1. Scott Contini and Igor E. Shparlinski, On Stern's attack against secret truncated linear congruential generators, Information Security and Privacy, Lecture Notes in Computer Science, vol. 3574, Springer Berlin / Heidelberg, 2005, pp. 52–60.
  2. Scott Contini and Yiqun Lisa Yin, Improved cryptanalysis of securID, Preprint (2003), 25 pages.[link]
  3. Scott Contini and Yiqun Lisa Yin, Fast software-based attacks on SecurID, in Fast Software Encryption, Lecture Notes in Computer Science, vol. 3017, Springer-Verlag, Berlin, 2004, pp. 454–471.
  4. Krystian Matusiewicz, Scott Contini, and Josef Pieprzyk, Weaknesses of the fork-256 compression function, IACR ePrint 2006/317 (2006), 1–21.[link]