Scott Contini
Scott Contini
Unknown affiliation
Verified email at cocoondata.com
Title
Cited by
Cited by
Year
VSH, an efficient and provable collision-resistant hash function
S Contini, AK Lenstra, R Steinfeld
Annual International Conference on the Theory and Applications of …, 2006
1392006
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
S Contini, YL Yin
International Conference on the Theory and Application of Cryptology and …, 2006
1322006
Method and system for providing security within multiple set-top boxes assigned for a single customer
P Moroney, S Contini, E Sprunk, AJ Anderson
US Patent 8,068,610, 2011
622011
The security of the RC6 block cipher
S Contini, RL Rivest, MJB Robshaw, YL Yin
NIST AES SUBMISSION, 1998
45*1998
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
37*2006
Improved analysis of some simplified variants of RC6
S Contini, RL Rivest, MJB Robshaw, YL Yin
International Workshop on Fast Software Encryption, 1-15, 1999
351999
Factoring integers with the self-initializing quadratic sieve
SP Contini
331997
Cryptanalysis of FORK-256
K Matusiewicz, T Peyrin, O Billet, S Contini, J Pieprzyk
International Workshop on Fast Software Encryption, 19-38, 2007
262007
On Stern’s attack against secret truncated linear congruential generators
S Contini, IE Shparlinski
Australasian Conference on Information Security and Privacy, 52-60, 2005
252005
Converse results to the Wiener attack on RSA
R Steinfeld, S Contini, H Wang, J Pieprzyk
International Workshop on Public Key Cryptography, 184-198, 2005
192005
A heterogeneous computing environment to solve the 768-bit RSA challenge
T Kleinjung, JW Bos, AK Lenstra, DA Osvik, K Aoki, S Contini, J Franke, ...
Cluster Computing 15 (1), 53-68, 2012
172012
Weaknesses of the FORK-256 compression function.
K Matusiewicz, S Contini, J Pieprzyk
IACR Cryptol. ePrint Arch. 2006, 317, 2006
142006
The security of the RC6 block cipher. v1. 0, August 20, 1998
S Contini, RL Rivest, MJB Robshaw, YL Yin
141995
A critical look at cryptographic hash function literature
S Contini, R Steinfeld, J Pieprzyk, K Matusiewicz
Coding and Cryptology, 58-79, 2008
122008
Improved Cryptanalysis of SecurID.
S Contini, YL Yin
IACR Cryptol. ePrint Arch. 2003, 205, 2003
112003
On differential properties of data-dependent rotations and their use in MARS and RC6
S Contini, YL Yin
Proceedings of Second AES Conference, 2000
112000
Complexity of inverting the Euler function
S Contini, E Croot, I Shparlinski
Mathematics of computation 75 (254), 983-996, 2006
92006
Fast software-based attacks on SecurID
S Contini, YL Yin
International Workshop on Fast Software Encryption, 454-471, 2004
92004
The factorization of rsa-140
S Contini
RSA Laboratories' Bulletin 10, 1-2, 1999
91999
Extending FORK-256 attack to the full hash function
S Contini, K Matusiewicz, J Pieprzyk
International Conference on Information and Communications Security, 296-305, 2007
82007
The system can't perform the operation now. Try again later.
Articles 1–20