[PDF][PDF] Search problems in cryptography: from fingerprinting to lattice sieving

T Laarhoven - 2016 - research.tue.nl
Search problems in cryptography Page 1 Search problems in cryptography: from fingerprinting
to lattice sieving Citation for published version (APA): Laarhoven, T. (2016). Search problems …

Toward practical joint decoding of binary Tardos fingerprinting codes

P Meerwald, T Furon - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
The class of joint decoder in fingerprinting codes is of utmost importance in theoretical
papers to establish the concept of fingerprint capacity. However, no implementation …

Asymptotics of fingerprinting and group testing: Tight bounds from channel capacities

T Laarhoven - IEEE Transactions on Information Forensics and …, 2015 - ieeexplore.ieee.org
In this paper, we consider the large-coalition asymptotics of various fingerprinting and group
testing games, and derive explicit expressions for the capacities for each of these models …

Capacities and capacity-achieving decoders for various fingerprinting games

T Laarhoven - Proceedings of the 2nd ACM workshop on Information …, 2014 - dl.acm.org
Combining an information-theoretic approach to fingerprinting with a more constructive,
statistical approach, we derive new results on the fingerprinting capacities for various …

Towards joint Tardos decoding: the 'Don Quixote'algorithm

P Meerwald, T Furon - International Workshop on Information Hiding, 2011 - Springer
Abstract 'Don Quixote'is a new accusation process for Tardos traitor tracing codes which is,
as far as we know, the first practical implementation of joint decoding. The first key idea is to …

Asymptotics of fingerprinting and group testing: capacity-achieving log-likelihood decoders

T Laarhoven - EURASIP Journal on Information Security, 2016 - Springer
We study the large-coalition asymptotics of fingerprinting and group testing and derive
explicit decoders that provably achieve capacity for many of the considered models. We do …

Asymptotically false-positive-maximizing attack on non-binary Tardos codes

A Simone, B Škorić - International Workshop on Information Hiding, 2011 - Springer
We use a method recently introduced by us to study accusation probabilities for non-binary
Tardos fingerprinting codes. We generalize the pre-computation steps in this approach to …

Towards robust and secure watermarking

F **e, T Furon, C Fontaine - Proceedings of the 12th ACM workshop on …, 2010 - dl.acm.org
This paper presents yet another attempt towards robust and secure watermarking. Some
recent works have looked at this issue first designing new watermarking schemes with a …

Iterative single tardos decoder with controlled probability of false positive

P Meerwald, T Furon - 2011 IEEE International Conference on …, 2011 - ieeexplore.ieee.org
We propose a blind iterative single Tardos decoder for traitor tracing designed to catch as
many colluders as possible while controlling the probability of accusing an innocent. The …

[PDF][PDF] Towards joint decoding of Tardos fingerprinting codes

P Meerwald, T Furon - CoRR, abs/1104.5616, 2011 - Citeseer
The class of joint decoder of probabilistic fingerprinting codes is of utmost importance in
theoretical papers to establish the concept of fingerprint capacity [1]–[3]. However, no …