@INPROCEEDINGS{cgUCL-ILV11,
 	AUTHOR={Izabachène, Malika and Libert, Benoit and Vergnaud, Damien},
	TITLE={{Block-wise P-signatures and Non-Interactive Anonymous Credentials with Efficient Attributes}},
	BOOKTITLE={13th IMA International Conference on Cryptography and Coding (IMACC 2011)},
	PUBLISHER={Springer},
	EDITOR={L. Chen},
	SERIES={Lecture Notes on Computer Science},
	VOLUME={7089},
	PAGES={431-450},
	NOTE={ },
	MONTH={12},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-FLM11,
 	AUTHOR={Fischlin, Marc and Libert, Benoit and Manulis, Mark},
	TITLE={{Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security}},
	BOOKTITLE={Asiacrypt 2011},
	PUBLISHER={Spinger},
	EDITOR={D.-H. Lee & X. Wang},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={7073},
	PAGES={468-485},
	NOTE={ },
	MONTH={12},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-HLOV11,
 	AUTHOR={Hemenway, Brett and Libert, Benoit and Ostrovsky, Rafail and Vergnaud, Damien},
	TITLE={{Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security}},
	BOOKTITLE={Asiacrypt 2011},
	PUBLISHER={Spinger},
	EDITOR={D.-H. Lee & X. Wang},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={7073},
	PAGES={70-88},
	NOTE={ },
	MONTH={12},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-PP11,
 	AUTHOR={Palmieri, Paolo and Pereira, Olivier},
	TITLE={{Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering}},
	BOOKTITLE={14th International Conference on Information Security and Cryptology (ICISC 2011)},
	PUBLISHER={Springer},
	EDITOR={Howon Kim},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={7259},
	PAGES={332–345},
	MONTH={12},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-HDP11,
 	AUTHOR={Haustenne, Laurie and De Neyer, Quentin and Pereira, Olivier},
	TITLE={{Elliptic Curve Cryptography in JavaScript}},
	BOOKTITLE={ECRYPT Workshop on Lightweight Cryptography},
	EDITOR={G. Leander and F.-X. Standaert},
	MONTH={11},
	YEAR={2011},
}

@CGREPORT{cgUCL-BG11,
 	AUTHOR={Blondeau, Céline and Gérard, Benoit},
	TITLE={{Differential Cryptanalysis of PUFFIN and PUFFIN2}},
	BOOKTITLE={ECRYPT Workshop on Lightweight Cryptography},
	MONTH={11},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-PP11,
 	AUTHOR={Palmieri, Paolo and Pereira, Olivier},
	TITLE={{Secure Two-Party Computation Over a Z-Channel}},
	BOOKTITLE={ProvSec 2011},
	PUBLISHER={Springer},
	EDITOR={X. Boyen and X. Chen},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6980},
	PAGES={3-15},
	MONTH={10},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-KDVRMS11,
 	AUTHOR={Kerckhof, Stéphanie and Durvaux, François and Veyrat-Charvillon, Nicolas and Regazzoni, Francesco and Meurice de Dormale, Guerric and Standaert, François-Xavier},
	TITLE={{Low Cost FPGA Implementations of the SHA-3 Finalists}},
	BOOKTITLE={10th Smart Card Research and Advanced Application Conference (CARDIS) 2011},
	MONTH={9},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-MPRRS11,
 	AUTHOR={Medwed, Marcel and Petit, Christophe and Regazzoni, Francesco and Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks}},
	BOOKTITLE={10th Smart Card Research and Advanced Application Conference (CARDIS) 2011},
	MONTH={9},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BCPSW11,
 	AUTHOR={Bernhard, David and Cortier, Veronique and Pereira, Olivier and Smyth, Ben and Warinschi, Bogdan},
	TITLE={{Adapting Helios for provable ballot privacy}},
	BOOKTITLE={Computer Security – ESORICS 2011},
	PUBLISHER={Springer},
	EDITOR={Vijay Atluri, Claudia Diaz},
	SERIES={Lecture Notes in Computer Science},
	MONTH={9},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BDKPPSY11,
 	AUTHOR={Barak, Boaz and Dodis, Yevgeniy and Krawczyk, Hugo and Pereira, Olivier and Pietrzak, Krzysztof and Standaert, François-Xavier and Yu, Yu},
	TITLE={{Leftover Hash Lemma, Revisited}},
	BOOKTITLE={Advances in Cryptology - CRYPTO 2011},
	PUBLISHER={Springer-Verlag},
	EDITOR={Phillip Rogaway},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6841},
	PAGES={1-20},
	MONTH={8},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BGP11,
 	AUTHOR={Bulens, Philippe and Giry, Damien and Pereira, Olivier},
	TITLE={{Running Mixnet-Based Elections with Helios}},
	BOOKTITLE={Electronic Voting Technology Workshop/Workshop on Trustworthy Elections},
	PUBLISHER={Usenix},
	EDITOR={H. Shacham and V. Teague},
	MONTH={8},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-KCS11,
 	AUTHOR={Kerckhof, Stéphanie and Collard, Baudoin and Standaert, François-Xavier},
	TITLE={{FPGA Implementation of a Statistical Saturation Attack against PRESENT}},
	BOOKTITLE={Progress in Cryptology – AFRICACRYPT 2011},
	PUBLISHER={Springer},
	EDITOR={Nitaj, Abderrahmane and Pointcheval, David},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6737},
	PAGES={100-116},
	MONTH={7},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-LY11,
 	AUTHOR={Libert, Benoit and Yung, Moti},
	TITLE={{Adaptively Secure Non-Interactive Threshold Cryptosystems}},
	BOOKTITLE={38th International Colloquium on Automata, Languages and Programming (ICALP 2011) - Track C},
	PUBLISHER={Springer},
	EDITOR={J. Sgall, L. Aceto & M. Henzinger},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6756},
	PAGES={588-600},
	NOTE={ },
	MONTH={7},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-BHBSRK11,
 	AUTHOR={Barenghi, Alessandro and Hocquet, Cédric and Bol, David and Standaert, François-Xavier and Regazzoni, Francesco and Koren, Israel},
	TITLE={{Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an Example of a 65nm AES Implementation}},
	BOOKTITLE={7th Workshop on RFID Security and Privacy (RFIDSec) 2011},
	MONTH={6},
	YEAR={2011},
}

