-BKSQ07,
 	AUTHOR={Bulens, Philippe and Kalach, Kassem and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile}},
	PUBLISHER={SASC, January 31 - February 1, 2007},
	NOTE={http://sasc.cry},
	MONTH={1},
	YEAR={2007},
}

@ARTICLE{cgUCL-S06,
 	AUTHOR={Standaert, François-Xavier},
	TITLE={{A Didactic Classification of Some Illustrative Leakage Functions}},
	BOOKTITLE={proceedings of WISSEC 2006},
	MONTH={11},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-KS06,
 	AUTHOR={Koeune, François and Standaert, François-Xavier},
	TITLE={{ A Tutorial on Physical Security and Side-Channel Attacks}},
	BOOKTITLE={ Foundations of Security Analysis and Design III : FOSAD 2004/2005},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3655},
	PAGES={78-108},
	MONTH={11},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SPAQ06,
 	AUTHOR={Standaert, François-Xavier and Peeters, Eric and Archambeau, Cédric and Quisquater, Jean-Jacques},
	TITLE={{Towards Security Limits of Side-Channel Attacks}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2006},
	PUBLISHER={Springer},
	EDITOR={Louis Goubin and Mitsuru Matsui},
	SERIES={LNCS},
	VOLUME={4249},
	PAGES={30-45},
	MONTH={10},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-APSQ06,
 	AUTHOR={Archambeau, Cédric and Peeters, Eric and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Template Attacks in Principal Subspaces}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2006},
	PUBLISHER={Springer},
	EDITOR={Louis Goubin and Mitsuru Matsui},
	SERIES={LNCS},
	VOLUME={4249},
	PAGES={1--14},
	MONTH={10},
	YEAR={2006},
}

@ARTICLE{cgUCL-PSQ06,
 	AUTHOR={Peeters, Eric and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Power and Electromagnetic Analysis: Improved Model, Consequences and Comparisons}},
	PUBLISHER={Elsevier},
	EDITOR={Nadia Nedjah, Luiza de Macedo Mourelle},
	JOURNAL={Special Issue of Integration, The VLSI Journal: Embedded Cryptographic Hardware},
	NOTE={To Appear},
	MONTH={9},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SRQ06,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks}},
	BOOKTITLE={proceedings of FPL 2006},
	MONTH={8},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SPGQ06,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Gershenfeld, Neil and Quisquater, Jean-Jacques},
	TITLE={{SEA: a Scalable Encryption Algorithm for Small Embedded Applications}},
	BOOKTITLE={CARDIS},
	PUBLISHER={Springer-Verlag},
	MONTH={4},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-SMPQ06,
 	AUTHOR={Standaert, François-Xavier and Mace, François and Peeters, Eric and Quisquater, Jean-Jacques},
	TITLE={{Updates on the Security of FPGAs Against Power Analysis Attacks}},
	BOOKTITLE={ARC},
	VOLUME={3985},
	PAGES={335-346},
	MONTH={3},
	YEAR={2006},
}

@ARTICLE{cgUCL-SPRQ06,
 	AUTHOR={Standaert, François-Xavier and Peeters, Eric and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays}},
	PUBLISHER={IEEE},
	JOURNAL={Proceedings of the IEEE},
	VOLUME={94},
	MONTH={2},
	YEAR={2006},
}

