Cryptographers' World
 

Scott Contini


Author's Web Page Link

7 papers in database with 196 citations 

H-number: 6

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Ron Steinfeld,  Scott Contini,  Krystian Matusiewicz,  Josef Pieprzyk,  Jian Guo,  San Ling,  Huaxiong Wang,  Cryptanalysis of LASH, pp. 207 - 223, FSE 2008.

[Electronic Edition][Cited 5 times ]

2. Krystian Matusiewicz,  Thomas Peyrin,  Olivier Billet,  Scott Contini,  Josef Pieprzyk,  Cryptanalysis of FORK-256, pp. 19 - 38, FSE 2007.

[Electronic Edition][Cited 22 times ]

3. Scott Contini,  Arjen K. Lenstra,  Ron Steinfeld,  VSH, an Efficient and Provable Collision-Resistant Hash Function, pp. 165 - 182, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 67 times Red Star]

4. Scott Contini,  Yiqun Lisa Yin,  Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions, pp. 37 - 53, ASIACRYPT 2006.

[Electronic Edition][Cited 66 times Red Star]

5. Ron Steinfeld,  Scott Contini,  Huaxiong Wang,  Josef Pieprzyk,  Converse Results to the Wiener Attack on RSA, pp. 184 - 198, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

6. Scott Contini,  Yiqun Lisa Yin,  Fast Software-Based Attacks on SecurID, pp. 454 - 471, FSE 2004.

[Electronic Edition][Cited 6 times ]

7. Scott Contini,  Ronald L. Rivest,  Matthew J. B. Robshaw,  Yiqun Lisa Yin,  Improved Analysis of Some Simplified Variants of RC6, pp. 1 - 15, FSE 1999.

[Electronic Edition][Cited 20 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...