@ARTICLE{cgUCL-GGHMKRSTW10,
 	AUTHOR={Gallais, Jean-Francois and Großschädl, Johann and Hanley, Neil and Medwed, Marcel and Kasper, Markus and Regazzoni, Francesco and Schmidt, Jörn-Marc and Tillich, Stefan and Wojcik, Marcin},
	TITLE={{Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software}},
	JOURNAL={Proceedings of 2nd International Conference on Trusted Systems, (INTRUST) 2010},
	MONTH={12},
	YEAR={2010},
}

@ARTICLE{cgUCL-LQY10,
 	AUTHOR={Libert, Benoit and Quisquater, Jean-Jacques and Yung, Moti},
	TITLE={{Key Evolution Systems in Untrusted Update Environments}},
	JOURNAL={ACM Transactions on Information and System Security (TISSEC)},
	VOLUME={13},
	MONTH={12},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-CCDP10,
 	AUTHOR={Canard, Sébastien and Coisel, Iwen and de Meulenaer, Giacomo and Pereira, Olivier},
	TITLE={{Group Signatures are Suitable for Constrained Devices}},
	BOOKTITLE={ICISC 2010},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={12},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-SM10,
 	AUTHOR={Schmidt, Jörn-Marc and Medwed, Marcel},
	TITLE={{Fault Attacks on the Montgomery Powering Ladder}},
	BOOKTITLE={ICISC 2010},
	PAGES={inpress},
	MONTH={12},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-MPP10,
 	AUTHOR={Mawet, Sophie and Pereira, Olivier and Petit, Christophe},
	TITLE={{Equitable cake cutting without mediator}},
	BOOKTITLE={5th Benelux Workshop on Information and System Security},
	EDITOR={Svetla Nikova and Lejla Batina},
	MONTH={11},
	YEAR={2010},
}

@INBOOK{cgUCL-SPYQYO10,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu and Quisquater, Jean-Jacques and Yung, Moti and Oswald, Elisabeth},
	TITLE={{Leakage Resilient Cryptography in Practice}},
	BOOKTITLE={Towards Hardware Intrinsic Security: Foundation and Practice},
	PUBLISHER={Springer},
	PAGES={105-139},
	MONTH={11},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-CP10,
 	AUTHOR={Cathalo, Julien and Petit, Christophe},
	TITLE={{One-time trapdoor one-way functions}},
	BOOKTITLE={Information Security - 13th International Conference (ISC  2010)  },
	PUBLISHER={Springer},
	EDITOR={Mike Burmester and  Gene Tsudik and Spyros S. Magliveras and Ivana Ilic},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6531},
	PAGES={283-298},
	MONTH={10},
	YEAR={2010},
}

@ARTICLE{cgUCL-BBKPR10,
 	AUTHOR={Barenghi, Alessandro and Breveglieri, Luca and Koren, Israel and Pelosi, Gerardo and Regazzoni, Francesco},
	TITLE={{Low Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs}},
	JOURNAL={Proceedings of 5th Workshop on Embedded Systems Security (WESS) 2010},
	MONTH={10},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-PP10,
 	AUTHOR={Palmieri, Paolo and Pereira, Olivier},
	TITLE={{Building Oblivious Transfer on Channel Delays}},
	BOOKTITLE={6th China International Conference on Information Security and Cryptology (Inscrypt 2010)},
	PUBLISHER={Springer},
	EDITOR={X. Lai, M. Yung and D. Lin},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6584},
	PAGES={125-138},
	MONTH={10},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-YSPY10,
 	AUTHOR={Yu, Yu and Standaert, François-Xavier and Pereira, Olivier and Yung, Moti},
	TITLE={{Practical leakage-resilient pseudorandom generators}},
	BOOKTITLE={Proceedings of the 17th ACM conference on Computer and communications security},
	PUBLISHER={ACM},
	PAGES={141--151},
	MONTH={10},
	YEAR={2010},
}

