@INPROCEEDINGS{cgUCL-ABBDDGJKOSW20,
 	AUTHOR={Azouaoui, Melissa and Bellizia, Davide and Buhan, Ileana and Debande, Nicolas and Duval, Sebastien and Giraud, Christophe and Jaulmes, Eliane and Koeune, François and Oswald, Elisabeth and Standaert, François-Xavier and Whitnall, Carolyn},
	TITLE={{A Systematic Appraisal of Side Channel Evaluation Strategies}},
	JOURNAL={Proceedings of International Conference on Research in Security Standardisation (SSR) 2020},
	PAGES={44-66},
	MONTH={11},
	YEAR={2020},
}

@ARTICLE{cgUCL-REKP19,
 	AUTHOR={Rochet, Florentin and Efthymiadis, Kyriakos and Koeune, François and Pereira, Olivier},
	TITLE={{SWAT: Seamless Web Authentication Technology}},
	PUBLISHER={ACM},
	JOURNAL={Proceedings of the 2019 World Wide Web Conference (WWW’19)},
	MONTH={5},
	YEAR={2019},
}

@CGREPORT{cgUCL-DRKSS12,
 	AUTHOR={De Coninck, Joel and Rioboo, Romain and Koeune, François and Standaert, François-Xavier and Shariati, Saloomeh},
	TITLE={{Patent : LABELLING SYSTEM, WO/2012/122609}},
	EDITOR={	},
	MONTH={9},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-SKS12,
 	AUTHOR={Shariati, Saloomeh and Koeune, François and Standaert, François-Xavier},
	TITLE={{Security Analysis of Image-Based PUFs for Anti-counterfeiting}},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={7394},
	PAGES={26-38},
	MONTH={9},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-GDKKS12,
 	AUTHOR={Gérard, Benoit and Durvaux, François and Kerckhof, Stéphanie and Koeune, François and Standaert, François-Xavier},
	TITLE={{Intellectual Property Protection for Integrated Systems using Soft Physical Hash Functions}},
	BOOKTITLE={Workshop on Information Security Applications (WISA 2012)},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	NOTE={To appear},
	MONTH={8},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-SKS09,
 	AUTHOR={Standaert, François-Xavier and Koeune, François and Schindler, Werner},
	TITLE={{How to Compare Profiled Side-Channel Attacks}},
	BOOKTITLE={proceedings of ACNS 2009},
	PUBLISHER={Spinger},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5536},
	PAGES={485-498},
	MONTH={6},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-MLKBQ09,
 	AUTHOR={Manulis, Mark and Leroy, Damien and Koeune, François and Bonaventure, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home}},
	BOOKTITLE={ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009)},
	EDITOR={R. Safavi-Naini and V. Varadharajan},
	NOTE={to appear},
	MONTH={3},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-KAKSP08,
 	AUTHOR={Kim, Chong Hee and Avoine, Gildas and Koeune, François and Standaert, François-Xavier and Pereira, Olivier},
	TITLE={{The Swiss-Knife RFID Distance Bounding Protocol}},
	BOOKTITLE={The 11th International Conference on Information Security and Cryptology - ICISC 2008},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5461},
	PAGES={98-115},
	MONTH={12},
	YEAR={2008},
}

@ARTICLE{cgUCL-RMDLJKKDPBQ08,
 	AUTHOR={Robert, Romain and Manulis, Mark and De Villenfagne, Florence and Leroy, Damien and Jost, Julien and Koeune, François and Ker, Caroline and Dinant, Jean-Marc and Poullet, Yves and Bonaventure, Olivier and Quisquater, Jean-Jacques},
	TITLE={{WiFi Roaming: Legal Implications and Security Constraints}},
	PUBLISHER={Oxford University Press},
	JOURNAL={International Journal of Law and Information Technology},
	VOLUME={16},
	PAGES={205-241},
	MONTH={10},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-KS06,
 	AUTHOR={Koeune, François and Standaert, François-Xavier},
	TITLE={{ A Tutorial on Physical Security and Side-Channel Attacks}},
	BOOKTITLE={ Foundations of Security Analysis and Design III : FOSAD 2004/2005},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3655},
	PAGES={78-108},
	MONTH={11},
	YEAR={2006},
}

@INPROCEEDINGS{cgUCL-CKQ03,
 	AUTHOR={Cathalo, Julien and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{A New Type of Timing Attack: Application to GPS}},
	BOOKTITLE={Fifth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003)},
	PUBLISHER={Springer},
	EDITOR={C. Walter, C. K. Koc, C. Paar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2779},
	PAGES={291-303},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-KRSQDL02,
 	AUTHOR={Koeune, François and Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and David, Jean-Pierre and Legat, Jean-Didier},
	TITLE={{A FPGA Implementation of the Linear Cryptanalysis}},
	BOOKTITLE={FPL 2002},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2438},
	PAGES={845-852},
	MONTH={9},
	YEAR={2002},
}

@INPROCEEDINGS{cgUCL-SKQ01,
 	AUTHOR={Schindler, Werner and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{Improving Divide and Conquer Attacks Against Cryptosystems by Better Error Detection Correction Strategies}},
	BOOKTITLE={Cryptography and Coding - 8th IMA International Conference on Cryptography and Coding},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2260},
	PAGES={245-267},
	MONTH={12},
	YEAR={2001},
}

@INPROCEEDINGS{cgUCL-CKN00,
 	AUTHOR={Coron, Jean-Sébastien and Koeune, François and Naccache, David},
	TITLE={{From fixed-length to arbitrary-length RSA padding schemes}},
	BOOKTITLE={Advances in Cryptology - ASIACRYPT 2000},
	PUBLISHER={Springer-Verlag},
	EDITOR={T. Okamoto},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1976},
	PAGES={90-97},
	MONTH={12},
	YEAR={2000},
}

@INPROCEEDINGS{cgUCL-HKQ00,
 	AUTHOR={Hachez, Gaël and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{Biometrics, access control, smart cards: a not so simple combination}},
	BOOKTITLE={Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000)},
	PUBLISHER={Kluwer Academic Publishers},
	EDITOR={J. Domingo-Ferrer, D. Chan, A. Watson},
	SERIES={IFIP Conference Proceedings},
	VOLUME={180},
	PAGES={273-288},
	MONTH={9},
	YEAR={2000},
}

@INPROCEEDINGS{cgUCL-PHKQ99,
 	AUTHOR={P., Julien and Hachez, Gaël and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{Robust object watermarking: application to code}},
	BOOKTITLE={Proceedings of Info Hiding '99},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1768},
	PAGES={368-378},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-HKQ99,
 	AUTHOR={Hachez, Gaël and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{Timing attack: what can be achieved by a powerful adversary?}},
	BOOKTITLE={Proceedings of the 20th symposium on Information Theory in the Benelux},
	EDITOR={A. Barbé, E.C. van der Meulen and P. Vanroose},
	PAGES={63-70},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-DKLMQW98,
 	AUTHOR={Dhem, Jean-François and Koeune, François and Leroux, Philippe-Alexandre and Mestré, Patrick and Quisquater, Jean-Jacques and Willems, Jean-Louis},
	TITLE={{A practical implementation of the timing attack}},
	BOOKTITLE={Proceedings of the Third Working Conference on Smart Card Research and Advanced Applications (CARDIS 1998)},
	PUBLISHER={Springer-Verlag},
	EDITOR={Jean-Jacques Quisquater and Bruce Schneier},
	SERIES={LNCS},
	VOLUME={1820},
	MONTH={1},
	YEAR={1998},
}