Caroline Fontaine
Orcid: 0000-0001-8184-7366
According to our database1,
Caroline Fontaine
authored at least 76 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2022
Efficient image tampering localization using semi-fragile watermarking and error control codes.
Signal Process., 2022
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
IACR Cryptol. ePrint Arch., 2022
2020
Illuminating the Dark or how to recover what should not be seen in FE-based classifiers.
Proc. Priv. Enhancing Technol., 2020
2019
J. Cryptogr. Eng., 2019
2018
Hardware/Software Co-Design of an Accelerator for FV Homomorphic Encryption Scheme Using Karatsuba Algorithm.
IEEE Trans. Computers, 2018
IEEE Trans. Computers, 2018
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
J. Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
IACR Cryptol. ePrint Arch., 2017
Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
Proceedings of the Codes, Cryptology and Information Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Fast polynomial arithmetic for Somewhat Homomorphic Encryption operations in hardware with Karatsuba algorithm.
Proceedings of the 2016 International Conference on Field-Programmable Technology, 2016
2015
Exploration of polynomial multiplication algorithms for homomorphic encryption schemes.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015
2014
Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
2013
Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain.
IEEE Signal Process. Mag., 2013
Proceedings of the Eighth International Conference on P2P, 2013
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the Media Forensics and Security II, 2010
2009
EURASIP J. Inf. Secur., 2009
Proceedings of the Media Forensics and Security I, 2009
2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
2006
Proceedings of the Computer Security, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2004
Proceedings of the Sequences and Their Applications, 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Public automated web-based evaluation service for watermarking schemes: StirMark benchmark.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001
Proceedings of the Cryptography and Coding, 2001
2000
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
Proceedings of the Advances in Cryptology, 2000
1999
IEEE Trans. Inf. Theory, 1999
1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System.
Proceedings of the Computer Security, 1998
Key issues for watermarking digital images.
Proceedings of the Electronic Imaging: Processing, 1998