Search results for: Caroline Fontaine
Journal of Cryptographic Engineering > 2019 > 9 > 2 > 185-201
Journal of Cryptology > 2018 > 31 > 3 > 885-916
The International Journal of Life Cycle Assessment > 2018 > 23 > 5 > 1030-1041
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2000 > Boolean Functions and Hardware > 507-522
Lecture Notes in Computer Science > Sequences and Their Applications - SETA 2004 > Sequence Generator Properties and Applications > 313-322
Lecture Notes in Computer Science > Digital Watermarking > Session III: Authentication and Stego > 171-183
IEEE Signal Processing Magazine > 2013 > 30 > 2 > 108 - 117
EURASIP Journal on Information Security > 2009 > 2009 > 1 > 1-10
EURASIP Journal on Information Security > 2007 > 2007 > 1 > 1-10