Skip to Main content
Number of documents

44

Caroline Fontaine


Journal articles13 documents

  • Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey. Illuminating the Dark or how to recover what should not be seen in FE-based classifiers. Proceedings of Privacy Enhancing Technologies, 2020, 2020 (2), pp.5-23. ⟨10.2478/popets-2020-0015⟩. ⟨hal-02413588⟩
  • Vincent Migliore, Maria Mendez Real, Vianney Lapotre, Arnaud Tisserand, Caroline Fontaine, et al.. Hardware/Software co-Design of an Accelerator for FV Homomorphic Encryption Scheme using Karatsuba Algorithm. IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2018, 67 (3), pp.335-347. ⟨10.1109/TC.2016.2645204⟩. ⟨hal-01427639⟩
  • Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, et al.. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. Journal of Cryptology, Springer Verlag, 2018, 31 (3), pp.885-916. ⟨10.1007/s00145-017-9273-9⟩. ⟨hal-01650012⟩
  • Vincent Herbert, Bhaskar Biswas, Caroline Fontaine. Design and implementation of low-depth pairing-based homomorphic encryption scheme. Journal of Cryptographic Engineering, 2018, ⟨10.1007/s13389-018-0192-y⟩. ⟨hal-01836393⟩
  • Vincent Migliore, Guillaume Bonnoron, Caroline Fontaine. Practical Parameters for Somewhat Homomorphic Encryption Schemes on Binary Circuits. IEEE Transactions on Computers, 2018, ⟨10.1109/TC.2018.2808962⟩. ⟨hal-02128623⟩
  • Vincent Migliore, Cédric Seguin, Maria Méndez Real, Vianney Lapotre, Arnaud Tisserand, et al.. A High-Speed Accelerator for Homomorphic Encryption using the Karatsuba Algorithm. ACM Transactions on Embedded Computing Systems (TECS), ACM, 2017, 16 (5s), ⟨10.1145/3126558⟩. ⟨hal-01630065⟩
  • Carlos Aguilar Melchor, Simon Fau, Caroline Fontaine, Guy Gogniat, Renaud Sirdey. Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. Special Issue: Signal Processing in the Encrypted Domain, IEEE Signal Processing Magazine, 2013, pp.108-107. ⟨hal-00765638⟩
  • Ana Charpentier, Caroline Fontaine, Teddy Furon. Décodage EM du code de Tardos pour le fingerprinting. Traitement du Signal, Lavoisier, 2010, 27 (2), pp.127 - 147. ⟨10.3166/ts.27.127-146⟩. ⟨hal-00704157⟩
  • Caroline Fontaine, Claude Delpha, Pierre Duhamel, Abdellatif Benjelloun Touimi, Michel Milhau, et al.. An end-to-end security architecture for multimedia content distribution on mobile phones. ISAST Transactions on Communication and Networking, International Society for Advanced Science and Technology, 2008, 2 (1), pp.81-91. ⟨hal-00871169⟩
  • Caroline Fontaine, Fabien Galand. How can Reed-Solomon codes improve steganographic schemes. EURASIP Journal on Information Security, Hindawi/SpringerOpen, 2008. ⟨inria-00504247⟩
  • Caroline Fontaine, Fabien Galand. A survey of homomorphic encryption for non-specialists. EURASIP Journal on Information Security, Hindawi/SpringerOpen, 2007, pp.Article ID 13801. ⟨inria-00504233⟩
  • Teddy Furon, François Cayre, Caroline Fontaine. Watermarking security: theory and practice. IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers, 2005, Supplement on secure media III, 53 (10), pp.3976-3987. ⟨inria-00088006⟩
  • Daniel Augot, Jean-Marc Boucqueau, Jean-François Delaigle, Caroline Fontaine, Eddy Goray. Secure Delivery of Images over Open Networks. Proceedings of the IEEE, Institute of Electrical and Electronics Engineers, 1999, 87 (7), pp.1251 - 1266. ⟨10.1109/5.771076⟩. ⟨hal-00723737⟩

