Caroline Fontaine

Orcid: 0000-0001-8184-7366

According to our database1, Caroline Fontaine authored at least 76 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Relations among new CCA security notions for approximate FHE.
IACR Cryptol. ePrint Arch., 2024

A Probabilistic Logic for Concrete Security.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2022
Efficient image tampering localization using semi-fragile watermarking and error control codes.
Signal Process., 2022

A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
IACR Cryptol. ePrint Arch., 2022

2020
Illuminating the Dark or how to recover what should not be seen in FE-based classifiers.
Proc. Priv. Enhancing Technol., 2020

2019
Design and implementation of low-depth pairing-based homomorphic encryption scheme.
J. Cryptogr. Eng., 2019

2018
Hardware/Software Co-Design of an Accelerator for FV Homomorphic Encryption Scheme Using Karatsuba Algorithm.
IEEE Trans. Computers, 2018

Practical Parameters for Somewhat Homomorphic Encryption Schemes on Binary Circuits.
IEEE Trans. Computers, 2018

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
J. Cryptol., 2018

Illuminating the Dark or how to recover what should not be seen.
IACR Cryptol. ePrint Arch., 2018

2017
A High-Speed Accelerator for Homomorphic Encryption using the Karatsuba Algorithm.
ACM Trans. Embed. Comput. Syst., 2017

Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2017

Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Privacy Preserving Data Classification using Inner-product Functional Encryption.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges.
Proceedings of the Codes, Cryptology and Information Security, 2017

2016
A note on Ring-LWE security in the case of Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016

Privacy Preserving Data Classification Using Inner Product Encryption.
Proceedings of the Security and Privacy in Communication Networks, 2016

New results about Tu-Deng's conjecture.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Fast polynomial arithmetic for Somewhat Homomorphic Encryption operations in hardware with Karatsuba algorithm.
Proceedings of the 2016 International Conference on Field-Programmable Technology, 2016

2015
How to Compress Homomorphic Ciphertexts.
IACR Cryptol. ePrint Arch., 2015

Exploration of polynomial multiplication algorithms for homomorphic encryption schemes.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015

2014
Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

2013
Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain.
IEEE Signal Process. Mag., 2013

Towards Practical Program Execution over Fully Homomorphic Encryption Schemes.
Proceedings of the Eighth International Conference on P2P, 2013

2011
Synchronous Stream Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Summation Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Shrinking Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Self-Synchronizing Stream Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Self-Shrinking Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Nonlinear Feedback Shift Register.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Congruential Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Clock-Controlled Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Ensuring Message Embedding in Wet Paper Steganography.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

An Asymmetric Fingerprinting Scheme Based on Tardos Codes.
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
Décodage EM du code de Tardos pour le fingerprinting.
Traitement du Signal, 2010

Towards robust and secure watermarking.
Proceedings of the Multimedia and Security Workshop, 2010

Better security levels for broken arrows.
Proceedings of the Media Forensics and Security II, 2010

2009
How Reed-Solomon Codes Can Improve Steganographic Schemes.
EURASIP J. Inf. Secur., 2009

Expectation maximization decoding of Tardos probabilistic fingerprinting code.
Proceedings of the Media Forensics and Security I, 2009

2008
On-off keying modulation and tardos fingerprinting.
Proceedings of the 10th workshop on Multimedia & Security, 2008

2007
A Survey of Homomorphic Encryption for Nonspecialists.
EURASIP J. Inf. Secur., 2007

How Can Reed-Solomon Codes Improve Steganographic Schemes?
Proceedings of the Information Hiding, 9th International Workshop, 2007

2006
Enhanced Security Architecture for Music Distribution on Mobile.
Proceedings of the Computer Security, 2006

2005
Synchronous Stream Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Summation generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Shrinking Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Self-Synchronizing Stream Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Self-Shrinking Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Nonlinear Feedback Shift Register.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Congruential Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

E0 (Bluetooth).
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Clock-Controlled Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Watermarking security: theory and practice.
IEEE Trans. Signal Process., 2005

Watermarking security part two: Practice.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Watermarking security part one: Theory.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

A theoretical study of watermarking security.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Cryptanalysis of a Particular Case of Klimov-Shamir Pseudo-Random Generator.
Proceedings of the Sequences and Their Applications, 2004

Watermarking Attack: Security of WSS Techniques.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

2002
Links between cryptography and information hiding.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

2001
On cryptographic properties of the cosets of R(1, m).
IEEE Trans. Inf. Theory, 2001

COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers.
IACR Cryptol. ePrint Arch., 2001

Public automated web-based evaluation service for watermarking schemes: StirMark benchmark.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

StirMark Benchmark: Audio Watermarking Attacks.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

A New Ultrafast Stream Cipher Design: COS Ciphers.
Proceedings of the Cryptography and Coding, 2001

2000
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
Proceedings of the Advances in Cryptology, 2000

1999
On Some Cosets of the First-Order Reed-Muller Code with High Minimum Weight.
IEEE Trans. Inf. Theory, 1999

Secure delivery of images over open networks.
Proc. IEEE, 1999

1998
Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System.
Proceedings of the Computer Security, 1998

Key issues for watermarking digital images.
Proceedings of the Electronic Imaging: Processing, 1998


  Loading...