Accéder directement au contenu

Caroline Fontaine

45
Documents

Publications

Image document

Illuminating the Dark or how to recover what should not be seen in FE-based classifiers

Sergiu Carpov , Caroline Fontaine , Damien Ligier , Renaud Sirdey
Proceedings on Privacy Enhancing Technologies, 2020, 2020 (2), pp.5-23. ⟨10.2478/popets-2020-0015⟩
Article dans une revue hal-02413588v1
Image document

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression

Anne Canteaut , Sergiu Carpov , Caroline Fontaine , Tancrède Lepoint , María Naya-Plasencia
Journal of Cryptology, 2018, 31 (3), pp.885-916. ⟨10.1007/s00145-017-9273-9⟩
Article dans une revue hal-01650012v1

Hardware/Software co-Design of an Accelerator for FV Homomorphic Encryption Scheme using Karatsuba Algorithm

Vincent Migliore , Maria Mendez Real , Vianney Lapotre , Arnaud Tisserand , Caroline Fontaine
IEEE Transactions on Computers, 2018, 67 (3), pp.335-347. ⟨10.1109/TC.2016.2645204⟩
Article dans une revue hal-01427639v1

Design and implementation of low-depth pairing-based homomorphic encryption scheme

Vincent Herbert , Bhaskar Biswas , Caroline Fontaine
Journal of Cryptographic Engineering, 2018, ⟨10.1007/s13389-018-0192-y⟩
Article dans une revue hal-01836393v1

Practical Parameters for Somewhat Homomorphic Encryption Schemes on Binary Circuits

Vincent Migliore , Guillaume Bonnoron , Caroline Fontaine
IEEE Transactions on Computers, 2018, ⟨10.1109/TC.2018.2808962⟩
Article dans une revue hal-02128623v1
Image document

A High-Speed Accelerator for Homomorphic Encryption using the Karatsuba Algorithm

Vincent Migliore , Cédric Seguin , Maria Méndez Real , Vianney Lapotre , Arnaud Tisserand
ACM Transactions on Embedded Computing Systems (TECS), 2017, 16 (5s), ⟨10.1145/3126558⟩
Article dans une revue hal-01630065v1

Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain

Carlos Aguilar Melchor , Simon Fau , Caroline Fontaine , Guy Gogniat , Renaud Sirdey
IEEE Signal Processing Magazine, 2013, pp.108-107
Article dans une revue hal-00765638v1

Décodage EM du code de Tardos pour le fingerprinting

Ana Charpentier , Caroline Fontaine , Teddy Furon
Traitement du Signal, 2010, 27 (2), pp.127 - 147. ⟨10.3166/ts.27.127-146⟩
Article dans une revue hal-00704157v1

An end-to-end security architecture for multimedia content distribution on mobile phones

Caroline Fontaine , Claude Delpha , Pierre Duhamel , Abdellatif Benjelloun Touimi , Michel Milhau
ISAST Transactions on Communications and Networking, 2008, 2 (1), pp.81-91
Article dans une revue hal-00871169v1

How can Reed-Solomon codes improve steganographic schemes

Caroline Fontaine , Fabien Galand
EURASIP Journal on Information Security, 2008
Article dans une revue inria-00504247v1

A survey of homomorphic encryption for non-specialists

Caroline Fontaine , Fabien Galand
EURASIP Journal on Information Security, 2007, pp.Article ID 13801
Article dans une revue inria-00504233v1
Image document

Watermarking security: theory and practice

Teddy Furon , François Cayre , Caroline Fontaine
IEEE Transactions on Signal Processing, 2005, Supplement on secure media III, 53 (10), pp.3976-3987
Article dans une revue inria-00088006v1
Image document

Secure Delivery of Images over Open Networks

Daniel Augot , Jean-Marc Boucqueau , Jean-François Delaigle , Caroline Fontaine , Eddy Goray
Proceedings of the IEEE, 1999, 87 (7), pp.1251 - 1266. ⟨10.1109/5.771076⟩
Article dans une revue hal-00723737v1

A Note on Ring-LWE Security in the Case of Fully Homomorphic Encryption

Guillaume Bonnoron , Caroline Fontaine
Progress in Cryptology – INDOCRYPT 2017, Dec 2017, Chennai, India. pp.27 - 43, ⟨10.1007/978-3-319-71667-1_2⟩
Communication dans un congrès hal-01759091v1

Information leakage analysis of inner-product functional encryption based data classification