Conference papers27 documents

  • Guillaume Bonnoron, Caroline Fontaine. A Note on Ring-LWE Security in the Case of Fully Homomorphic Encryption. Progress in Cryptology – INDOCRYPT 2017, Dec 2017, Chennai, India. pp.27 - 43, ⟨10.1007/978-3-319-71667-1_2⟩. ⟨hal-01759091⟩
  • Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey. Information leakage analysis of inner-product functional encryption based data classification. PST'17 : 15th International Conference on Privacy, Security and Trust, Aug 2017, Calgary, Canada. ⟨10.1109/PST.2017.00043⟩. ⟨hal-01802702⟩
  • Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney Lapotre, et al.. Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges. C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security, Apr 2017, Rabat, Morocco. pp.68 - 82, ⟨10.1007/978-3-319-55589-8_5⟩. ⟨hal-01596540⟩
  • Bastien Sultan, Fabien Dagnat, Caroline Fontaine. A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System. CyberICPS'2017 : International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, Sep 2017, Oslo, Norway. pp.63 - 76, ⟨10.1007/978-3-319-72817-9_5⟩. ⟨hal-01836378⟩
  • Soukayna Qarboua, Julien Schrek, Caroline Fontaine. New results about Tu-Deng's conjecture. ISIT 2016 : IEEE International Symposium on Information Theory, Jul 2016, Barcelona, Spain. pp.485 - 489, ⟨10.1109/ISIT.2016.7541346⟩. ⟨hal-01635350⟩
  • Bastien Sultan, Fabien Dagnat, Caroline Fontaine. Maîtrise des Correctifs de Sécurité pour les Systèmes Navals. CIEL 2016 : 5ème Conférence en Ingénierie du Logiciel, Jun 2016, Besançon, France. pp.1 - 6. ⟨hal-01431543⟩
  • Vincent Migliore, Maria Mendez Real, Vianney Lapotre, Arnaud Tisserand, Caroline Fontaine, et al.. Fast polynomial arithmetic for Somewhat Homomorphic Encryption operations in hardware with Karatsuba algorithm. International Conference on Field-Programmable Technology (FPT), Dec 2016, Xi’an, China. ⟨10.1109/FPT.2016.7929535⟩. ⟨hal-01427642⟩
  • Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, et al.. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. CryptoAction Symposium 2016, Apr 2016, Budapest, Hungary. ⟨hal-01401328⟩
  • Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, et al.. Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. FSE 2016 : 23rd International Conference on Fast Software Encryption, Mar 2016, Bochum, Germany. pp.313-333, ⟨10.1007/978-3-662-52993-5_16⟩. ⟨hal-01280479⟩
  • Vincent Migliore, Maria Méndez Real, Vianney Lapotre, Arnaud Tisserand, Caroline Fontaine, et al.. Exploration of Polynomial Multiplication Algorithms for Homomorphic Encryption Schemes. International Conference on Reconfigurable Computing and FPGAs (ReConFig), Dec 2015, Cancun, Mexico. ⟨10.1109/ReConFig.2015.7393307⟩. ⟨hal-01273192⟩
  • Caroline Fontaine, Sébastien Gambs, Julien Lolive, Cristina Onete. Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes. Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Sep 2014, Florianopolis, Brazil. ⟨hal-01090053⟩
  • Simon Fau, Renaud Sirdey, Caroline Fontaine, Carlos Aguilar Melchor, Guy Gogniat. Towards practical program execution over fully homomorphic encryption schemes. 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2013), Oct 2013, Compiègne, France. ⟨hal-00917061⟩
  • Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar Cox. An Asymmetric Fingerprinting Scheme based on Tardos Codes. IH'11 - 13th International Conference Information Hiding, May 2011, Prague, Czech Republic. ⟨10.1007/978-3-642-24178-9_4⟩. ⟨inria-00581156v2⟩
  • Daniel Augot, Morgan Barbier, Caroline Fontaine. Ensuring message embedding in wet paper steganography. IMACC 2011, Dec 2011, Oxford, United Kingdom. pp.244-258, ⟨10.1007/978-3-642-25516-8_15⟩. ⟨hal-00639551⟩
