E. Abbe and L. Zheng, Linear Universal Decoding for Compound Channels, IEEE Transactions on Information Theory, vol.56, issue.12, pp.5999-6013, 2010.
DOI : 10.1109/TIT.2010.2080910

E. Amiri and G. Tardos, High rate fingerprinting codes and the fingerprinting capacity, Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '09, pp.336-345, 2009.
DOI : 10.1137/1.9781611973068.38

F. Cérou, T. Furon, and A. Guyader, Experimental assessment of the reliability for watermarking and fingerprinting schemes, EURASIP Jounal on Information Security, pp.414962-414974, 2008.

T. Furon and L. Pérez-freire, Worst case attacks against binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.46-50, 2009.
DOI : 10.1109/WIFS.2009.5386484

URL : https://hal.archives-ouvertes.fr/inria-00505893

D. E. Knuth, The Art of Computer Programming, Generating All Combinations and Partitions, vol.4, issue.3, 2005.

P. Moulin, Universal fingerprinting: Capacity and random-coding exponents, 2008 IEEE International Symposium on Information Theory, pp.220-224, 2008.
DOI : 10.1109/ISIT.2008.4594980

K. Nuida, An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive, Proceedings of the Information Hiding Workshop, IH '09, pp.161-175, 2009.
DOI : 10.1007/3-540-36231-2_13

K. Nuida, Short Collusion-Secure Fingerprint Codes against Three Pirates, Lecture Notes in Computer Science, vol.55, pp.86-102, 2010.
DOI : 10.1145/1346330.1346335

URL : http://arxiv.org/abs/1012.3340

K. Nuida, S. Fujitsu, M. Hagiwara, T. Kitagawa, H. Watanabe et al., An improvement of discrete Tardos fingerprinting codes, Designs, Codes and Cryptography, vol.46, issue.5, pp.339-362338, 2008.
DOI : 10.1007/s10623-009-9285-z

W. H. Payne and F. M. Ives, Combination Generators, ACM Transactions on Mathematical Software, vol.5, issue.2, pp.163-172, 1979.
DOI : 10.1145/355826.355830

L. Pérez-freire and T. Furon, Blind decoder for binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.56-60, 2009.
DOI : 10.1109/WIFS.2009.5386486

M. Saito and M. Matsumoto, A PRNG Specialized in Double Precision Floating Point Numbers Using an Affine Transition, Proc. Eighth Int. Conference on Monte Carlo and Quasi-Monte Carlo Methods in Scientific Computing, MCQMC '08, pp.589-602, 2008.
DOI : 10.1007/978-3-642-04107-5_38

B. Skoric, S. Katzenbeisser, and M. Celik, Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.47, issue.3, pp.137-166, 2008.
DOI : 10.1007/s10623-007-9142-x

G. Tardos, Optimal probabilistic fingerprint codes, Proc. 35th ACM Symposium on Theory of Computing, pp.116-125, 2003.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911

M. Wu, W. Trappe, Z. J. Wang, and K. J. Liu, Collusion-resistant fingerprinting for Multimedia, IEEE Signal Processing Magazine, vol.21, issue.2, pp.15-27, 2004.