2008 |
26 | EE | Fuchun Xie,
Teddy Furon,
Caroline Fontaine:
On-off keying modulation and tardos fingerprinting.
MM&Sec 2008: 101-106 |
2007 |
25 | EE | Caroline Fontaine,
Fabien Galand:
How Can Reed-Solomon Codes Improve Steganographic Schemes?
Information Hiding 2007: 130-144 |
2006 |
24 | EE | Abdellatif Benjelloun Touimi,
Jean-Bernard Fischer,
Caroline Fontaine,
Christophe Giraud,
Michel Milhau:
Enhanced Security Architecture for Music Distribution on Mobile.
ESORICS 2006: 97-109 |
2005 |
23 | | François Cayre,
Caroline Fontaine,
Teddy Furon:
Watermarking security part one: Theory.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 746-757 |
22 | | François Cayre,
Caroline Fontaine,
Teddy Furon:
Watermarking security part two: Practice.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 758-768 |
21 | EE | Caroline Fontaine:
Clock-Controlled Generator.
Encyclopedia of Cryptography and Security 2005 |
20 | EE | Caroline Fontaine:
E0 (Bluetooth).
Encyclopedia of Cryptography and Security 2005 |
19 | EE | Caroline Fontaine:
Linear Congruential Generator.
Encyclopedia of Cryptography and Security 2005 |
18 | EE | Caroline Fontaine:
Nonlinear Feedback Shift Register.
Encyclopedia of Cryptography and Security 2005 |
17 | EE | Caroline Fontaine:
RC4.
Encyclopedia of Cryptography and Security 2005 |
16 | EE | Caroline Fontaine:
SEAL.
Encyclopedia of Cryptography and Security 2005 |
15 | EE | Caroline Fontaine:
Self-Shrinking Generator.
Encyclopedia of Cryptography and Security 2005 |
14 | EE | Caroline Fontaine:
Self-Synchronizing Stream Cipher.
Encyclopedia of Cryptography and Security 2005 |
13 | EE | Caroline Fontaine:
Shrinking Generator.
Encyclopedia of Cryptography and Security 2005 |
12 | EE | Caroline Fontaine:
Summation generator.
Encyclopedia of Cryptography and Security 2005 |
11 | EE | Caroline Fontaine:
Synchronous Stream Cipher.
Encyclopedia of Cryptography and Security 2005 |
2004 |
10 | EE | François Cayre,
Caroline Fontaine,
Teddy Furon:
Watermarking Attack: Security of WSS Techniques.
IWDW 2004: 171-183 |
9 | EE | Vincent Bénony,
François Recher,
Eric Wegrzynowski,
Caroline Fontaine:
Cryptanalysis of a Particular Case of Klimov-Shamir Pseudo-Random Generator.
SETA 2004: 313-322 |
2001 |
8 | EE | Eric Filiol,
Caroline Fontaine:
A New Ultrafast Stream Cipher Design: COS Ciphers.
IMA Int. Conf. 2001: 85-98 |
7 | EE | Martin Steinebach,
Jana Dittmann,
Christian Seibel,
Lucilla Croce Ferri,
Fabien A. P. Petitcolas,
Nazim Fatès,
Caroline Fontaine,
Frédéric Raynal:
StirMark Benchmark: Audio Watermarking Attacks.
ITCC 2001: 49-54 |
6 | | Anne Canteaut,
Claude Carlet,
Pascale Charpin,
Caroline Fontaine:
On cryptographic properties of the cosets of R(1, m).
IEEE Transactions on Information Theory 47(4): 1494-1513 (2001) |
2000 |
5 | EE | Anne Canteaut,
Claude Carlet,
Pascale Charpin,
Caroline Fontaine:
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
EUROCRYPT 2000: 507-522 |
1999 |
4 | | Caroline Fontaine:
On Some Cosets of the First-Order Reed-Muller Code with High Minimum Weight.
IEEE Transactions on Information Theory 45(4): 1237-1243 (1999) |
1998 |
3 | EE | Daniel Augot,
Jean-François Delaigle,
Caroline Fontaine:
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System.
ESORICS 1998: 241-255 |
2 | EE | Eric Filiol,
Caroline Fontaine:
Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity.
EUROCRYPT 1998: 475-488 |
1 | | Daniel Augot,
Caroline Fontaine:
Key issues for watermarking digital images.
Electronic Imaging 1998: 176-185 |