@ARTICLE{cgUCL-BRBSI11,
 	AUTHOR={Bayrak, Ali Galip and Regazzoni, Francesco and Brisk, Philip and Standaert, François-Xavier and Ienne, Paolo},
	TITLE={{A First Step Towards Automatic Application of Power Analysis Countermeasures}},
	BOOKTITLE={Proceedings of 48th Design Automation Conference (DAC) 2011},
	JOURNAL={Proceedings of 48th Design Automation Conference (DAC)},
	MONTH={6},
	YEAR={2011},
}

@ARTICLE{cgUCL-CRSBIL11,
 	AUTHOR={Cevrero, Alessandro and Regazzoni, Francesco and Schwander, Michael and Badel, Stephane and Ienne, Paolo and Leblebici, Yusuf},
	TITLE={{Power-Gated MOS Current Mode Logic (PG-MCML): A Power-Aware DPA-Resistant Standard Cell Library}},
	JOURNAL={Proceedings of 48th Design Automation Conference (DAC)},
	MONTH={6},
	YEAR={2011},
}

@ARTICLE{cgUCL-HHRLFBS11,
 	AUTHOR={Hocquet, Cédric and Heidar Kamel, Dina and Regazzoni, Francesco and Legat, Jean-Didier and Flandre, Denis and Bol, David and Standaert, François-Xavier},
	TITLE={{Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags}},
	PUBLISHER={Spinger},
	JOURNAL={Journal of Cryptographic Engineering},
	SERIES={Lecture Notes in Computer Science},
	MONTH={4},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-P11,
 	AUTHOR={Pereira, Olivier},
	TITLE={{Leakage-resilient Stream Ciphers: an Overview}},
	BOOKTITLE={2011 Grande Region Security and Reliability Day},
	EDITOR={Ralf Küsters, Michaël Rusinowitch},
	MONTH={3},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-MM11,
 	AUTHOR={Medwed, Marcel and Mangard, Stefan},
	TITLE={{Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks}},
	BOOKTITLE={DATE 2011},
	PAGES={inpress},
	MONTH={3},
	YEAR={2011},
}

@ARTICLE{cgUCL-LY11,
 	AUTHOR={Libert, Benoit and Yung, Moti},
	TITLE={{Efficient Traceable Signatures in the Standard Model}},
	PUBLISHER={Kluwer Academic Publishers},
	JOURNAL={Theoretical Computer Science},
	VOLUME={412},
	PAGES={1220-1242},
	MONTH={3},
	YEAR={2011},
}

@ARTICLE{cgUCL-LV11,
 	AUTHOR={Libert, Benoit and Vergnaud, Damien},
	TITLE={{Unidirectional Chosen-Ciphertext Secure Proxy Re- Encryption}},
	PUBLISHER={IEEE},
	JOURNAL={IEEE Transactions on Information Theory},
	VOLUME={57},
	PAGES={1786-1802},
	MONTH={3},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-AL11,
 	AUTHOR={Attrapadung, Nuttapong and Libert, Benoit},
	TITLE={{Homomorphic Network Coding Signatures in the Standard Model}},
	BOOKTITLE={Public Key Cryptography 2011 (PKC 2011)},
	PUBLISHER={Springer},
	EDITOR={R. Gennaro},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6571},
	PAGES={17-34},
	NOTE={ },
	MONTH={3},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-ALD11,
 	AUTHOR={Attrapadung, Nuttapong and Libert, Benoit and de Panafieu, Elie},
	TITLE={{Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts}},
	BOOKTITLE={Public Key Cryptography 2011 (PKC 2011)},
	PUBLISHER={Springer},
	EDITOR={R. Gennaro},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6571},
	PAGES={90-108},
	NOTE={ },
	MONTH={3},
	YEAR={2011},
}

@ARTICLE{cgUCL-RYS11,
 	AUTHOR={Regazzoni, Francesco and Yi, Wang and Standaert, François-Xavier},
	TITLE={{FPGA Implementations of the AES Masked Against Power Analysis Attacks}},
	JOURNAL={Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE)},
	MONTH={2},
	YEAR={2011},
}

@INBOOK{cgUCL-PQ11,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Cayley hash functions}},
	BOOKTITLE={Encyclopedia of cryptography and security - 2nd edition},
	PUBLISHER={Springer},
	EDITOR={Henk C. A. van Tilborg and  Sushil Jajodia},
	MONTH={1},
	YEAR={2011},
}