Caroline Fontaine
发表
Caroline Fontaine,
2005,
Encyclopedia of Cryptography and Security.
Arnaud Tisserand,
Russell Tessier,
Guy Gogniat,
2017,
ACM Trans. Embed. Comput. Syst..
Teddy Furon,
Caroline Fontaine,
Ana Charpentier,
2010,
Traitement du Signal.
Caroline Fontaine,
2011,
Encyclopedia of Cryptography and Security.
Eric Filiol,
Caroline Fontaine,
D. Vianne,
2001,
Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
Eric Filiol,
Caroline Fontaine,
C. Fontaine,
1998,
EUROCRYPT.
Caroline Fontaine,
2011,
Encyclopedia of Cryptography and Security.
Renaud Sirdey,
Caroline Fontaine,
Sergiu Carpov,
2017,
ICISSP.
Caroline Fontaine,
C. Fontaine,
1999,
IEEE Trans. Inf. Theory.
Christophe Giraud,
Caroline Fontaine,
Jean Bernard Fischer,
2006
.
Arnaud Tisserand,
Guy Gogniat,
Caroline Fontaine,
2015,
2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig).
Caroline Fontaine,
Julien Schrek,
Soukayna Qarboua,
2016,
2016 IEEE International Symposium on Information Theory (ISIT).
Caroline Fontaine,
2011,
Encyclopedia of Cryptography and Security.
Caroline Fontaine,
2005,
Encyclopedia of Cryptography and Security.
Teddy Furon,
Caroline Fontaine,
Ana Charpentier,
2009,
Electronic Imaging.
Nazim Fatès,
Frédéric Raynal,
Fabien A. P. Petitcolas,
2001,
Proceedings International Conference on Information Technology: Coding and Computing.
Caroline Fontaine,
Fabien Galand,
2007,
Information Hiding.
Caroline Fontaine,
C. Fontaine,
2011,
Encyclopedia of Cryptography and Security.
Bhaskar Biswas,
Vincent Herbert,
Caroline Fontaine,
2018,
Journal of Cryptographic Engineering.
Arnaud Tisserand,
Guy Gogniat,
Caroline Fontaine,
2016,
2016 International Conference on Field-Programmable Technology (FPT).
Renaud Sirdey,
Caroline Fontaine,
Sergiu Carpov,
2016,
SecureComm.
Caroline Fontaine,
Guillaume Bonnoron,
C. Fontaine,
2017,
INDOCRYPT.
A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System
Fabien Dagnat,
Caroline Fontaine,
Bastien Sultan,
2017,
CyberICPS/SECPRE@ESORICS.
Eric Filiol,
Caroline Fontaine,
2001,
IACR Cryptol. ePrint Arch..
Daniel Augot,
Jean-Francois Delaigle,
Caroline Fontaine,
1999
.
Anne Canteaut,
Claude Carlet,
Pascale Charpin,
2001,
IEEE Trans. Inf. Theory.
Caroline Fontaine,
Vincent Migliore,
Guillaume Bonnoron,
2018,
IEEE Transactions on Computers.
Caroline Fontaine,
Fabien Galand,
C. Fontaine,
2009,
EURASIP J. Inf. Secur..
Srdjan Capkun,
Qijun Gu,
Tor Helleseth,
2011,
Encyclopedia of Cryptography and Security.
Srdjan Capkun,
Qijun Gu,
Tor Helleseth,
2011,
Encyclopedia of Cryptography and Security.
Christophe Giraud,
Jean-Bernard Fischer,
Pierre Duhamel,
2008
.
Caroline Fontaine,
2005,
Encyclopedia of Cryptography and Security.
Anne Canteaut,
María Naya-Plasencia,
Tancrède Lepoint,
2015,
IACR Cryptol. ePrint Arch..
Caroline Fontaine,
Fabien Galand,
C. Fontaine,
2007,
EURASIP J. Inf. Secur..
Daniel Augot,
Caroline Fontaine,
Morgan Barbier,
2011,
IMACC.
Guy Gogniat,
Renaud Sirdey,
Simon Fau,
2013,
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
Caroline Fontaine,
2011,
Encyclopedia of Cryptography and Security.
