@INPROCEEDINGS{cgUCL-BLMQ05,
 	AUTHOR={Barreto, Paulo S. L. M. and Libert, Benoit and McCullagh, Noel and Quisquater, Jean-Jacques},
	TITLE={{Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps}},
	BOOKTITLE={Asiacrypt 2005},
	PUBLISHER={Springer},
	EDITOR={B. Roy},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3788},
	PAGES={515-532},
	MONTH={12},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-CLQ05,
 	AUTHOR={Cathalo, Julien and Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Efficient and Non-Interactive Timed-Release Encryption}},
	BOOKTITLE={Information and Communications Security: 7th International Conference, ICICS 2005},
	PUBLISHER={Springer},
	EDITOR={S. Qing, W. Mao, J. Lopez and G. Wang},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3783},
	PAGES={291-303},
	MONTH={12},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-GN05,
 	AUTHOR={Giry, Damien and Neve, Michael},
	TITLE={{eMail Address Protection Study}},
	BOOKTITLE={Information Security and Cryptology - CISC 2005},
	PUBLISHER={Higher Education Press},
	PAGES={247-256},
	MONTH={12},
	YEAR={2005},
}

@ARTICLE{cgUCL-KD05,
 	AUTHOR={Kalach, Kassem and David, Jean-Pierre},
	TITLE={{Hardware Implementation of Large Number Multiplication by FFT with Modular Arithmetic}},
	BOOKTITLE={The 3rd International IEEE Northeast Workshop on Circuits & Systems (IEEE-NEWCAS 05), Québec City, Canada},
	MONTH={10},
	YEAR={2005},
}

@ARTICLE{cgUCL-CKCLLPS05,
 	AUTHOR={Canetti, Ran and Kaynar, Dilsun and Cheung, Ling and Liskov, Moses and Lynch, Nancy and Pereira, Olivier and Segala, Roberto},
	TITLE={{Using Probabilistic I/O Automata to Improve the Analysis of Cryptographic Protocols.}},
	BOOKTITLE={Special: Security and Trust Management},
	JOURNAL={ERCIM News},
	PAGES={40--41},
	MONTH={10},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-AREDQ05,
 	AUTHOR={Aboudagga, Nidal and Refaei, Mohamed Tamer and Eltoweissy, Mohamed and DaSilva, Luiz A and Quisquater, Jean-Jacques},
	TITLE={{Authentication protocols for ad hoc networks: Taxonomy and research issues}},
	BOOKTITLE={Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks},
	MONTH={10},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSQL05,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques and Legat, Jean-Didier},
	TITLE={{A Design Methodology for Secured ICs Using Dynamic Current Mode Logic}},
	BOOKTITLE={Power and Timing Modeling, Optimization and Simulation - Proceedings of PATMOS 2005},
	PUBLISHER={Springer},
	EDITOR={V. Paliouras},
	SERIES={Lecture Notes in Computer Science},
	PAGES={550-560},
	MONTH={9},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSY05,
 	AUTHOR={Malkin, Tal G. and Standaert, François-Xavier and Yung, Moti},
	TITLE={{A Comparative Cost/Security Analysis of Fault Attack Countermeasures}},
	BOOKTITLE={FDTC 2005/2006},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4236},
	PAGES={159-172},
	MONTH={9},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-PSDQ05,
 	AUTHOR={Peeters, Eric and Standaert, François-Xavier and Donckers, Nicolas and Quisquater, Jean-Jacques},
	TITLE={{Improved Higher Order Side-Channel Attacks with FPGA experiments}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - Proceedings of CHES 2005},
	PUBLISHER={Spinger-Verlag},
	EDITOR={Josyula R. Rao, Berk Sunar},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3659},
	PAGES={309-323},
	MONTH={8},
	YEAR={2005},
}

