| 1 | 2008 | Asiacrypt | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2008 | Cryptanalysis of LASH | fse | 207-223 |
| 2 | 2007 | Cryptanalysis of LASH | eprint | online |
| 3 | 2007 | Cryptanalysis of FORK-256 | fse | 19-38 |
| 4 | 2006 | Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions | asiacrypt | online |
| 5 | 2006 | Weaknesses of the FORK-256 compression function | eprint | online |
| 6 | 2006 | Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions | eprint | online |
| 7 | 2006 | VSH, an Efficient and Provable Collision-Resistant Hash Function | eurocrypt | online |
| 8 | 2005 | Converse Results to the Wiener Attack on RSA | pkc | online |
| 9 | 2005 | Collisions in the Original Version of a Chaotic Hash Function | eprint | online |
| 10 | 2005 | VSH, an Efficient and Provable Collision Resistant Hash Function | eprint | online |
| 11 | 2004 | Fast Software-Based Attacks on SecurID | fse | 454-471 |
| 12 | 2003 | Improved Cryptanalysis of SecurID | eprint | online |
| 13 | 1999 | Improved Analysis of Some Simplified Variants of RC6 | fse | 1-15 |
Coauthors of Scott Contini |