Linear Universal Decoding for Compound Channels, IEEE Transactions on Information Theory, vol.56, issue.12, pp.5999-6013, 2010. ,
DOI : 10.1109/TIT.2010.2080910
High rate fingerprinting codes and the fingerprinting capacity, Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '09, pp.336-345, 2009. ,
DOI : 10.1137/1.9781611973068.38
Experimental assessment of the reliability for watermarking and fingerprinting schemes, EURASIP Jounal on Information Security, pp.414962-414974, 2008. ,
Worst case attacks against binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.46-50, 2009. ,
DOI : 10.1109/WIFS.2009.5386484
URL : https://hal.archives-ouvertes.fr/inria-00505893
The Art of Computer Programming, Generating All Combinations and Partitions, vol.4, issue.3, 2005. ,
Universal fingerprinting: Capacity and random-coding exponents, 2008 IEEE International Symposium on Information Theory, pp.220-224, 2008. ,
DOI : 10.1109/ISIT.2008.4594980
An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive, Proceedings of the Information Hiding Workshop, IH '09, pp.161-175, 2009. ,
DOI : 10.1007/3-540-36231-2_13
Short Collusion-Secure Fingerprint Codes against Three Pirates, Lecture Notes in Computer Science, vol.55, pp.86-102, 2010. ,
DOI : 10.1145/1346330.1346335
URL : http://arxiv.org/abs/1012.3340
An improvement of discrete Tardos fingerprinting codes, Designs, Codes and Cryptography, vol.46, issue.5, pp.339-362338, 2008. ,
DOI : 10.1007/s10623-009-9285-z
Combination Generators, ACM Transactions on Mathematical Software, vol.5, issue.2, pp.163-172, 1979. ,
DOI : 10.1145/355826.355830
Blind decoder for binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.56-60, 2009. ,
DOI : 10.1109/WIFS.2009.5386486
A PRNG Specialized in Double Precision Floating Point Numbers Using an Affine Transition, Proc. Eighth Int. Conference on Monte Carlo and Quasi-Monte Carlo Methods in Scientific Computing, MCQMC '08, pp.589-602, 2008. ,
DOI : 10.1007/978-3-642-04107-5_38
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.47, issue.3, pp.137-166, 2008. ,
DOI : 10.1007/s10623-007-9142-x
Optimal probabilistic fingerprint codes, Proc. 35th ACM Symposium on Theory of Computing, pp.116-125, 2003. ,
DOI : 10.1145/1346330.1346335
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911
Collusion-resistant fingerprinting for Multimedia, IEEE Signal Processing Magazine, vol.21, issue.2, pp.15-27, 2004. ,