@INPROCEEDINGS{cgUCL-GS13,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Low Entropy Masking Schemes, Revisited}},
	BOOKTITLE={CARDIS 2013},
	PUBLISHER={Springer},
	EDITOR={Aurélien Francillon and Pankaj Rohatgi},
	SERIES={Lecture Notes in Computer Science},
	MONTH={11},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-CCDGPS13,
 	AUTHOR={Canard, Sébastien and Coisel, Iwen and Devigne, Julien and Gallais, Cécilia and Peters, Thomas and Sanders, Olivier},
	TITLE={{Toward Generic Method for Server-Aided Cryptography}},
	BOOKTITLE={International Conference on Information and Communications Security - ICICS 2013},
	PUBLISHER={Springer},
	EDITOR={S. Qing & J. Zhou},
	SERIES={Lecture Notes in Computer Science},
	MONTH={11},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-YSPT13,
 	AUTHOR={Yun-Ju, Huang and Shinohara, Naoyuki and Petit, Christophe and Takagi, Tsuyoshi},
	TITLE={{Improvement of Faugère et al.'s method to solve ECDLP}},
	BOOKTITLE={IWSEC 2013},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={8231},
	PAGES={115-132},
	MONTH={11},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-PP13,
 	AUTHOR={Palmieri, Paolo and Pereira, Olivier},
	TITLE={{Unconditionally Secure Oblivious Transfer from Real Network Behavior}},
	BOOKTITLE={8th International Workshop on Security, IWSEC2013},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={8231},
	PAGES={168--182},
	MONTH={11},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-CPP13,
 	AUTHOR={Cuvelier, Édouard and Pereira, Olivier and Peters, Thomas},
	TITLE={{Election Verifiability or Ballot Privacy : Do We Need to Choose?}},
	BOOKTITLE={Computer Security – ESORICS 2013},
	PUBLISHER={Springer Berlin Heidelberg},
	EDITOR={Crampton, Jason and Jajodia, Sushil and Mayes, Keith},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={8134},
	PAGES={481-498},
	MONTH={9},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-GSF13,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier and Faust, Sebastian},
	TITLE={{Masking vs. Multiparty Computation: How Large Is the Gap for AES?}},
	BOOKTITLE={CHES},
	PUBLISHER={Spinger},
	EDITOR={Guido Bertoni and Jean-Sébastien Coron},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={8086},
	PAGES={400-416},
	MONTH={8},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-GGNS13,
 	AUTHOR={Gérard, Benoit and Grosso, Vincent and Naya-Plasencia, Maria and Standaert, François-Xavier},
	TITLE={{Block Ciphers That Are Easier to Mask: How Far Can We Go?}},
	BOOKTITLE={CHES},
	PUBLISHER={Spinger},
	EDITOR={Guido Bertoni and Jean-Sébastien Coron},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={8086},
	PAGES={383-399},
	MONTH={8},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-SPY13,
 	AUTHOR={Standaert, François-Xavier and Pereira, Olivier and Yu, Yu},
	TITLE={{Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions}},
	BOOKTITLE={Advances in Cryptology – CRYPTO 2013 },
	SERIES={Lecture Notes in Computer Science},
	PAGES={335--352},
	NOTE={Full version from http://eprint.iacr.org/2013/370},
	MONTH={8},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-LPJY13,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Joye, Marc and Yung, Moti},
	TITLE={{Linearly Homomorphic Structure-Preserving Signatures and Their Applications}},
	BOOKTITLE={Crypto 2013},
	PUBLISHER={Springer},
	EDITOR={H. Handschuh & R. Canetti & J. Garay},
	SERIES={Lecture Notes in Computer Science},
	MONTH={8},
	YEAR={2013},
}

@ARTICLE{cgUCL-BBBDEFKMMPPSWW13,
 	AUTHOR={Bell, Susan and Benaloh, Josh and Byrne, Mike and DeBeauvoir, Dana and Eakin, Bryce and Fischer, Gail and Kortum, Philip and McBurnett, Neal and Montoya, Julian and Parker, Michelle and Pereira, Olivier and Stark, Philip and Wallach, Dan and Winn, Michael},
	TITLE={{STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System}},
	PUBLISHER={Usenix},
	JOURNAL={USENIX Journal of Election Technology and Systems (JETS)},
	VOLUME={1},
	PAGES={18--37},
	MONTH={8},
	YEAR={2013},
}

@ARTICLE{cgUCL-PQ13,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Rubik's for cryptographers}},
	JOURNAL={Notices of the American Mathematical Society},
	VOLUME={60},
	PAGES={733-739},
	MONTH={6},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-ACMPV13,
 	AUTHOR={Aly, Abdelrahaman and Cuvelier, Édouard and Mawet, Sophie and Pereira, Olivier and Vanvyve, Mathieu},
	TITLE={{Securly Solving Simple Combinatorial Graph Problems}},
	BOOKTITLE={Financial Cryptography and Data Security 2013},
	PUBLISHER={Springer Berlin Heidelberg},
	EDITOR={Sadeghi, Ahmad-Reza},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={7859},
	PAGES={239-257},
	MONTH={4},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-ALP13,
 	AUTHOR={Attrapadung, Nuttapong and Libert, Benoit and Peters, Thomas},
	TITLE={{Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures}},
	BOOKTITLE={Public-Key Cryptography – PKC 2013},
	PUBLISHER={Springer},
	EDITOR={K. Kurosawa & G. Hanaoka},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={7778},
	MONTH={2},
	YEAR={2013},
}