P. Moulin, Universal Fingerprinting: Capacity and Random-Coding Exponents, 2011.

Y. Huang and P. Moulin, On the saddle-point solution and the large-coalition asymptotics of fingerprinting games, IEEE Trans. Inform. Forensics Security, vol.7, issue.1, pp.160-175, 2012.

E. Amiri and G. Tardos, High rate fingerprinting codes and the fingerprinting capacity, Proc. 20th Annu. ACM-SIAM Symp. Discrete Algorithms, SODA '09, pp.336-345, 2009.

N. P. Anthapadmanabhan, A. Barg, and I. Dumer, On the fingerprinting capacity under the marking assumption, IEEE Trans. Inform. Theory, vol.54, issue.6, pp.2678-2689, 2008.

E. Abbe and L. Zheng, Linear universal decoding for compound channels, IEEE Trans. Inform. Theory, vol.56, issue.12, pp.5999-6013, 2010.

G. Tardos, Optimal probabilistic fingerprint codes, J. ACM, vol.55, issue.2, pp.1-24, 2008.

E. Amiri, Fingerprinting codes: Higher rates, quick accusations, 2010.

K. Nuida, Short collusion-secure fingerprint codes against three pirates, Proc. Information Hiding Workshop, IH '10, ser, vol.6387, pp.86-102, 2010.

B. Skoric, S. Katzenbeisser, and M. Celik, Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes Cryptography, vol.46, pp.137-166, 2008.

T. Furon and L. Pérez-freire, EM decoding of Tardos traitor tracing codes, Proc. ACM Multimedia Security Workshop, pp.99-106, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00505875

M. Fernandez and M. Soriano, Identification of traitors in algebraicgeometric traceability codes, IEEE Trans. Signal Process, vol.52, issue.10, pp.3073-3077, 2004.

A. Barg, G. R. Blakley, and G. Kabatiansky, Digital fingerprinting codes: Problem statements, constructions, identification of traitors, IEEE Trans. Inform. Theory, vol.49, issue.4, pp.852-865, 2003.

K. Nuida, S. Fujitsu, M. Hagiwara, T. Kitagawa, H. Watanabe et al., An improvement of discrete Tardos fingerprinting codes, Designs, Codes Cryptography, vol.52, issue.3, pp.339-362, 2009.

M. Kuribayashi, Experimental assessment of probabilistic fingerprinting codes over AWGN channel, Proc. 5th Int. Workshop Security, IWSEC '10, ser, vol.6432, pp.117-132, 2010.

H. G. Schaathun, On error-correcting fingerprinting codes for use with watermarking, Multimedia Systems, vol.13, issue.5, pp.331-344, 2008.

J. Jourdas and P. Moulin, High-rate random-like spherical fingerprinting codes with linear decoding complexity, IEEE Trans. Inform. Forensics Security, vol.4, issue.4, pp.768-780, 2009.

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Trans. Inform. Theory, vol.44, issue.5, pp.1897-1905, 1998.

B. Skoric, S. Katzenbeisser, H. Schaathun, and M. Celik, Tardos fingerprinting codes in the combined digit model, IEEE Trans. Inform. Forensics Security, vol.6, issue.3, pp.906-919, 2011.

L. Pérez-freire and T. Furon, Blind decoder for binary probabilistic traitor tracing codes, Proc. First IEEE Int. Workshop Information Forensics Security. WIFS'09, pp.56-60, 2009.

T. Furon, A. Guyader, and F. Cérou, On the design and optimisation of Tardos probabilistic fingerprinting codes, Proc. 10th Information Hiding Workshop, ser. Lecture Notes in Computer Science, pp.341-356, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00504549

A. Somekh-baruch and N. Merhav, On the capacity game of private fingerprinting systems under collusion attacks, IEEE Trans. Inform. Theory, vol.51, issue.3, pp.884-899, 2005.

T. Furon and L. Pérez-freire, Worst case attacks against binary probabilistic traitor tracing codes, Proc. First IEEE Int. Workshop Information Forensics and Security WIFS'09, pp.46-50, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00505893

Y. Huang and P. Moulin, Capacity-achieving fingerprint decoding, Proc. IEEE Int. Workshop Information Forensics and Security, WIFS '09, pp.51-55, 2009.

A. Simone and B. Skoric, Accusation probabilities in Tardos codes: Beyond the Gaussian approximation, Designs, Codes Cryptography, vol.63, issue.3, pp.379-412, 2012.

A. Guyader, N. Hengartner, and E. Matzner-lober, Simulation and estimation of extreme quantiles and extreme probabilities, Applied Math. Optimization, vol.64, issue.2, pp.171-196, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00911891

P. Meerwald and T. Furon, Iterative single Tardos decoder with controlled probability of false positive, Proc. IEEE Int. Conf. Multimedia Expo, ICME '11, pp.1-6, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00581159

P. Meerwald and T. Furon, Towards joint Tardos decoding: The 'Don Quixote' algorithm, Proc. Information Hiding Conf., IH ' 11, ser, vol.6958, pp.28-42, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01057832

J. Jourdas and P. Moulin, A high-rate fingerprinting code, Proc

I. Symp, Electronic Imaging, Security, Forensics, Steganography Watermarking of Multimedia Contents X, 2008.