@ARTICLE{cgUCL-D97,
 	AUTHOR={Dhem, Jean-François},
	TITLE={{Normalisation in diminished-radix modulus transformation}},
	JOURNAL={Electronic Letters},
	VOLUME={33},
	PAGES={1931},
	MONTH={11},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-QMJDB97,
 	AUTHOR={Quisquater, Jean-Jacques and Macq, Benoit and Joye, Marc and Degand, N. and Bernard, A.},
	TITLE={{Practical solution to authentication of images with a secure camera}},
	BOOKTITLE={Storage and Retrieval for Image and Video Databases},
	PUBLISHER={SPIE},
	EDITOR={I.K. Sethi and R.C. Jain},
	VOLUME={3022},
	PAGES={290-297},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-JQ97,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Protocol failures for RSA-like functions using Lucas sequences and elliptic curves}},
	BOOKTITLE={Security Protocols 1996},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1189},
	PAGES={93-100},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-J97,
 	AUTHOR={Joye, Marc},
	TITLE={{On the importance of securing your bins: The garbage-man-in-the-middle attack}},
	BOOKTITLE={4th ACM Conference on Computer and Communications Security},
	PUBLISHER={ACM Press},
	EDITOR={T. Matsumoto},
	PAGES={135-141},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-Q97,
 	AUTHOR={Quisquater, Jean-Jacques},
	TITLE={{The adolescence of smart cards}},
	BOOKTITLE={Future Generation Computer Systems},
	PAGES={3-7},
	MONTH={1},
	YEAR={1997},
}

@ARTICLE{cgUCL-D97,
 	AUTHOR={Dhem, Jean-François},
	TITLE={{Lossless compression algorithms for smart cards: A progress report}},
	BOOKTITLE={Future Generation Computer Systems},
	PAGES={27-38},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-GJQ97,
 	AUTHOR={Gillet, A. and Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Cautionary note for protocols designers: Security proof is not enough}},
	BOOKTITLE={DIMACS Workshop on Design and Formal Verification of Security Protocols},
	EDITOR={H. Orman and C. Meadows},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-BJQ97,
 	AUTHOR={Bleichenbacher, D. and Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{A new and optimal chosen-message attack on RSA-type cryptosystems}},
	BOOKTITLE={Information and Communications Security (ICICS'97)},
	PUBLISHER={Springer-Verlag},
	EDITOR={Y. Han, T. Okamoto and S. Qing},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1334},
	MONTH={1},
	YEAR={1997},
}

@ARTICLE{cgUCL-JQ97,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Cryptosystem of Chua and Ling}},
	JOURNAL={Electronic Letters},
	VOLUME={33},
	PAGES={1938},
	MONTH={1},
	YEAR={1997},
}

@ARTICLE{cgUCL-JQBD97,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques and Bao, Feng and Deng, Robert H.},
	TITLE={{RSA-type cryptosystems in the presence of transient faults}},
	PUBLISHER={Springer-Verlag},
	EDITOR={M. Darnell},
	JOURNAL={Cryptography and Coding},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1355},
	PAGES={155-160},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-DJQ97,
 	AUTHOR={Dhem, Jean-François and Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{RSA-type signatures in the presence of transient faults}},
	BOOKTITLE={Cryptography and Coding},
	PUBLISHER={Springer-Verlag},
	EDITOR={M. Darnell},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1355},
	PAGES={155-160},
	MONTH={1},
	YEAR={1997},
}

@ARTICLE{cgUCL-JQ97,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Authentication of sequences with the SL2 hash function: Application to video sequences}},
	JOURNAL={Journal of Computer Security},
	VOLUME={5},
	PAGES={213-223},
	MONTH={1},
	YEAR={1997},
}

@INPROCEEDINGS{cgUCL-K97,
 	AUTHOR={Kabasele-T., },
	TITLE={{Multimedia Integration into an Engineering Course: a lesson learned}},
	BOOKTITLE={Computer Aided Engineering Education (CAEE'97)},
	MONTH={1},
	YEAR={1997},
}