@ARTICLE{cgUCL-SPRQ06,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of the ICEBERG Block Cipher}},
	PUBLISHER={Elsevier},
	JOURNAL={The VLSI Journal},
	MONTH={2},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-MSQL05,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Design Methodology for Secured ICs Using Dynamic Current Mode Logic}},
	BOOKTITLE={Power and Timing Modeling, Optimization and Simulation - Proceedings of PATMOS 2005},
	PUBLISHER={Springer},
	EDITOR={V. Paliouras},
	SERIES={Lecture Notes in Computer Science},
	PAGES={550-560},
	MONTH={9},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSY05,
 	AUTHOR={Malkin, Tal G. and Standaert, François-Xavier and Yung, Moti},
	TITLE={{A Comparative Cost/Security Analysis of Fault Attack Countermeasures}},
	BOOKTITLE={FDTC 2005/2006},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4236},
	PAGES={159-172},
	MONTH={9},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-PSDQ05,
 	AUTHOR={Peeters, Eric and Standaert, François-Xavier and Donckers, Nicolas and Quisquater, Jean-Jacques},
	TITLE={{Improved Higher Order Side-Channel Attacks with FPGA experiments}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2005},
	PUBLISHER={Spinger-Verlag},
	EDITOR={Josyula R. Rao, Berk Sunar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3659},
	PAGES={309-323},
	MONTH={8},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPGQ05,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Gershenfeld, Neil and Quisquater, Jean-Jacques},
	TITLE={{SEA: a Scalable Encryption Algorithm for Small Embedded Applications}},
	BOOKTITLE={Workshop on Lightweight Crypto},
	MONTH={7},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-LSRQ05,
 	AUTHOR={Léglise, Philippe and Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{Efficient Implementation of Recent Stream Ciphers on Reconfigurable Hardware Devices}},
	BOOKTITLE={26th Symposium on Information Theory in the Benelux},
	PAGES={261-268},
	MONTH={5},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPQ05,
 	AUTHOR={Standaert, François-Xavier and Peeters, Eric and Quisquater, Jean-Jacques},
	TITLE={{On the Masking Countermeasure and Higher-Order Power Analysis Attacks}},
	BOOKTITLE={ITCC 2005},
	PUBLISHER={IEEE Computer Society},
	VOLUME={1},
	PAGES={562-567},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPRQ05,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of the ICEBERG Block Cipher}},
	BOOKTITLE={ITCC 2005},
	NOTE={To appear},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SLRQML05,
 	AUTHOR={Standaert, François-Xavier and Lefèbvre, Frédéric and Rouvroy, Gaël and Quisquater, Jean-Jacques and Macq, Benoit and Legat, Jean-Didier},
	TITLE={{Practical Evaluation of a Radial Soft Hash Algorithm}},
	BOOKTITLE={ITCC 2005},
	NOTE={To appear},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSLQ05,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Legat, Jean-Didier and Quisquater, Jean-Jacques},
	TITLE={{Recommendations for Secure IC's and ASIC's}},
	BOOKTITLE={CEPA2 Workshop - What Technologies in Defence Applications for Digital Signal Processing Now and in the Future},
	PAGES={NA},
	MONTH={3},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-QS05,
 	AUTHOR={Quisquater, Jean-Jacques and Standaert, François-Xavier},
	TITLE={{Exhaustive Key Search of the DES: Updates and Refinements}},
	BOOKTITLE={SHARCS 2005},
	NOTE={To appear},
	MONTH={2},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSHQL04,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Hassoune, Ilham and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Dynamic Current Mode Logic to Counteract Power Analysis Attacks}},
	BOOKTITLE={DCIS 2004 - 19th Conference on Design of Circuits and Integrated Systems},
	PAGES={186-191},
	MONTH={11},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-RLSMQL04,
 	AUTHOR={Rouvroy, Gaël and Lefèbvre, Frédéric and Standaert, François-Xavier and Macq, Benoit and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Hardware Implementation of a Fingerprinting Algorithm Suited for Digital Cinema}},
	BOOKTITLE={Eusipco 2004},
	MONTH={9},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-PSRQ04,
 	AUTHOR={Piret, Gilles and Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{On the Security of the DeKart Primitive}},
	BOOKTITLE={Smart Card Research and Advanced Applications (CARDIS 2004)},
	PUBLISHER={Kluwer Academic Publishers},
	EDITOR={J.-J. Quisquater, P. Paradinas, Y. Deswarte, and A.A. El Kal},
	PAGES={241-254},
	MONTH={8},
	YEAR={2004},
}

@ARTICLE{cgUCL-QNPS04,
 	AUTHOR={Quisquater, Jean-Jacques and Neve, Michael and Peeters, Eric and Standaert, François-Xavier},
	TITLE={{L'émission rayonnée des cartes à puces : une vue d'ensemble}},
	JOURNAL={Revue de l'Electricité et de l'Electronique},
	MONTH={6},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-RSQL04,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Compact and Efficient Encryption/Decryption Module for FPGA Implementation of AES Rijndael Very Well Suited for Small Embedd}},
	BOOKTITLE={ITCC 2004, special session on embedded cryptographic hardware},
	PUBLISHER={IEEE Computer Society},
	VOLUME={2},
	PAGES={583-587},
	MONTH={4},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-SPRQL04,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{ICEBERG: an Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware}},
	BOOKTITLE={FSE 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3017},
	PAGES={279-298},
	MONTH={2},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-QS04,
 	AUTHOR={Quisquater, Jean-Jacques and Standaert, François-Xavier},
	TITLE={{Time-Memory Tradeoffs}},
	BOOKTITLE={Encycolpedia of Cryptography and Security},
	PUBLISHER={Springer-Verlag},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-SOP04,
 	AUTHOR={Standaert, François-Xavier and Ors, Siddika Berna and Preneel, Bart},
	TITLE={{Power Analysis of an FPGA Implementation of Rijndael: Is Pipelining a DPA Countermeasure?}},
	BOOKTITLE={CHES 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	PAGES={30-44},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-SOQP04,
 	AUTHOR={Standaert, François-Xavier and Ors, Siddika Berna and Quisquater, Jean-Jacques and Preneel, Bart},
	TITLE={{Power Analysis Attacks against FPGA Implementations of the DES}},
	BOOKTITLE={FPL 2004},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	PAGES={84-94},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-RSLQML04,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Lefèbvre, Frédéric and Quisquater, Jean-Jacques and Macq, Benoit and Legat, Jean-Didier},
	TITLE={{Reconfigurable Hardware Solutions for the Digital Rights Management of Digital Cinema}},
	BOOKTITLE={DRM 2004},
	PUBLISHER={ACM},
	PAGES={40-53},
	MONTH={1},
	YEAR={2004},
}