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. Towards Robust and Secure Watermarking. ACM Multimedia and Security, Sep 2010, Roma, Italy. ⟨inria-00505849⟩
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. Better security levels for "Broken Arrows". Proceedings of the SPIE : International Symposium on Electronic Imaging 2010 : Media Forensics and Security XII, Jan 2010, San Jose, United States. ⟨hal-00472982⟩
  • Fuchun Xie, Caroline Fontaine, Teddy Furon. Un schéma complet de traçage de documents multimédia reposant sur des versions améliorées des codes de Tardos et de la technique de tatouage " Broken Arrows ". Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France. ⟨inria-00504591⟩
  • Ana Charpentier, Caroline Fontaine, Teddy Furon. Décodage EM du code de Tardos pour le fingerprinting. Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France. ⟨inria-00504522⟩
  • Ana Charpentier, Fuchun Xie, Caroline Fontaine, Teddy Furon. Expectation Maximisation decoding of Tardos probabilistic fingerprinting code. IS\&T/SPIE International Symposium on Electronic Imaging 2009, 2009, San Jose, United States. ⟨inria-00504523⟩
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. On-Off Keying Modulation and Tardos Fingerprinting. Proc. ACM Multimedia and Security, ACM, 2008, Oxford, United Kingdom. ⟨inria-00504606⟩
  • Cagatay Dikici, Christine Guillemot, Khalid Idrissi, Caroline Fontaine, Atilla Baskurt. Dirty Paper Coding with Partial State Information. ISIVC 2008, IEEE INTERNATIONAL SYMPOSIUM ON IMAGE/VIDEO COMMUNICATIONS OVER FIXED AND MOBILE NETWORKS, Jul 2008, Bilbao, Spain. ⟨hal-01583961⟩
  • Abdellatif Benjelloun Touimi, Michel Milhau, Alain Le Guyader, Caroline Fontaine, Claude Delpha, et al.. Secured diffusion of music on mobiles: An end-to-end approach. 3rd Taiwanese-French Conference on Information Technology, Mar 2006, Nancy, France. ⟨hal-00871157⟩
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part II: practice. Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.758--767. ⟨inria-00083335⟩
  • François Cayre, Caroline Fontaine, Teddy Furon. A theoretical study of watermarking security. ISIT 2005, 2005, pp.1868-1872. ⟨hal-00158005⟩
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part I: theory. Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.746--757. ⟨inria-00083329⟩
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking attack: security of WSS techniques. International Workshop on Digital Watermarking, Oct 2004, Seoul, South Corea, South Korea. pp.171--183. ⟨inria-00083194⟩
  • Daniel Augot, Jean-François Delaigle, Caroline Fontaine. DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System. ESORICS 98 : 5th European Symposium on Research in Computer Security, Sep 1998, Louvain-la-Neuve, Belgium. pp.241-255, ⟨10.1007/BFb0055867⟩. ⟨hal-00723837⟩

Book sections2 documents

  • Sebastien Canard, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey. Traiter des données multimédia chiffrées grâce au chiffrement homomorphe. William Puech. Sécurité multimédia, 2, ISTE, pp.175-217, A paraître. ⟨hal-03070676⟩
  • Teddy Furon, François Cayre, Caroline Fontaine. Watermarking Security. Nedeljko Cvejic and Tapio Seppanen. Digital Audio Watermarking Techniques and Technologies, Information Science Reference, 2008, 978-1-59904-513-9. ⟨inria-00580838⟩

Preprints, Working Papers, ...1 document

  • Vincent Migliore, Guillaume Bonnoron, Caroline Fontaine. Determination and exploration of practical parameters for the latest Somewhat Homomorphic Encryption (SHE) Schemes. 2016. ⟨hal-01394362v3⟩

Reports1 document

  • Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, Maria Naya-Plasencia, et al.. How to Compress Homomorphic Ciphertexts. [Research Report] 2015/113, IACR Cryptology ePrint Archive. 2015, pp.21. ⟨hal-01237297⟩