@ARTICLE{cgUCL-CJ05,
 	AUTHOR={Ciet, Mathieu and Joye, Marc},
	TITLE={{Elliptic curve cryptosystems in the presence of permanent and transient faults}},
	PUBLISHER={Kluwer Academic Publ},
	JOURNAL={Designs Codes and Cryptography},
	VOLUME={36},
	MONTH={7},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPGQ05,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Gershenfeld, Neil and Quisquater, Jean-Jacques},
	TITLE={{SEA: a Scalable Encryption Algorithm for Small Embedded Applications}},
	BOOKTITLE={Workshop on Lightweight Crypto},
	MONTH={7},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-LQ05,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Identity Based Encryption without Redundancy}},
	BOOKTITLE={3rd Applied Cryptography and Network Security conference (ACNS'05)},
	PUBLISHER={Springer},
	EDITOR={J. Ioannidis, A. Keromytis and  M. Yung},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3531},
	PAGES={285-300},
	MONTH={6},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-LSRQ05,
 	AUTHOR={Léglise, Philippe and Standaert, François-Xavier and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{Efficient Implementation of Recent Stream Ciphers on Reconfigurable Hardware Devices}},
	BOOKTITLE={26th Symposium on Information Theory in the Benelux},
	PAGES={261-268},
	MONTH={5},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPQ05,
 	AUTHOR={Standaert, François-Xavier and Peeters, Eric and Quisquater, Jean-Jacques},
	TITLE={{On the Masking Countermeasure and Higher-Order Power Analysis Attacks}},
	BOOKTITLE={ITCC 2005},
	PUBLISHER={IEEE Computer Society},
	VOLUME={1},
	PAGES={562-567},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SPRQ05,
 	AUTHOR={Standaert, François-Xavier and Piret, Gilles and Rouvroy, Gaël and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of the ICEBERG Block Cipher}},
	BOOKTITLE={ITCC 2005},
	NOTE={To appear},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-SLRQML05,
 	AUTHOR={Standaert, François-Xavier and Lefèbvre, Frédéric and Rouvroy, Gaël and Quisquater, Jean-Jacques and Macq, Benoit and Legat, Jean-Didier},
	TITLE={{Practical Evaluation of a Radial Soft Hash Algorithm}},
	BOOKTITLE={ITCC 2005},
	NOTE={To appear},
	MONTH={4},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MSLQ05,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Legat, Jean-Didier and Quisquater, Jean-Jacques},
	TITLE={{Recommendations for Secure IC's and ASIC's}},
	BOOKTITLE={CEPA2 Workshop - What Technologies in Defence Applications for Digital Signal Processing Now and in the Future},
	PAGES={NA},
	MONTH={3},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-QS05,
 	AUTHOR={Quisquater, Jean-Jacques and Standaert, François-Xavier},
	TITLE={{Exhaustive Key Search of the DES: Updates and Refinements}},
	BOOKTITLE={SHARCS 2005},
	NOTE={To appear},
	MONTH={2},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-CCN05,
 	AUTHOR={Cathalo, Julien and Coron, Jean-Sébastien and Naccache, David},
	TITLE={{From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited}},
	BOOKTITLE={8th International Workshop on Practice and Theory in Public-Key Cryptography (PKC 2005)},
	EDITOR={S. Vaudenay},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3386},
	PAGES={234-243},
	MONTH={1},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-PQ05,
 	AUTHOR={Piret, Gilles and Quisquater, Jean-Jacques},
	TITLE={{Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results}},
	BOOKTITLE={Selected Areas in Cryptography, 11th Annual International Workshop, SAC 2004},
	PUBLISHER={Springer-Verlag},
	EDITOR={H. Handschuh and A. Hasan},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3357},
	PAGES={100-115},
	MONTH={1},
	YEAR={2005},
}

@CGREPORT{cgUCL-MQ05,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Left-to-right modular multiplication without large integer comparisons}},
	MONTH={1},
	YEAR={2005},
}

@CGREPORT{cgUCL-MQ05,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Karatsuba-like Squaring}},
	MONTH={1},
	YEAR={2005},
}

@CGREPORT{cgUCL-MQ05,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Low-Cost Elliptic Curve Digital Signature Cryptoprocessor Based on Affine Coordinates – First Results}},
	MONTH={1},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-MQ05,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Novel iterative digit-serial modular division over GF(2^m)}},
	BOOKTITLE={CRyptographic Advances in Secure Hardware -- CRASH 2005},
	MONTH={1},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-P05,
 	AUTHOR={Perret, Ludovic},
	TITLE={{A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem}},
	BOOKTITLE={Advances in Cryptology - EUROCRYPT 2005},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={3494},
	PAGES={354-370},
	MONTH={1},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-P05,
 	AUTHOR={Perret, Ludovic},
	TITLE={{A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words}},
	BOOKTITLE={Proceedings of International Workshop on Coding and Cryptography (WCC 2005)},
	PAGES={235-244},
	MONTH={1},
	YEAR={2005},
}

@INPROCEEDINGS{cgUCL-LP05,
 	AUTHOR={Levy-dit-Vehel, Françoise and Perret, Ludovic},
	TITLE={{On Wagner-Magyarik Cryptosystem}},
	BOOKTITLE={Proceedings of International Workshop on Coding and Cryptography (WCC 2005)},
	PAGES={285-294},
	MONTH={1},
	YEAR={2005},
}