@INPROCEEDINGS{cgUCL-LPJY15,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Joye, Marc and Yung, Moti},
	TITLE={{Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications}},
	BOOKTITLE={Asiacrypt'15},
	PUBLISHER={Spinger},
	EDITOR={T. Iwata & J. H. Cheon},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9452},
	MONTH={12},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-GS15,
 	AUTHOR={Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?}},
	BOOKTITLE={Asiacrypt},
	PUBLISHER={Springer},
	EDITOR={T. Iwata & J. H. Cheon},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={9452},
	MONTH={12},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-PGS15,
 	AUTHOR={Poussier, Romain and Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations}},
	BOOKTITLE={CARDIS},
	PUBLISHER={Springer},
	EDITOR={N. Homma & M. Medwed},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={11},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-PSV15,
 	AUTHOR={Pereira, Olivier and Standaert, François-Xavier and Vivek, Srinivas},
	TITLE={{Leakage-Resilient Authentication and Encryption from Symmetric Primitives}},
	BOOKTITLE={Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
	PUBLISHER={ACM},
	PAGES={96-108},
	MONTH={10},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-MS15,
 	AUTHOR={Merino Del Pozo, Santos and Standaert, François-Xavier},
	TITLE={{Blind Source Separation from Single Measurements using Singular Spectrum Analysis}},
	BOOKTITLE={Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
	PUBLISHER={Springer},
	EDITOR={T. Güneysu, and H. Handschuh},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9293},
	PAGES={42-59},
	NOTE={http://dx.doi.org/10.1007/978-3-662-48324-4_3},
	MONTH={9},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-LPY15,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Yung, Moti},
	TITLE={{Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions}},
	BOOKTITLE={Crypto'15},
	PUBLISHER={Springer},
	EDITOR={R. Gennaro & M. Robshaw},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9216},
	PAGES={296--316},
	MONTH={8},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-BCGPW15,
 	AUTHOR={Bernhard, David and Cortier, Veronique and Galindo, David and Pereira, Olivier and Warinschi, Bogdan},
	TITLE={{SoK: A comprehensive analysis of game-based ballot privacy definitions}},
	BOOKTITLE={IEEE Symposium on Security and Privacy 2015},
	PUBLISHER={IEEE Computer Society},
	MONTH={5},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-LPBMS15,
 	AUTHOR={Lerman, Liran and Poussier, Romain and Bontempi, Gianluca and Markowitch, Olivier and Standaert, François-Xavier},
	TITLE={{Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)}},
	BOOKTITLE={Constructive Side-Channel Analysis and Secure Design},
	PUBLISHER={Springer},
	EDITOR={Stefan Mangard and Axel Y. Poschmann},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	PAGES={20-33},
	MONTH={4},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-LJYP15,
 	AUTHOR={Libert, Benoit and Joye, Marc and Yung, Moti and Peters, Thomas},
	TITLE={{Secure Efficient History-Hiding Append-Only Signatures in the Standard Model}},
	BOOKTITLE={Public-Key Cryptography - PKC'15},
	PUBLISHER={Springer},
	EDITOR={Jonathan Katz},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9020},
	PAGES={450--473},
	MONTH={3},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-MSHM15,
 	AUTHOR={Merino Del Pozo, Santos and Standaert, François-Xavier and Heidar Kamel, Dina and Moradi, Amir},
	TITLE={{Si­de-Chan­nel At­tacks from Sta­tic Power: When Should we Care?}},
	BOOKTITLE={Proceedings of the 2015 De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2015, Gre­no­ble, Fran­ce, March 9 - 13, 2015},
	EDITOR={W. Nebel, and D. Atienza},
	PAGES={145-150},
	NOTE={http://dl.acm.org/citation.cfm?id=2755785},
	MONTH={3},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-GGPSS15,
 	AUTHOR={Glowacz, Cezary and Grosso, Vincent and Poussier, Romain and Schüth, Joachim and Standaert, François-Xavier},
	TITLE={{Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment}},
	BOOKTITLE={FSE 2015},
	PUBLISHER={Springer},
	EDITOR={Gregor Leander},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={3},
	YEAR={2015},
}

@ARTICLE{cgUCL-BGS15,
 	AUTHOR={Belaid, Sonia and Grosso, Vincent and Standaert, François-Xavier},
	TITLE={{Masking and leakage-resilient primitives: One, the other(s) or both?}},
	PUBLISHER={Spinger},
	EDITOR={Claude Carlet and Pierre{-}Alain Fouque},
	JOURNAL={Cryptography and Communications},
	VOLUME={7},
	PAGES={163-184},
	MONTH={1},
	YEAR={2015},
}