Scott Contini
Scott Contini
Unknown affiliation
Verified email at cocoondata.com
Title
Cited by
Cited by
Year
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
D Ünay, Z Çataltepe, S Aksoy
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2010
155*2010
VSH, an efficient and provable collision-resistant hash function
S Contini, AK Lenstra, R Steinfeld
Annual International Conference on the Theory and Applications of …, 2006
1432006
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
S Contini, YL Yin
International Conference on the Theory and Application of Cryptology and …, 2006
1352006
Method and system for providing security within multiple set-top boxes assigned for a single customer
P Moroney, S Contini, E Sprunk, AJ Anderson
US Patent 8,068,610, 2011
632011
The security of the RC6 block cipher
S Contini, RL Rivest, MJB Robshaw, YL Yin
NIST AES SUBMISSION, 1998
46*1998
Improved analysis of some simplified variants of RC6
S Contini, RL Rivest, MJB Robshaw, YL Yin
International Workshop on Fast Software Encryption, 1-15, 1999
361999
Factoring integers with the self-initializing quadratic sieve
SP Contini
321997
Cryptanalysis of FORK-256
K Matusiewicz, T Peyrin, O Billet, S Contini, J Pieprzyk
International Workshop on Fast Software Encryption, 19-38, 2007
282007
On Stern’s attack against secret truncated linear congruential generators
S Contini, IE Shparlinski
Australasian Conference on Information Security and Privacy, 52-60, 2005
252005
Converse results to the Wiener attack on RSA
R Steinfeld, S Contini, H Wang, J Pieprzyk
International Workshop on Public Key Cryptography, 184-198, 2005
202005
A heterogeneous computing environment to solve the 768-bit RSA challenge
T Kleinjung, JW Bos, AK Lenstra, DA Osvik, K Aoki, S Contini, J Franke, ...
Cluster Computing 15 (1), 53-68, 2012
192012
A critical look at cryptographic hash function literature
S Contini, R Steinfeld, J Pieprzyk, K Matusiewicz
Coding and Cryptology, 58-79, 2008
132008
On differential properties of data-dependent rotations and their use in MARS and RC6
S Contini, YL Yin
To appear, 2000
132000
The security of the RC6 block cipher. v1. 0, August 20, 1998
S Contini, RL Rivest, MJB Robshaw, YL Yin
131995
Weaknesses of the FORK-256 compression function.
K Matusiewicz, S Contini, J Pieprzyk
IACR Cryptol. ePrint Arch. 2006, 317, 2006
122006
Improved Cryptanalysis of SecurID.
S Contini, YL Yin
IACR Cryptol. ePrint Arch. 2003, 205, 2003
102003
The factorization of rsa-140
S Contini
RSA Laboratories’ Bulletin 10, 1-2, 1999
101999
Extending FORK-256 attack to the full hash function
S Contini, K Matusiewicz, J Pieprzyk
International Conference on Information and Communications Security, 296-305, 2007
92007
Complexity of inverting the Euler function
S Contini, E Croot, I Shparlinski
Mathematics of computation 75 (254), 983-996, 2006
92006
Fast software-based attacks on SecurID
S Contini, YL Yin
International Workshop on Fast Software Encryption, 454-471, 2004
92004
The system can't perform the operation now. Try again later.
Articles 1–20