Follow
Billy Brumley
Billy Brumley
Tampere University
Verified email at tuni.fi
Title
Cited by
Cited by
Year
Remote timing attacks are still practical
BB Brumley, N Tuveri
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
3022011
New results on instruction cache attacks
O Acıiçmez, BB Brumley, P Grabher
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
2412010
Cache-timing template attacks
BB Brumley, RM Hakala
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
1952009
Port contention for fun and profit
AC Aldaya, BB Brumley, S ul Hassan, CP García, N Tuveri
2019 IEEE Symposium on Security and Privacy (SP), 870-887, 2019
1622019
Amplifying side channels through performance degradation
T Allan, BB Brumley, K Falkner, J Van de Pol, Y Yarom
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
1042016
Make sure DSA signing exponentiations really are constant-time
C Pereida García, BB Brumley, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
762016
Constant-time callees with variable-time callers
CP García, BB Brumley
Cryptology ePrint Archive, 2016
582016
Cache-timing attacks on RSA key generation
AC Aldaya, CP García, LMA Tapia, BB Brumley
Cryptology ePrint Archive, 2018
492018
Practical realisation and elimination of an ECC-related software bug attack
BB Brumley, M Barbosa, D Page, F Vercauteren
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
492012
Conversion algorithms and implementations for Koblitz curve cryptography
BB Brumley, KU Jarvinen
IEEE Transactions on computers 59 (1), 81-92, 2009
422009
Semi-deterministic digital signature generation
BB Brumley
US Patent 9,621,525, 2017
232017
Consecutive S-box lookups: A Timing Attack on SNOW 3G
BB Brumley, RM Hakala, K Nyberg, S Sovio
Information and Communications Security: 12th International Conference …, 2010
232010
Side-channel analysis of SM2: A late-stage featurization case study
N Tuveri, S Hassan, CP García, BB Brumley
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
222018
Efficient three-term simultaneous elliptic scalar multiplication with applications
BB Brumley
Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec 6, 105-116, 2006
222006
Koblitz curves and integer equivalents of Frobenius expansions
BB Brumley, K Järvinen
Selected Areas in Cryptography: 14th International Workshop, SAC 2007 …, 2007
172007
WHIRLBOB, the Whirlpool Based Variant of STRIBOB: Lighter, Faster, and Constant Time
MJO Saarinen, BB Brumley
Secure IT Systems: 20th Nordic Conference, NordSec 2015, Stockholm, Sweden …, 2015
16*2015
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
AC Aldaya, BB Brumley
Cryptology ePrint Archive, 2020
152020
Faster software for fast endomorphisms
BB Brumley
Constructive Side-Channel Analysis and Secure Design: 6th International …, 2015
152015
Countermeasures against side-channel attacks on cryptographic algorithms
X Guo, X Guo, BB Brumley
US Patent App. 14/171,558, 2015
142015
From A to Z: Projective coordinates leakage in the wild
AC Aldaya, CP García, BB Brumley
IACR Transactions on Cryptographic Hardware and Embedded Systems, 428-453, 2020
132020
The system can't perform the operation now. Try again later.
Articles 1–20