@INPROCEEDINGS{cgUCL-KSQL07,
 	AUTHOR={Kim, Chong Hee and Shin, Jong Hoon and Quisquater, Jean-Jacques and Lee, Pil Joong},
	TITLE={{Safe-Error Attack on SPA-FA resistant exponentiations using a HW modular multiplier}},
	BOOKTITLE={The International Conference on Information Security and Cryptology - ICISC 2007},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4817},
	PAGES={273-281},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-CSQ07,
 	AUTHOR={Collard, Baudoin and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Improving the Time Complexity of Matsui's Linear Cryptanalysis}},
	BOOKTITLE={The International Conference on Information Security and Cryptology - ICISC 2007},
	PUBLISHER={Springer},
	EDITOR={K.-H. Nam and G. Rhee},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4817},
	PAGES={77-88},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-DPQ07,
 	AUTHOR={de Marneffe, Olivier and Pereira, Olivier and Quisquater, Jean-Jacques},
	TITLE={{Simulation-Based Analysis of E2E Voting Systems}},
	BOOKTITLE={Proceedings of the First Conference on E-Voting and Identity (VOTE-ID 2007)},
	PUBLISHER={Springer},
	EDITOR={A. Alkassar and M. Volkamer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4896},
	PAGES={137-149},
	MONTH={11},
	YEAR={2007},
}

@ARTICLE{cgUCL-AEQ07,
 	AUTHOR={Aboudagga, Nidal and Eltoweissy, Mohamed and Quisquater, Jean-Jacques},
	TITLE={{Two-Level Signature Delegation For Mobile First Responder Authentication}},
	BOOKTITLE={The Second International Workshop on Trusted Collaboration, 2007},
	PUBLISHER={IEEE Computer Society},
	JOURNAL={TrustCol-2007},
	MONTH={11},
	YEAR={2007},
}

@ARTICLE{cgUCL-KQ07,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{Faults, Injection Methods, and Fault Attacks}},
	PUBLISHER={IEEE Computer Society},
	JOURNAL={IEEE Design and Test of Computers},
	VOLUME={24},
	PAGES={544-545},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-CCT07,
 	AUTHOR={Coisel, Iwen and Canard, Sébastien and Traoré, Jacques},
	TITLE={{Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use}},
	BOOKTITLE={ProvSec},
	PUBLISHER={Springer},
	EDITOR={Willy Susilo, Joseph K. Liu, Yi Mu},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={4784},
	PAGES={122-137},
	MONTH={11},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-LQY07,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques and Yung, Moti},
	TITLE={{Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions}},
	BOOKTITLE={14th ACM Conference on Computer and Communications Security (ACM CCS'07)},
	PUBLISHER={ACM},
	EDITOR={S. De Capitani di Vimercati and P. Syverson},
	PAGES={266-275},
	MONTH={10},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-BMS07,
 	AUTHOR={Bresson, Emmanuel and Manulis, Mark and Schwenk, Joerg},
	TITLE={{On Security Models and Compilers for Group Key Exchange Protocols}},
	BOOKTITLE={2nd International Workshop on Security (IWSEC 2007)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4752},
	PAGES={292-307},
	MONTH={10},
	YEAR={2007},
}

@ARTICLE{cgUCL-AEQ07,
 	AUTHOR={Aboudagga, Nidal and Eltoweissy, Mohamed and Quisquater, Jean-Jacques},
	TITLE={{Group Authentication Protocol for Mobile Networks}},
	BOOKTITLE={3rd IEEE INTERNATIONAL CONFERENCE ON Wireless and Mobile Computing, Networking and Communications},
	PUBLISHER={IEEE Computer Society},
	JOURNAL={Wimob},
	PAGES={28},
	NOTE={http://doi.ieee},
	MONTH={10},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MBQ07,
 	AUTHOR={Meurice de Dormale, Guerric and Bulens, Philippe and Quisquater, Jean-Jacques},
	TITLE={{Collision Search for Elliptic Curve Discrete Logarithm over GF(2^m) with FPGA}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4727},
	PAGES={378-393},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-DGMQ07,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Elliptic Curve Factorization Method : Towards Better Exploitation of Reconfigurable Hardware}},
	BOOKTITLE={Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'07)},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-KQ07,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{How can we overcome both side channel analysis and fault attacks on RSA-CRT?}},
	BOOKTITLE={4th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2007},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={21-29},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MSQ07,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{Simulation-Based Evaluation of Logic Styles to Counteract Side-Channel Attacks}},
	BOOKTITLE={Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Sciences},
	VOLUME={4727},
	PAGES={427-442},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-SQC07,
 	AUTHOR={Standaert, François-Xavier and Quisquater, Jean-Jacques and Collard, Baudoin},
	TITLE={{Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent}},
	BOOKTITLE={Inscrypt 2007},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4990},
	PAGES={51-65},
	MONTH={9},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MS07,
 	AUTHOR={Manulis, Mark and Schwenk, Joerg},
	TITLE={{Provably Secure Framework for Information Aggregation in Sensor Networks}},
	BOOKTITLE={Computational Science and Its Applications - ICCSA 2007, International Conference, Part I},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4705},
	PAGES={603-621},
	MONTH={8},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MBQ07,
 	AUTHOR={Meurice de Dormale, Guerric and Bass, John and Quisquater, Jean-Jacques},
	TITLE={{Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --}},
	BOOKTITLE={International Conference on Field Programmable Logic and Applications (FPL 2007)},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={642-647},
	MONTH={8},
	YEAR={2007},
}