Caroline Fontaine,
2005,
Encyclopedia of Cryptography and Security.
Daniel Augot,
Caroline Fontaine,
C. Fontaine,
1998,
Other Conferences.
Caroline Fontaine,
2011,
Encyclopedia of Cryptography and Security.
Ingemar J. Cox,
Teddy Furon,
Caroline Fontaine,
2011,
Information Hiding.
Vincent Herbert,
Caroline Fontaine,
2017,
IACR Cryptol. ePrint Arch..
Renaud Sirdey,
Caroline Fontaine,
Sergiu Carpov,
2020,
IACR Cryptol. ePrint Arch..
Anne Canteaut,
Claude Carlet,
Pascale Charpin,
2000,
EUROCRYPT.
Guy Gogniat,
Renaud Sirdey,
Simon Fau,
2013,
IEEE Signal Processing Magazine.
Teddy Furon,
Caroline Fontaine,
Fuchun Xie,
2010,
MM&Sec '10.
Christophe Giraud,
Pierre Duhamel,
Caroline Fontaine,
2006
.
Teddy Furon,
Caroline Fontaine,
Fuchun Xie,
2010,
Electronic Imaging.
Teddy Furon,
Caroline Fontaine,
Fuchun Xie,
2008,
MM&Sec '08.
Caroline Fontaine,
2011,
Encyclopedia of Cryptography and Security.
Jean-François Delaigle,
Daniel Augot,
Caroline Fontaine,
1998,
ESORICS.
Marko Vukolic,
Alysson Bessani,
Sébastien Canard,
2015
.
Caroline Fontaine,
Vincent Migliore,
Guillaume Bonnoron,
2016
.
Caroline Fontaine,
2005,
Encyclopedia of Cryptography and Security.
Renaud Sirdey,
Caroline Fontaine,
Sergiu Carpov,
2017,
2017 15th Annual Conference on Privacy, Security and Trust (PST).
Nazim Fatès,
Frédéric Raynal,
Fabien A. P. Petitcolas,
2001,
IS&T/SPIE Electronic Imaging.
Teddy Furon,
François Cayre,
Caroline Fontaine,
2005,
Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
Arnaud Tisserand,
Guy Gogniat,
Caroline Fontaine,
2018,
IEEE Transactions on Computers.
Teddy Furon,
François Cayre,
Caroline Fontaine,
2004,
IWDW.
Christine Guillemot,
Atilla Baskurt,
Khalid Idrissi,
2008
.
Eric Filiol,
Caroline Fontaine,
C. Fontaine,
2001,
IMACC.
Caroline Fontaine,
2005,
Encyclopedia of Cryptography and Security.
Sébastien Gambs,
Caroline Fontaine,
Cristina Onete,
2014,
LATINCRYPT.
Teddy Furon,
François Cayre,
Caroline Fontaine,
2005,
IS&T/SPIE Electronic Imaging.
Frédéric Raynal,
Caroline Fontaine,
2002,
IS&T/SPIE Electronic Imaging.
Daniel Augot,
Jean-Francois Delaigle,
Caroline Fontaine,
1999
.
Caroline Fontaine,
2005,
Encyclopedia of Cryptography and Security.
Caroline Fontaine,
2011,
Encyclopedia of Cryptography and Security.
Christophe Giraud,
Jean-Bernard Fischer,
Caroline Fontaine,
2006,
ESORICS.
Teddy Furon,
François Cayre,
Caroline Fontaine,
2005,
IS&T/SPIE Electronic Imaging.
Kazue Sako,
Micah Sherr,
Bir Bhanu,
2011,
Encyclopedia of Cryptography and Security.
Caroline Fontaine,
Vincent Bénony,
Eric Wegrzynowski,
2004,
SETA.
Caroline Fontaine,
C. Fontaine,
2005,
Encyclopedia of Cryptography and Security.
Caroline Fontaine,
2005,
Encyclopedia of Cryptography and Security.
Philippe Carré,
Caroline Fontaine,
Philippe Gaborit,
2022,
Signal Process..
Anne Canteaut,
Claude Carlet,
Pascale Charpin,
2000,
2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).