@ARTICLE{cgUCL-NFQ99,
 	AUTHOR={Neve, Amaury and Flandre, Denis and Quisquater, Jean-Jacques},
	TITLE={{Feasibility of Smart Cards in Silicon-On-Insulator (SOI) Technology}},
	BOOKTITLE={In Proceedings of the USENIX Workshop on Smartcard Technolgy: Smartcard '99},
	PAGES={1-7},
	MONTH={5},
	YEAR={1999},
}

@ARTICLE{cgUCL-MSQ99,
 	AUTHOR={Massias, Henri and Serret, Xavier and Quisquater, Jean-Jacques},
	TITLE={{Design of a secure timestamping service with minimal trust requirement}},
	BOOKTITLE={Information Theory in the Benelux},
	EDITOR={In A. Barbé, E.C. van der Meulen and P. Vanroose},
	JOURNAL={Proceedings of the 20th symposium on Information Theory in the Benelux},
	PAGES={79-86},
	MONTH={5},
	YEAR={1999},
}

@ARTICLE{cgUCL-HFQ99,
 	AUTHOR={Hachez, Gaël and François,  and Quisquater, Jean-Jacques},
	TITLE={{cAESar results: Implementation of Four AES Candidates on Two Smart Cards}},
	BOOKTITLE={In Proceedings of the second Advanced Encryption Standard candidate conference},
	PAGES={95-108},
	MONTH={5},
	YEAR={1999},
}

@ARTICLE{cgUCL-V99,
 	AUTHOR={Verians, Xavier},
	TITLE={{A New Parallelism Management Scheme for Multiprocessor Systems}},
	BOOKTITLE={Parallel Computation: 4th International ACPC Conference Including Special Tracks on Parallel Numerics (ParNum '99) and Parallel Computing in Image Processing, Video Processing, and Multimedia},
	PUBLISHER={Springer-Verlag},
	EDITOR={P. Zinterhof, M. Vajtersic and A. Uhl},
	SERIES={Lectures Notes in Computer Science},
	VOLUME={1557},
	PAGES={246-256},
	MONTH={2},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-JYS99,
 	AUTHOR={Jakobsson, Markus and Yung, Moti and Stern, Julien},
	TITLE={{Scramble all, encrypt small}},
	BOOKTITLE={Proceedings of Fast Software Encryption: 6th International Workshop - FSE ’99},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={1636},
	PAGES={95-111},
	MONTH={1},
	YEAR={1999},
}

@ARTICLE{cgUCL-GLQ99,
 	AUTHOR={Gilmont, Tanguy and Legat, Jean-Didier and Quisquater, Jean-Jacques},
	TITLE={{Hardware security for software privacy support}},
	JOURNAL={IEE Electronics Letters},
	VOLUME={35},
	PAGES={2096-2098},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-DVQ99,
 	AUTHOR={Desmedt, Yvo and V., Tri and Quisquater, Jean-Jacques},
	TITLE={{Nonbinary audio cryptography}},
	BOOKTITLE={Proceedings of Info Hiding '99},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={1768},
	PAGES={478-489},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-PHKQ99,
 	AUTHOR={P., Julien and Hachez, Gaël and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{Robust object watermarking: application to code}},
	BOOKTITLE={Proceedings of Info Hiding '99},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={1768},
	PAGES={368-378},
	MONTH={1},
	YEAR={1999},
}

@ARTICLE{cgUCL-LJQ99,
 	AUTHOR={Lenstra, Arjen K. and Joye, Marc and Quisquater, Jean-Jacques},
	TITLE={{Chinese remaindering cryptosystems in the presence of faults}},
	PUBLISHER={Springer},
	JOURNAL={Journal of Cryptology},
	VOLUME={12},
	PAGES={241-245},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-GLQ99,
 	AUTHOR={Gilmont, Tanguy and Legat, Jean-Didier and Quisquater, Jean-Jacques},
	TITLE={{Enhancing the security in the management unit}},
	BOOKTITLE={Proceedings of the 25th EuroMicro Conference},
	PAGES={449-456},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-CNP99,
 	AUTHOR={Coron, Jean-Sébastien and Naccache, David and P., Julien},
	TITLE={{On the security of RSA padding}},
	BOOKTITLE={Advances in Cryptology - CRYPTO '99},
	PUBLISHER={Springer-Verlag},
	EDITOR={M. Wiener},
	VOLUME={1666},
	PAGES={1-18},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-MSQ99,
 	AUTHOR={Massias, Henri and Serret, Xavier and Quisquater, Jean-Jacques},
	TITLE={{Timestamps: Main issues on their use and implementation}},
	BOOKTITLE={Proceedings of IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collabo},
	PAGES={178-183},
	NOTE={ISBN 0-7695-036},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-KQL99,
 	AUTHOR={Kabasele, Jean-Marie and Quisquater, Jean-Jacques and Lobelle, Marc},
	TITLE={{Deriving a role-based access control model from the OBBAC model}},
	BOOKTITLE={Proceedings of IEEE 8th International Workshops on enabling Technologies: Infrastructure for Collabo},
	PAGES={147-151},
	NOTE={ISBN 0-7695-036},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-JQYY99,
 	AUTHOR={Joye, Marc and Quisquater, Jean-Jacques and Yen, Sung-Ming and Yung, Moti},
	TITLE={{Security paradoxes: How improving a cryptosystem may weaken it}},
	BOOKTITLE={Ninth National Conference on Information Security, Taichung, Taiwan},
	PAGES={27-32},
	MONTH={1},
	YEAR={1999},
}

@INPROCEEDINGS{cgUCL-HKQ99,
 	AUTHOR={Hachez, Gaël and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{Timing attack: what can be achieved by a powerful adversary?}},
	BOOKTITLE={Proceedings of the 20th symposium on Information Theory in the Benelux},
	EDITOR={A. Barbé, E.C. van der Meulen and P. Vanroose},
	PAGES={63-70},
	MONTH={1},
	YEAR={1999},
}