Nombre de documents

31

Caroline Fontaine


Article dans une revue8 documents

  • Vincent Migliore, Maria Mendez Real, Vianney Lapotre, Arnaud Tisserand, Caroline Fontaine, et al.. Hardware/Software co-Design of an Accelerator for FV Homomorphic Encryption Scheme using Karatsuba Algorithm. IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2016. <hal-01427639>
  • Carlos Aguilar Melchor, Simon Fau, Caroline Fontaine, Guy Gogniat, Renaud Sirdey. Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. Special Issue: Signal Processing in the Encrypted Domain, IEEE Signal Processing Magazine, 2013, pp.108-107. <hal-00765638>
  • Ana Charpentier, Caroline Fontaine, Teddy Furon. Décodage EM du code de Tardos pour le fingerprinting. Traitement du Signal, Lavoisier, 2010, 27 (2), pp.127 - 147. <10.3166/ts.27.127-146 >. <hal-00704157>
  • Caroline Fontaine, Fabien Galand. How can Reed-Solomon codes improve steganographic schemes. EURASIP Journal on Information Security, Hindawi, 2008. <inria-00504247>
  • Caroline Fontaine, Claude Delpha, Pierre Duhamel, Abdellatif Benjelloun Touimi, Michel Milhau, et al.. An end-to-end security architecture for multimedia content distribution on mobile phones. ISAST Transactions on Communication and Networking, 2008, 2 (1), pp.81-91. <hal-00871169>
  • Caroline Fontaine, Fabien Galand. A survey of homomorphic encryption for non-specialists. EURASIP Journal on Information Security, Hindawi, 2007, pp.Article ID 13801. <inria-00504233>
  • Teddy Furon, François Cayre, Caroline Fontaine. Watermarking security: theory and practice. IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers, 2005, Supplement on secure media III, 53 (10), pp.3976-3987. <inria-00088006>
  • Daniel Augot, Jean-Marc Boucqueau, Jean-François Delaigle, Caroline Fontaine, Eddy Goray. Secure Delivery of Images over Open Networks. Proceedings of the IEEE, Institute of Electrical and Electronics Engineers, 1999, 87 (7), pp.1251 - 1266. <10.1109/5.771076>. <hal-00723737>

