Scott Contini

According to our database1, Scott Contini authored at least 27 papers between 1999 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Method to Protect Passwords in Databases for Web Applications.
IACR Cryptol. ePrint Arch., 2015

2012
A heterogeneous computing environment to solve the 768-bit RSA challenge.
Clust. Comput., 2012

2011
Modular Arithmetic.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Number Theory.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Modulus.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Modular Root.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Least Common Multiple.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Greatest Common Divisor.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2007
Cryptanalysis of LASH.
IACR Cryptol. ePrint Arch., 2007

Extending FORK-256 Attack to the Full Hash Function.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Cryptanalysis of FORK-256.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Weaknesses of the FORK-256 compression function.
IACR Cryptol. ePrint Arch., 2006

Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.
IACR Cryptol. ePrint Arch., 2006

2005
Modular Arithmetic.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Number Theory.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Modulus.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Modular Root.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Least Common Multiple.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Greatest Common Divisor.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

VSH, an Efficient and Provable Collision Resistant Hash Function.
IACR Cryptol. ePrint Arch., 2005

Collisions in the Original Version of a Chaotic Hash Function.
IACR Cryptol. ePrint Arch., 2005

Converse Results to the Wiener Attack on RSA.
Proceedings of the Public Key Cryptography, 2005

On Stern's Attack Against Secret Truncated Linear Congruential Generators.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Complexity of Inverting the Euler Function
Electron. Colloquium Comput. Complex., 2004

Fast Software-Based Attacks on SecurID.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
Improved Cryptanalysis of SecurID.
IACR Cryptol. ePrint Arch., 2003

1999
Improved Analysis of Some Simplified Variants of RC6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999


  Loading...