@ARTICLE{cgUCL-SJSMSA10,
 	AUTHOR={Shariati, Saloomeh and Jacques, Laurent  and Standaert, François-Xavier and Macq, Benoit and Salhi, Mohamad Amine  and Antoine, Philippe},
	TITLE={{Randomly Driven Fuzzy Key Extraction of Uncloneable Images}},
	JOURNAL={The International Conference on Image Processing (ICIP)},
	MONTH={9},
	YEAR={2010},
}

@ARTICLE{cgUCL-BSQ10,
 	AUTHOR={Bulens, Philippe and Standaert, François-Xavier and Quisquater, Jean-Jacques},
	TITLE={{How to Strongly Link Data and its Medium: the Paper Case}},
	JOURNAL={IET Information Security},
	VOLUME={2},
	PAGES={125-236},
	MONTH={9},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-HHSFB10,
 	AUTHOR={Heidar Kamel, Dina and Hocquet, Cédric and Standaert, François-Xavier and Flandre, Denis and Bol, David},
	TITLE={{Glitch-Induced Within-Die Variations of Dynamic Energy in Voltage-Scaled Nano-CMOS Circuits}},
	BOOKTITLE={proceedings of ESSCIRC 2010},
	MONTH={9},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-PQ10,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Preimages for the Tillich-Zémor hash function}},
	BOOKTITLE={SAC2010 Selected Areas in Cryptography},
	PUBLISHER={Springer},
	EDITOR={Alex Biryukov and Guang Gong and Douglas R. Stinson},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6544},
	PAGES={282-301},
	MONTH={8},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-AP10,
 	AUTHOR={Adida, Ben and Pereira, Olivier},
	TITLE={{State of Helios 2010: features and deployments}},
	BOOKTITLE={EVT/WOTE'10 -- Rump Session Talk},
	MONTH={8},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-S10,
 	AUTHOR={Standaert, François-Xavier},
	TITLE={{How Leaky is an Extractor?}},
	BOOKTITLE={proceedings of LatinCrypt 2010},
	PUBLISHER={Spinger},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6212},
	PAGES={294-304},
	MONTH={8},
	YEAR={2010},
}

@ARTICLE{cgUCL-CCEG10,
 	AUTHOR={Canard, Sébastien and Coisel, Iwen and Etrog, Jonathan and Girault, Marc},
	TITLE={{Privacy-Preserving RFID Systems: Model and Constructions}},
	JOURNAL={Cryptology ePrint Archive},
	MONTH={7},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-LY10,
 	AUTHOR={Libert, Benoit and Yung, Moti},
	TITLE={{Efficient Completely Non-Malleable Public Key Encryption}},
	BOOKTITLE={37th International Colloquium on Automata, Languages and Programming (ICALP 2010) - Track A},
	PUBLISHER={Springer},
	EDITOR={P. Spirakis, S. Abramsky & F. Meyer auf der Heide},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6198},
	PAGES={127-139},
	NOTE={To appear},
	MONTH={7},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-CS10,
 	AUTHOR={Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{Multi-Trail Statistical Saturation Attacks}},
	BOOKTITLE={ACNS 2010},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6487},
	PAGES={123-138},
	MONTH={6},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-RS10,
 	AUTHOR={Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Representation-, Leakage- and Cipher- Dependencies in Algebraic Side-Channel Attacks}},
	BOOKTITLE={industrial track of ACNS 2010},
	MONTH={6},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-CCG10,
 	AUTHOR={Canard, Sébastien and Coisel, Iwen and Girault, Marc},
	TITLE={{Security of Privacy-Preserving RFID Systems}},
	BOOKTITLE={IEEE International Conference on RFID-Technology and Applications  -- RFID-TA'10},
	PUBLISHER={IEEE},
	PAGES={269--274},
	MONTH={6},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-ACM10,
 	AUTHOR={Avoine, Gildas and Coisel, Iwen and Martin, Tania},
	TITLE={{Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols}},
	BOOKTITLE={Workshop on RFID Security -- RFIDSec'10},
	PUBLISHER={Spinger},
	EDITOR={S.B. Ors Yalcin},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6370},
	PAGES={138--157},
	MONTH={6},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-AL10,
 	AUTHOR={Attrapadung, Nuttapong and Libert, Benoit},
	TITLE={{Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation}},
	BOOKTITLE={13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010)},
	PUBLISHER={Springer},
	EDITOR={P. Nguyen and D. Pointcheval},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6056},
	PAGES={384-402},
	MONTH={5},
	YEAR={2010},
}