Communication dans un congrès20 documents

  • Vincent Migliore, Maria Mendez Real, Vianney Lapotre, Arnaud Tisserand, Caroline Fontaine, et al.. Fast polynomial arithmetic for Somewhat Homomorphic Encryption operations in hardware with Karatsuba algorithm. The 2016 International Conference on Field-Programmable Technology (FPT '16), Dec 2016, Jianguo Hotel, Xi’an, China. <hal-01427642>
  • Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, et al.. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. CryptoAction Symposium 2016, Apr 2016, Budapest, Hungary. 2016, <https://cryptoactionsymposium.wordpress.com/>. <hal-01401328>
  • Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, et al.. Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. FSE 2016 : 23rd International Conference on Fast Software Encryption, Mar 2016, Bochum, Germany. Springer, 9783 - LNCS (Lecture Notes in Computer Science), pp.313-333, Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, <http://fse.rub.de/>. <10.1007/978-3-662-52993-5_16>. <hal-01280479>
  • Vincent Migliore, Maria Méndez Real, Vianney Lapotre, Arnaud Tisserand, Caroline Fontaine, et al.. Exploration of Polynomial Multiplication Algorithms for Homomorphic Encryption Schemes. 2015 International Conference on Reconfigurable Computing and FPGAs (ReConFig 2015), Dec 2015, Cancun, Mexico. <hal-01273192>
  • Caroline Fontaine, Sébastien Gambs, Julien Lolive, Cristina Onete. Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes. Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Sep 2014, Florianopolis, Brazil. 8895 - LNCS (Lecture Notes in Computer Science). <hal-01090053>
  • Simon Fau, Renaud Sirdey, Caroline Fontaine, Carlos Aguilar Melchor, Guy Gogniat. Towards practical program execution over fully homomorphic encryption schemes. 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2013), Oct 2013, Compiègne, France. 2013. <hal-00917061>
  • Daniel Augot, Morgan Barbier, Caroline Fontaine. Ensuring message embedding in wet paper steganography. Liqun Chen. IMACC 2011, Dec 2011, Oxford, United Kingdom. Springer, 7089, pp.244-258, 2011, Lecture Notes in Computer Science. <10.1007/978-3-642-25516-8_15>. <hal-00639551>
  • Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar Cox. An Asymmetric Fingerprinting Scheme based on Tardos Codes. Pevny, Tomas and Filler, Tomas. Information Hiding, May 2011, Prague, Czech Republic. Springer-Verlag, 2011. <inria-00581156v1>
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. Better security levels for "Broken Arrows". Proceedings of the SPIE : International Symposium on Electronic Imaging 2010 : Media Forensics and Security XII, Jan 2010, San Jose, United States. SPIE, 7541, 2010. <hal-00472982>
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. Towards Robust and Secure Watermarking. ACM Multimedia and Security, Sep 2010, Roma, Italy. 2010. <inria-00505849>
  • Fuchun Xie, Caroline Fontaine, Teddy Furon. Un schéma complet de traçage de documents multimédia reposant sur des versions améliorées des codes de Tardos et de la technique de tatouage " Broken Arrows ". Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France. 2009. <inria-00504591>
  • Ana Charpentier, Caroline Fontaine, Teddy Furon. Décodage EM du code de Tardos pour le fingerprinting. Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France. 2009. <inria-00504522>
  • Ana Charpentier, Fuchun Xie, Caroline Fontaine, Teddy Furon. Expectation Maximisation decoding of Tardos probabilistic fingerprinting code. IS\&T/SPIE International Symposium on Electronic Imaging 2009, 2009, San Jose, United States. SPIE, 7254, 2009, Proceedings of the SPIE. <inria-00504523>
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. On-Off Keying Modulation and Tardos Fingerprinting. Proc. ACM Multimedia and Security, 2008, Oxford, United Kingdom. 2008. <inria-00504606>
  • Abdellatif Benjelloun Touimi, Michel Milhau, Alain Le Guyader, Caroline Fontaine, Claude Delpha, et al.. Secured diffusion of music on mobiles: An end-to-end approach. 3rd Taiwanese-French Conference on Information Technology, Mar 2006, Nancy, France. 2006. <hal-00871157>
  • François Cayre, Caroline Fontaine, Teddy Furon. A theoretical study of watermarking security. ISIT 2005, 2005, IEEE, pp.1868-1872, 2005. <hal-00158005>
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part II: practice. E. Delp and P. W. Wong. Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. SPIE, 5681, pp.758--767, 2005, Proc. SPIE-IS\&T Electronic Imaging. <inria-00083335>
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part I: theory. E. Delp and P. W. Wong. Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. SPIE, 5681, pp.746--757, 2005, Proc. SPIE-IS\&T Electronic Imaging. <inria-00083329>
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking attack: security of WSS techniques. Ingemar Cox, Ton Kalker, and Heung-Kyu Lee. International Workshop on Digital Watermarking, Oct 2004, Seoul, South Corea, South Korea. Springer-Verlag, 3304, pp.171--183, 2004, Lecture Notes in Computer Science. <inria-00083194>
  • Daniel Augot, Jean-François Delaigle, Caroline Fontaine. DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System. Jean-Jacques Quisquater and Yves Deswarte and Catherine Meadows and Dieter Gollmann. ESORICS 98 : 5th European Symposium on Research in Computer Security, Sep 1998, Louvain-la-Neuve, Belgium. Springer, 1485, pp.241-255, 1998, Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security; lecture notes in computer science. <10.1007/BFb0055867>. <hal-00723837>

Chapitre d'ouvrage1 document

  • Teddy Furon, François Cayre, Caroline Fontaine. Watermarking Security. Nedeljko Cvejic and Tapio Seppanen. Digital Audio Watermarking Techniques and Technologies, Information Science Reference, 2008, 978-1-59904-513-9. <inria-00580838>

Pré-publication, Document de travail1 document

  • Vincent Migliore, Guillaume Bonnoron, Caroline Fontaine. Determination and exploration of practical parameters for the latest Somewhat Homomorphic Encryption (SHE) Schemes. 2016. <hal-01394362v3>

Rapport1 document

  • Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, Maria Naya-Plasencia, et al.. How to Compress Homomorphic Ciphertexts. [Research Report] 2015/113, IACR Cryptology ePrint Archive. 2015, pp.21. <hal-01237297>