Scott Contini

According to our database1, Scott Contini authored at least 25 papers between 1999 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
Method to Protect Passwords in Databases for Web Applications.
IACR Cryptology ePrint Archive, 2015

2012
A heterogeneous computing environment to solve the 768-bit RSA challenge.
Cluster Computing, 2012

2011
Number Theory.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Modular Root.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Greatest Common Divisor.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2008
Cryptanalysis of LASH.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Cryptanalysis of LASH.
IACR Cryptology ePrint Archive, 2007

Extending FORK-256 Attack to the Full Hash Function.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Cryptanalysis of FORK-256.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Complexity of inverting the Euler function.
Math. Comput., 2006

Weaknesses of the FORK-256 compression function.
IACR Cryptology ePrint Archive, 2006

Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.
IACR Cryptology ePrint Archive, 2006

VSH, an Efficient and Provable Collision-Resistant Hash Function.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.
Proceedings of the Advances in Cryptology, 2006

2005
Modular Arithmetic.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Modulus.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Least Common Multiple.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

VSH, an Efficient and Provable Collision Resistant Hash Function.
IACR Cryptology ePrint Archive, 2005

Collisions in the Original Version of a Chaotic Hash Function.
IACR Cryptology ePrint Archive, 2005

Converse Results to the Wiener Attack on RSA.
Proceedings of the Public Key Cryptography, 2005

On Stern's Attack Against Secret Truncated Linear Congruential Generators.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Complexity of Inverting the Euler Function
Electronic Colloquium on Computational Complexity (ECCC), 2004

Fast Software-Based Attacks on SecurID.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
Improved Cryptanalysis of SecurID.
IACR Cryptology ePrint Archive, 2003

1999
Improved Analysis of Some Simplified Variants of RC6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999


  Loading...