Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Scott Contini
Cryptanalysis of FORK-256
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Related-Key Cryptanalysis of the Full AES-192 and AES-256
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of RadioGatĂșn
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
To Fork or Not to Fork: Fork Motivations in SourceForge Projects
IFIP Advances in Information and Communication Technology
Computer Networks
Information Systems
Management
Communications
Partitioning Cryptanalysis
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Improved Cryptanalysis of RC5
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Structural Cryptanalysis of SASAS
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
Practical Cryptanalysis of ARMADILLO2
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Biclique Cryptanalysis of TWINE
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science