@INPROCEEDINGS{cgUCL-KHL03,
 	AUTHOR={Kim, Chong Hee and Hwang, Yong Ho and Lee, Pil Joong},
	TITLE={{An Effcient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack}},
	BOOKTITLE={Advances in Cryptology - ASIACRYPT 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2894},
	PAGES={359-373},
	MONTH={11},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-CJ03,
 	AUTHOR={Ciet, Mathieu and Joye, Marc},
	TITLE={{(Virtually) Free randomization techniques for elliptic curve cryptography}},
	BOOKTITLE={Information and Communications Security (ICICS 2003)},
	PUBLISHER={Springer-Verlag},
	EDITOR={S. Qing, D. Gollmann, and J. Zhou},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2836},
	MONTH={10},
	YEAR={2003},
}

@CGREPORT{cgUCL-PQ03,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{An attack against Barua et al. authenticated group key agreement protocol}},
	MONTH={10},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-CKQ03,
 	AUTHOR={Cathalo, Julien and Koeune, François and Quisquater, Jean-Jacques},
	TITLE={{A New Type of Timing Attack: Application to GPS}},
	BOOKTITLE={Fifth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003)},
	PUBLISHER={Springer},
	EDITOR={C. Walter, C. K. Koc, C. Paar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2779},
	PAGES={291-303},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Design Strategies and Modifed Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Tri}},
	BOOKTITLE={FPL 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2778},
	PAGES={181-193},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SVSQ03,
 	AUTHOR={Standaert, François-Xavier and van Oldeneel tot Oldenzeel, Loic and Samyde, David and Quisquater, Jean-Jacques},
	TITLE={{Differential Power Analysis of FPGAs : How Practical is the Attack?}},
	BOOKTITLE={FPL 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2778},
	PAGES={701-709},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SRQL03,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs}},
	BOOKTITLE={CHES 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2523},
	PAGES={334-350},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-QP03,
 	AUTHOR={Quisquater, Jean-Jacques and Piret, Gilles},
	TITLE={{A Differential Fault Attack Technique Against SPN Structures, with Application to the AES and KHAZAD}},
	BOOKTITLE={Fifth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003)},
	PUBLISHER={Springer-Verlag},
	EDITOR={C. Walter, C. K. Koc, C. Paar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2779},
	PAGES={77-88},
	MONTH={9},
	YEAR={2003},
}

@ARTICLE{cgUCL-PQ03,
 	AUTHOR={Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Some attacks upon authenticated group key agreement protocols}},
	PUBLISHER={IOSPress},
	JOURNAL={Journal of Computer Security},
	VOLUME={11},
	PAGES={555-580},
	MONTH={9},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-HKL03,
 	AUTHOR={Hwang, Yong Ho and Kim, Chong Hee and Lee, Pil Joong},
	TITLE={{An Effcient Revocation Scheme with Minimal Message Length for Stateless Receivers}},
	BOOKTITLE={Information Security and Privacy - ACISP 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2727},
	PAGES={377-386},
	MONTH={7},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-CLSQ03,
 	AUTHOR={Ciet, Mathieu and Lange, Tanja and Sica, Francesco and Quisquater, Jean-Jacques},
	TITLE={{Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms}},
	BOOKTITLE={Advances in Cryptology - EUROCRYPT 2003, Warsaw, Poland},
	PUBLISHER={Springer-Verlag},
	EDITOR={Eli Biham},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2656},
	MONTH={5},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-CPQ03,
 	AUTHOR={Ciet, Mathieu and Piret, Gilles and Quisquater, Jean-Jacques},
	TITLE={{A Structure of Block Ciphers achieving some Resistance against Fault Attacks}},
	BOOKTITLE={24 th Symposium on Information Theory in the Benelux},
	MONTH={5},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SPRQL03,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Key-Dependent Approximations in Cryptanalysis}},
	BOOKTITLE={the 24th Symposium on Information Theory in the Benelux},
	PAGES={53-62},
	MONTH={5},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient FPGA implementation of block cipher MISTY1}},
	BOOKTITLE={RAW 2003},
	PAGES={7pp},
	MONTH={4},
	YEAR={2003},
}

@ARTICLE{cgUCL-RSQL03,
 	AUTHOR={Rouvroy, Gaël and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{Efficient Uses of FPGAs for Implementations of the DES and its Experimental Linear Cryptanalysis}},
	VOLUME={32},
	PAGES={473-482},
	MONTH={4},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-SRQL03,
 	AUTHOR={Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Methodology to Implement Block Ciphers in Reconfigurable Hardware and its Application to Fast and Compact AES Rijndael}},
	BOOKTITLE={FPGA 2003},
	PAGES={216-224},
	MONTH={2},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-LQ03,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{New identity based signcryption schemes from pairings}},
	BOOKTITLE={IEEE Information Theory Workshop 2003},
	PAGES={155-158},
	NOTE={extended versio},
	MONTH={1},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-LQ03,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Efficient Revocation and Threshold Pairing Based Cryptosystems}},
	BOOKTITLE={22nd Symposium on Principles of Distributed Computing (PODC 2003)},
	PUBLISHER={ACM Press},
	PAGES={163-171},
	MONTH={1},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-BNSQ03,
 	AUTHOR={Bohy, Lilian and Neve, Michael and Samyde, David and Quisquater, Jean-Jacques},
	TITLE={{Principal and Independent Component Analysis for Cryptographic systems with Hardware Unmasked Units}},
	BOOKTITLE={e-Smart 2003},
	MONTH={1},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-CNPQ03,
 	AUTHOR={Ciet, Mathieu and Neve, Michael and Peeters, Eric and Quisquater, Jean-Jacques},
	TITLE={{Parallel FPGA implementation of RSA with residue number systems -- Can side-channel threats be avoided? --}},
	BOOKTITLE={IEEE Midwest International Symposium on Circuits and Systems 2003 (Special session on Security and Cryptographic Hardware Implementations)},
	MONTH={1},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-NPSQ03,
 	AUTHOR={Neve, Michael and Peeters, Eric and Samyde, David and Quisquater, Jean-Jacques},
	TITLE={{Memories: A Survey of their Secure Uses in Smart Cards}},
	BOOKTITLE={Second International IEEE Security in Storage Workshop - Proceedings of SISW 2003},
	MONTH={1},
	YEAR={2003},
}

@INPROCEEDINGS{cgUCL-LP03,
 	AUTHOR={Levy-dit-Vehel, Françoise and Perret, Ludovic},
	TITLE={{Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems}},
	BOOKTITLE={Progress in Cryptology - INDOCRYPT 2003},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={2904},
	PAGES={235-251},
	MONTH={1},
	YEAR={2003},
}