@BOOK{cgUCL-M07,
 	AUTHOR={Manulis, Mark},
	TITLE={{Provably Secure Group Key Exchange}},
	PUBLISHER={European University Press},
	EDITOR={Christoph Paar, Ahmad-Reza Sadeghi, Joerg Schwenk},
	SERIES={IT Security},
	VOLUME={5},
	MONTH={8},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-LQ07,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques},
	TITLE={{Practical Time Capsule Signatures in the Standard Model from Bilinear Maps}},
	BOOKTITLE={1st International Conference on Pairing-based Cryptography (Pairing 2007)},
	PUBLISHER={Springer},
	EDITOR={T. Takagi and T. Okamoto},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4575},
	PAGES={23-38},
	MONTH={7},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MSQ07,
 	AUTHOR={Mace, François and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{ASIC Implementations of the Block Cipher SEA for Constrained Applications}},
	BOOKTITLE={Proceedings of the Third International Conference on RFID Security - RFIDSec 2007},
	PAGES={103-114},
	MONTH={7},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-BM07,
 	AUTHOR={Bresson, Emmanuel and Manulis, Mark},
	TITLE={{Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust}},
	BOOKTITLE={4th International Conference on Autonomic and Trusted Computing (ATC 2007)},
	PUBLISHER={Springer Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4610},
	PAGES={395-409},
	MONTH={7},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-CCKLP07,
 	AUTHOR={Canetti, Ran and Cheung, Ling and Kaynar, Dilsun and Lynch, Nancy and Pereira, Olivier},
	TITLE={{Compositional Security for Task-PIOAs}},
	BOOKTITLE={Proceedings of the 20th IEEE Computer Security Foundations Symposium},
	PUBLISHER={IEEE Computer Society Press},
	EDITOR={A. Sabelfeld},
	PAGES={125-139},
	MONTH={7},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-AP07,
 	AUTHOR={Araragi, Tadashi and Pereira, Olivier},
	TITLE={{Automatic Verification of Simulatability in Security Protocols}},
	BOOKTITLE={Workshop on Formal and Computational Cryptography - FCC 2007},
	EDITOR={M. Backes and Y. Lakhnech},
	NOTE={To appear},
	MONTH={7},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-KQ07,
 	AUTHOR={Kim, Chong Hee and Quisquater, Jean-Jacques},
	TITLE={{Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures}},
	BOOKTITLE={Workshop in Information Security Theory and Practices: Smart cards, Mobile and Ubiquitous computing systems - WISTP 2007},
	PUBLISHER={Springer-Verlag},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4462},
	PAGES={215-228},
	MONTH={5},
	YEAR={2007},
}

@ARTICLE{cgUCL-MQ07,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Area and Time Trade-offs for Iterative Modular Division over GF(2^m): Novel Algorithm and Implementations on FPGA}},
	PUBLISHER={Taylor & Francis},
	JOURNAL={International Journal of Electronics},
	VOLUME={94},
	PAGES={515-529},
	MONTH={5},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-DGMQ07,
 	AUTHOR={de Meulenaer, Giacomo and Gosset, François and Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware}},
	BOOKTITLE={IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07)},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={197-207},
	MONTH={4},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-MBQ07,
 	AUTHOR={Meurice de Dormale, Guerric and Bass, John and Quisquater, Jean-Jacques},
	TITLE={{On Solving RC5 Challenges with FPGAs}},
	BOOKTITLE={IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07)},
	PUBLISHER={IEEE Computer Society Press},
	PAGES={281-282},
	MONTH={4},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-LQY07,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques and Yung, Moti},
	TITLE={{Parallel Key-Insulated Public Key Encryption Without Random Oracles}},
	BOOKTITLE={Public Key Cryptography 2007 (PKC'07)},
	PUBLISHER={Springer},
	EDITOR={T. Okamoto and X. Wang},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={4450},
	PAGES={298-314},
	MONTH={4},
	YEAR={2007},
}

@INPROCEEDINGS{cgUCL-CCLP07,
 	AUTHOR={Canetti, Ran and Cheung, Ling and Lynch, Nancy and Pereira, Olivier},
	TITLE={{On the Role of Scheduling in Simulation-Based Security}},
	BOOKTITLE={Proceedings of the 7th International Workshop on Issues in the Theory of Security (WITS 2007)},
	EDITOR={R. Focardi},
	PAGES={22--37},
	MONTH={3},
	YEAR={2007},
}

@ARTICLE{cgUCL-HMFL07,
 	AUTHOR={Hassoune, Ilham and Mace, François and Flandre, Denis and Legat, Jean-Didier},
	TITLE={{Dynamic differential self-timed logic families for robust and low-power security ICs}},
	PUBLISHER={Elsevier},
	JOURNAL={INTEGRATION, the VLSI Journal},
	VOLUME={40},
	PAGES={355-364},
	MONTH={3},
	YEAR={2007},
}

@ARTICLE{cgUCL-MQ07,
 	AUTHOR={Meurice de Dormale, Guerric and Quisquater, Jean-Jacques},
	TITLE={{High-speed Hardware Implementations of Elliptic Curve Cryptography: A Survey}},
	PUBLISHER={Elsevier},
	EDITOR={N. Nedjah, L.M. Mourelle},
	JOURNAL={Journal of Systems Architecture, Special Issue on Embedded Hardware for Cryptosystems},
	VOLUME={53},
	PAGES={72-84},
	MONTH={2},
	YEAR={2007},
}

@ARTICLE{cgUCL-BKSQ07,
 	AUTHOR={Bulens, Philippe and Kalach, Kassem and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile}},
	PUBLISHER={SASC, January 31 - February 1, 2007},
	NOTE={http://sasc.cry},
	MONTH={1},
	YEAR={2007},
}