Damien Ligier , Sergiu Carpov , Caroline Fontaine , Renaud Sirdey
PST'17 : 15th International Conference on Privacy, Security and Trust, Aug 2017, Calgary, Canada. ⟨10.1109/PST.2017.00043⟩
Communication dans un congrès hal-01802702v1

Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges

Guillaume Bonnoron , Caroline Fontaine , Guy Gogniat , Vincent Herbert , Vianney Lapotre
C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security, Apr 2017, Rabat, Morocco. pp.68 - 82, ⟨10.1007/978-3-319-55589-8_5⟩
Communication dans un congrès hal-01596540v1

A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System

Bastien Sultan , Fabien Dagnat , Caroline Fontaine
CyberICPS'2017 : International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, Sep 2017, Oslo, Norway. pp.63 - 76, ⟨10.1007/978-3-319-72817-9_5⟩
Communication dans un congrès hal-01836378v1
Image document

Fast polynomial arithmetic for Somewhat Homomorphic Encryption operations in hardware with Karatsuba algorithm

Vincent Migliore , Maria Mendez Real , Vianney Lapotre , Arnaud Tisserand , Caroline Fontaine
International Conference on Field-Programmable Technology (FPT), Dec 2016, Xi’an, China. ⟨10.1109/FPT.2016.7929535⟩
Communication dans un congrès hal-01427642v1
Image document

Maîtrise des Correctifs de Sécurité pour les Systèmes Navals

Bastien Sultan , Fabien Dagnat , Caroline Fontaine
CIEL 2016 : 5ème Conférence en Ingénierie du Logiciel, Jun 2016, Besançon, France. pp.1 - 6
Communication dans un congrès hal-01431543v1

New results about Tu-Deng's conjecture

Soukayna Qarboua , Julien Schrek , Caroline Fontaine
ISIT 2016 : IEEE International Symposium on Information Theory, Jul 2016, Barcelona, Spain. pp.485 - 489, ⟨10.1109/ISIT.2016.7541346⟩
Communication dans un congrès hal-01635350v1
Image document

Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression

Anne Canteaut , Sergiu Carpov , Caroline Fontaine , Tancrède Lepoint , María Naya-Plasencia
FSE 2016 : 23rd International Conference on Fast Software Encryption, Mar 2016, Bochum, Germany. pp.313-333, ⟨10.1007/978-3-662-52993-5_16⟩
Communication dans un congrès hal-01280479v1
Image document

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression

Anne Canteaut , Sergiu Carpov , Caroline Fontaine , Tancrède Lepoint , María Naya-Plasencia
CryptoAction Symposium 2016, Apr 2016, Budapest, Hungary
Communication dans un congrès hal-01401328v1
Image document

Exploration of Polynomial Multiplication Algorithms for Homomorphic Encryption Schemes

Vincent Migliore , Maria Méndez Real , Vianney Lapotre , Arnaud Tisserand , Caroline Fontaine
International Conference on Reconfigurable Computing and FPGAs (ReConFig), Dec 2015, Cancun, Mexico. ⟨10.1109/ReConFig.2015.7393307⟩
Communication dans un congrès hal-01273192v1

Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes

Caroline Fontaine , Sébastien Gambs , Julien Lolive , Cristina Onete
Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Sep 2014, Florianopolis, Brazil
Communication dans un congrès hal-01090053v1

Towards practical program execution over fully homomorphic encryption schemes

Simon Fau , Renaud Sirdey , Caroline Fontaine , Carlos Aguilar Melchor , Guy Gogniat
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2013), Oct 2013, Compiègne, France
Communication dans un congrès hal-00917061v1
Image document

An Asymmetric Fingerprinting Scheme based on Tardos Codes

Ana Charpentier , Caroline Fontaine , Teddy Furon , Ingemar Cox
IH'11 - 13th International Conference Information Hiding, May 2011, Prague, Czech Republic. ⟨10.1007/978-3-642-24178-9_4⟩
Communication dans un congrès inria-00581156v2
Image document

Ensuring message embedding in wet paper steganography

Daniel Augot , Morgan Barbier , Caroline Fontaine
IMACC 2011, Dec 2011, Oxford, United Kingdom. pp.244-258, ⟨10.1007/978-3-642-25516-8_15⟩
Communication dans un congrès hal-00639551v1
Image document

Towards Robust and Secure Watermarking

Fuchun Xie , Teddy Furon , Caroline Fontaine
ACM Multimedia and Security, Sep 2010, Roma, Italy
Communication dans un congrès inria-00505849v1

Better security levels for "Broken Arrows"

