| 2008 |
| 26 | EE | Fuchun Xie,
Teddy Furon,
Caroline Fontaine:
On-off keying modulation and tardos fingerprinting.
MM&Sec 2008: 101-106 |
| 2007 |
| 25 | EE | Caroline Fontaine,
Fabien Galand:
How Can Reed-Solomon Codes Improve Steganographic Schemes?
Information Hiding 2007: 130-144 |
| 2006 |
| 24 | EE | Abdellatif Benjelloun Touimi,
Jean-Bernard Fischer,
Caroline Fontaine,
Christophe Giraud,
Michel Milhau:
Enhanced Security Architecture for Music Distribution on Mobile.
ESORICS 2006: 97-109 |
| 2005 |
| 23 | | François Cayre,
Caroline Fontaine,
Teddy Furon:
Watermarking security part one: Theory.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 746-757 |
| 22 | | François Cayre,
Caroline Fontaine,
Teddy Furon:
Watermarking security part two: Practice.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 758-768 |
| 21 | EE | Caroline Fontaine:
Clock-Controlled Generator.
Encyclopedia of Cryptography and Security 2005 |
| 20 | EE | Caroline Fontaine:
E0 (Bluetooth).
Encyclopedia of Cryptography and Security 2005 |
| 19 | EE | Caroline Fontaine:
Linear Congruential Generator.
Encyclopedia of Cryptography and Security 2005 |
| 18 | EE | Caroline Fontaine:
Nonlinear Feedback Shift Register.
Encyclopedia of Cryptography and Security 2005 |
| 17 | EE | Caroline Fontaine:
RC4.
Encyclopedia of Cryptography and Security 2005 |
| 16 | EE | Caroline Fontaine:
SEAL.
Encyclopedia of Cryptography and Security 2005 |
| 15 | EE | Caroline Fontaine:
Self-Shrinking Generator.
Encyclopedia of Cryptography and Security 2005 |
| 14 | EE | Caroline Fontaine:
Self-Synchronizing Stream Cipher.
Encyclopedia of Cryptography and Security 2005 |
| 13 | EE | Caroline Fontaine:
Shrinking Generator.
Encyclopedia of Cryptography and Security 2005 |
| 12 | EE | Caroline Fontaine:
Summation generator.
Encyclopedia of Cryptography and Security 2005 |
| 11 | EE | Caroline Fontaine:
Synchronous Stream Cipher.
Encyclopedia of Cryptography and Security 2005 |
| 2004 |
| 10 | EE | François Cayre,
Caroline Fontaine,
Teddy Furon:
Watermarking Attack: Security of WSS Techniques.
IWDW 2004: 171-183 |
| 9 | EE | Vincent Bénony,
François Recher,
Eric Wegrzynowski,
Caroline Fontaine:
Cryptanalysis of a Particular Case of Klimov-Shamir Pseudo-Random Generator.
SETA 2004: 313-322 |
| 2001 |
| 8 | EE | Eric Filiol,
Caroline Fontaine:
A New Ultrafast Stream Cipher Design: COS Ciphers.
IMA Int. Conf. 2001: 85-98 |
| 7 | EE | Martin Steinebach,
Jana Dittmann,
Christian Seibel,
Lucilla Croce Ferri,
Fabien A. P. Petitcolas,
Nazim Fatès,
Caroline Fontaine,
Frédéric Raynal:
StirMark Benchmark: Audio Watermarking Attacks.
ITCC 2001: 49-54 |
| 6 | | Anne Canteaut,
Claude Carlet,
Pascale Charpin,
Caroline Fontaine:
On cryptographic properties of the cosets of R(1, m).
IEEE Transactions on Information Theory 47(4): 1494-1513 (2001) |
| 2000 |
| 5 | EE | Anne Canteaut,
Claude Carlet,
Pascale Charpin,
Caroline Fontaine:
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
EUROCRYPT 2000: 507-522 |
| 1999 |
| 4 | | Caroline Fontaine:
On Some Cosets of the First-Order Reed-Muller Code with High Minimum Weight.
IEEE Transactions on Information Theory 45(4): 1237-1243 (1999) |
| 1998 |
| 3 | EE | Daniel Augot,
Jean-François Delaigle,
Caroline Fontaine:
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System.
ESORICS 1998: 241-255 |
| 2 | EE | Eric Filiol,
Caroline Fontaine:
Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity.
EUROCRYPT 1998: 475-488 |
| 1 | | Daniel Augot,
Caroline Fontaine:
Key issues for watermarking digital images.
Electronic Imaging 1998: 176-185 |