@ARTICLE{cgUCL-SSJMSA10,
 	AUTHOR={Shariati, Saloomeh and Standaert, François-Xavier and Jacques, Laurent  and Macq, Benoit and Salhi, Mohamad Amine  and Antoine, Philippe},
	TITLE={{Random Profiles of Laser Marks}},
	JOURNAL={Proceedings of the 31th symposium on Information Theory in the Benelux},
	PAGES={27-34},
	MONTH={5},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-DS10,
 	AUTHOR={de Meulenaer, Giacomo and Standaert, François-Xavier},
	TITLE={{Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks}},
	BOOKTITLE={2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT 2010)},
	PUBLISHER={Springer's Lecture Notes of ICST - LNICST},
	MONTH={5},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-MSGR10,
 	AUTHOR={Medwed, Marcel and Standaert, François-Xavier and Großschädl, Johann and Regazzoni, Francesco},
	TITLE={{Fresh Re-Keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices}},
	BOOKTITLE={Progress in Cryptology - Africacrypt 2010},
	PUBLISHER={Springer Verlag},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6055},
	PAGES={279-296},
	MONTH={5},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-GLFFLMS10,
 	AUTHOR={Galindo, David and Libert, Benoit and Fischlin, Marc and Fuchsbauer, Georg and Lehmann, Anja and Manulis, Mark and Schröder, Dominique},
	TITLE={{Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions}},
	BOOKTITLE={Progress in Cryptology - Africacrypt 2010},
	PUBLISHER={Springer},
	EDITOR={D. Bernstein and T. Lange},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6055},
	PAGES={333-350},
	MONTH={5},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-LY10,
 	AUTHOR={Libert, Benoit and Yung, Moti},
	TITLE={{Dynamic Fully Foward-Secure Group Signatures}},
	BOOKTITLE={5th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2010)},
	PUBLISHER={ACM Press},
	EDITOR={D. Basin and P. Liu},
	NOTE={to appear},
	MONTH={4},
	YEAR={2010},
}

@CGREPORT{cgUCL-DS10,
 	AUTHOR={de Meulenaer, Giacomo and Standaert, François-Xavier},
	TITLE={{Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks}},
	NOTE={Extended abstract of the poster presented at the third ACM conference on Wireless Network Security (WiSec ’10)},
	MONTH={3},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-TRPFS10,
 	AUTHOR={Tumeo, Antonino and Regazzoni, Francesco and Palermo, Gianluca and Ferrandi, Fabrizio and Sciuto, Donatella},
	TITLE={{A Reconfigurable Multiprocessor  Architecture for a Reliable Face Recognition Implementation}},
	BOOKTITLE={Proceedings of Design, Automation and Test in Europe, 2010},
	MONTH={3},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-LY10,
 	AUTHOR={Libert, Benoit and Yung, Moti},
	TITLE={{Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs}},
	BOOKTITLE={Theory of Cryptography Conference 2010 (TCC'10)},
	PUBLISHER={Spinger},
	EDITOR={D. Micciancio},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={5978},
	PAGES={499-517},
	NOTE={ },
	MONTH={2},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-CCE10,
 	AUTHOR={Canard, Sébastien and Coisel, Iwen and Etrog, Jonathan},
	TITLE={{Lighten Encryption Schemes for Secure and Private RFID Systems}},
	BOOKTITLE={Financial Cryptography Workshops},
	PUBLISHER={Spinger},
	EDITOR={Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6054},
	PAGES={19-33},
	MONTH={1},
	YEAR={2010},
}