Fuchun Xie , Teddy Furon , Caroline Fontaine
Proceedings of the SPIE : International Symposium on Electronic Imaging 2010 : Media Forensics and Security XII, Jan 2010, San Jose, United States
Communication dans un congrès hal-00472982v1
Image document

Décodage EM du code de Tardos pour le fingerprinting

Ana Charpentier , Caroline Fontaine , Teddy Furon
Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France
Communication dans un congrès inria-00504522v1
Image document

Un schéma complet de traçage de documents multimédia reposant sur des versions améliorées des codes de Tardos et de la technique de tatouage " Broken Arrows "

Fuchun Xie , Caroline Fontaine , Teddy Furon
Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France
Communication dans un congrès inria-00504591v1
Image document

Expectation Maximisation decoding of Tardos probabilistic fingerprinting code

Ana Charpentier , Fuchun Xie , Caroline Fontaine , Teddy Furon
IS\&T/SPIE International Symposium on Electronic Imaging 2009, 2009, San Jose, United States
Communication dans un congrès inria-00504523v1
Image document

On-Off Keying Modulation and Tardos Fingerprinting

Fuchun Xie , Teddy Furon , Caroline Fontaine
Proc. ACM Multimedia and Security, ACM, 2008, Oxford, United Kingdom
Communication dans un congrès inria-00504606v1

Dirty Paper Coding with Partial State Information

Cagatay Dikici , Christine Guillemot , Khalid Idrissi , Caroline Fontaine , Atilla Baskurt
ISIVC 2008, IEEE INTERNATIONAL SYMPOSIUM ON IMAGE/VIDEO COMMUNICATIONS OVER FIXED AND MOBILE NETWORKS, Jul 2008, Bilbao, Spain
Communication dans un congrès hal-01583961v1

Secured diffusion of music on mobiles: An end-to-end approach

Abdellatif Benjelloun Touimi , Michel Milhau , Alain Le Guyader , Caroline Fontaine , Claude Delpha
3rd Taiwanese-French Conference on Information Technology, Mar 2006, Nancy, France
Communication dans un congrès hal-00871157v1

A theoretical study of watermarking security

François Cayre , Caroline Fontaine , Teddy Furon
ISIT 2005, 2005, pp.1868-1872
Communication dans un congrès hal-00158005v1
Image document

Watermarking security part II: practice

François Cayre , Caroline Fontaine , Teddy Furon
Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.758--767
Communication dans un congrès inria-00083335v1
Image document

Watermarking security part I: theory

François Cayre , Caroline Fontaine , Teddy Furon
Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.746--757
Communication dans un congrès inria-00083329v1
Image document

Watermarking attack: security of WSS techniques

François Cayre , Caroline Fontaine , Teddy Furon
International Workshop on Digital Watermarking, Oct 2004, Seoul, South Corea, South Korea. pp.171--183
Communication dans un congrès inria-00083194v1
Image document

DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System

Daniel Augot , Jean-François Delaigle , Caroline Fontaine
ESORICS 98 : 5th European Symposium on Research in Computer Security, Sep 1998, Louvain-la-Neuve, Belgium. pp.241-255, ⟨10.1007/BFb0055867⟩
Communication dans un congrès hal-00723837v1

Processing Encrypted Multimedia Data Using Homomorphic Encryption

Sébastien Canard , Sergiu Carpov , Caroline Fontaine , Renaud Sirdey
Multimedia Security 2: Biometrics, Video Surveillance and Multimedia Encryption, 2, Wiley, pp.173-213, 2022, ⟨10.1002/9781119987390.ch6⟩
Chapitre d'ouvrage hal-03837044v1

Traiter des données multimédia chiffrées grâce au chiffrement homomorphe

Sebastien Canard , Sergiu Carpov , Caroline Fontaine , Renaud Sirdey
William Puech. Sécurité multimédia 2 : biométrie, protection et chiffrement multimédia, 2, ISTE, pp.191-232, 2021, 9781789480276
Chapitre d'ouvrage hal-03070676v1

Watermarking Security

Teddy Furon , François Cayre , Caroline Fontaine
Nedeljko Cvejic and Tapio Seppanen. Digital Audio Watermarking Techniques and Technologies, Information Science Reference, 2008, 978-1-59904-513-9
Chapitre d'ouvrage inria-00580838v1

How to Compress Homomorphic Ciphertexts

Anne Canteaut , Sergiu Carpov , Caroline Fontaine , Tancrède Lepoint , Maria Naya-Plasencia
[Research Report] 2015/113, IACR Cryptology ePrint Archive. 2015, pp.21
Rapport hal-01237297v1