@INBOOK{cgUCL-RSQL04,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Compact and Efficient Encryption/Decryption Module for FPGA Implementation of AES}},
	BOOKTITLE={Embedded Cryptographic Hardware: Design and Security},
	PUBLISHER={Nova Science Publishers},
	EDITOR={Nadia Nedjah and Luiza de Macedo Mourelle},
	MONTH={1},
	YEAR={2004},
}

@INPROCEEDINGS{cgUCL-SRQL03,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs}},
	BOOKTITLE={CHES 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2523},
	PAGES={334-350},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Design Strategies and Modifed Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Tri}},
	BOOKTITLE={FPL 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2778},
	PAGES={181-193},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SVSQ03,
 	AUTHOR={Standaert, François-Xavier and van Oldeneel tot Oldenzeel, Loic and Samyde, David and Quisquater, Jean-Jacques},
	TITLE={{Differential Power Analysis of FPGAs : How Practical is the Attack?}},
	BOOKTITLE={FPL 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2778},
	PAGES={701-709},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SPRQL03,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Key-Dependent Approximations in Cryptanalysis}},
	BOOKTITLE={the 24th Symposium on Information Theory in the Benelux},
	PAGES={53-62},
	MONTH={5},
	YEAR={2003},
}

@ARTICLE{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient Uses of FPGAs for Implementations of the DES and its Experimental Linear Cryptanalysis}},
	VOLUME={32},
	PAGES={473-482},
	MONTH={4},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient FPGA implementation of block cipher MISTY1}},
	BOOKTITLE={RAW 2003},
	PAGES={7pp},
	MONTH={4},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SRQL03,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Methodology to Implement Block Ciphers in Reconfigurable Hardware and its Application to Fast and Compact AES Rijndael}},
	BOOKTITLE={FPGA 2003},
	PAGES={216-224},
	MONTH={2},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SRQL02,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1}},
	BOOKTITLE={The Third NESSIE Workshop},
	PAGES={10pp},
	MONTH={11},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-KRSQDL02,
 	AUTHOR={Koeune, François and Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and David, Jean-Pierre and Legat, Jean-Didier},
	TITLE={{A FPGA Implementation of the Linear Cryptanalysis}},
	BOOKTITLE={FPL 2002},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2438},
	PAGES={845-852},
	MONTH={9},
	YEAR={2002},
}

@ARTICLE{cgUCL-RS02,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier},
	TITLE={{Implementation of Cryptographic Standards and Cryptanalysis using FPGA's : Extended Abstract}},
	JOURNAL={Revue E Tijdschrift - 118ème année/118de jaargang},
	MONTH={9},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-QSRDL02,
 	AUTHOR={Quisquater, Jean-Jacques and Standaert, François-Xavier and Rouvroy, Gaël and David, Jean-Pierre and Legat, Jean-Didier},
	TITLE={{A Cryptanalytic Time-Memory Tradeoff : First FPGA Implementation}},
	BOOKTITLE={FPL 2002},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	PAGES={780-789},
	MONTH={9},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-SRQL02,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Time-Memory Tradeoff using Distinguished Points : New Analysis and FPGA Results}},
	BOOKTITLE={CHES 2002},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2523},
	PAGES={593-609},
	MONTH={8},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-RS02,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier},
	TITLE={{FPGA's as Cryptanalytic Tools, IEEE Student Paper Contest Finalist}},
	BOOKTITLE={IEEE Melecon 2002 conference},
	PAGES={209-214},
	MONTH={5},
	YEAR={2002},
}