Search the dblp DataBase
Caroline Fontaine :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Daniel Augot , Caroline Fontaine Key issues for watermarking digital images. [Citation Graph (0, 0)][DBLP ] Electronic Imaging, 1998, pp:176-185 [Conf ] Daniel Augot , Jean-François Delaigle , Caroline Fontaine DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:241-255 [Conf ] Abdellatif Benjelloun Touimi , Jean-Bernard Fischer , Caroline Fontaine , Christophe Giraud , Michel Milhau Enhanced Security Architecture for Music Distribution on Mobile. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:97-109 [Conf ] Anne Canteaut , Claude Carlet , Pascale Charpin , Caroline Fontaine Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:507-522 [Conf ] Eric Filiol , Caroline Fontaine Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:475-488 [Conf ] Eric Filiol , Caroline Fontaine A New Ultrafast Stream Cipher Design: COS Ciphers. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:85-98 [Conf ] Martin Steinebach , Jana Dittmann , Christian Seibel , Lucilla Croce Ferri , Fabien A. P. Petitcolas , Nazim Fatès , Caroline Fontaine , Frédéric Raynal StirMark Benchmark: Audio Watermarking Attacks. [Citation Graph (0, 0)][DBLP ] ITCC, 2001, pp:49-54 [Conf ] François Cayre , Caroline Fontaine , Teddy Furon Watermarking Attack: Security of WSS Techniques. [Citation Graph (0, 0)][DBLP ] IWDW, 2004, pp:171-183 [Conf ] Vincent Bénony , François Recher , Eric Wegrzynowski , Caroline Fontaine Cryptanalysis of a Particular Case of Klimov-Shamir Pseudo-Random Generator. [Citation Graph (0, 0)][DBLP ] SETA, 2004, pp:313-322 [Conf ] François Cayre , Caroline Fontaine , Teddy Furon Watermarking security part one: Theory. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:746-757 [Conf ] François Cayre , Caroline Fontaine , Teddy Furon Watermarking security part two: Practice. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:758-768 [Conf ] Anne Canteaut , Claude Carlet , Pascale Charpin , Caroline Fontaine On cryptographic properties of the cosets of R(1, m). [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2001, v:47, n:4, pp:1494-1513 [Journal ] Caroline Fontaine On Some Cosets of the First-Order Reed-Muller Code with High Minimum Weight. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1237-1243 [Journal ] How Can Reed-Solomon Codes Improve Steganographic Schemes? [Citation Graph (, )][DBLP ] On-off keying modulation and tardos fingerprinting. [Citation Graph (, )][DBLP ] Better security levels for broken arrows. [Citation Graph (, )][DBLP ] Expectation maximization decoding of Tardos probabilistic fingerprinting code. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs