Follow
Billy Brumley
Billy Brumley
Tampere University
Verified email at tuni.fi
Title
Cited by
Cited by
Year
Remote timing attacks are still practical
BB Brumley, N Tuveri
European Symposium on Research in Computer Security, 355-371, 2011
2932011
New results on instruction cache attacks
O Acıiçmez, BB Brumley, P Grabher
International workshop on cryptographic hardware and embedded systems, 110-124, 2010
2392010
Cache-timing template attacks
BB Brumley, RM Hakala
International Conference on the Theory and Application of Cryptology and …, 2009
1872009
Port contention for fun and profit
AC Aldaya, BB Brumley, S ul Hassan, CP García, N Tuveri
2019 IEEE Symposium on Security and Privacy (SP), 870-887, 2019
1452019
Amplifying side channels through performance degradation
T Allan, BB Brumley, K Falkner, J Van de Pol, Y Yarom
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
1012016
Make sure DSA signing exponentiations really are constant-time
C Pereida García, BB Brumley, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
722016
{Constant-Time} Callees with {Variable-Time} Callers
CP García, BB Brumley
26th USENIX Security Symposium (USENIX Security 17), 83-98, 2017
582017
Practical realisation and elimination of an ECC-related software bug attack
BB Brumley, M Barbosa, D Page, F Vercauteren
Cryptographers’ Track at the RSA Conference, 171-186, 2012
472012
Cache-timing attacks on RSA key generation
AC Aldaya, CP García, LMA Tapia, BB Brumley
Cryptology ePrint Archive, 2018
432018
Conversion algorithms and implementations for Koblitz curve cryptography
BB Brumley, KU Jarvinen
IEEE Transactions on computers 59 (1), 81-92, 2009
402009
Efficient three-term simultaneous elliptic scalar multiplication with applications
BB Brumley
Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec 6, 105-116, 2006
222006
Side-channel analysis of SM2: A late-stage featurization case study
N Tuveri, S Hassan, CP García, BB Brumley
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
212018
Consecutive S-box lookups: A Timing Attack on SNOW 3G
BB Brumley, RM Hakala, K Nyberg, S Sovio
International conference on information and communications security, 171-185, 2010
212010
Semi-deterministic digital signature generation
BB Brumley
US Patent 9,621,525, 2017
202017
Koblitz curves and integer equivalents of Frobenius expansions
BB Brumley, K Järvinen
International Workshop on Selected Areas in Cryptography, 126-137, 2007
172007
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
AC Aldaya, BB Brumley
Cryptology ePrint Archive, 2020
152020
Faster software for fast endomorphisms
BB Brumley
International Workshop on Constructive Side-Channel Analysis and Secure …, 2015
152015
Whirlbob, the whirlpool based variant of STRIBOB
MJO Saarinen, BB Brumley
Nordic Conference on Secure IT Systems, 106-122, 2015
13*2015
Cache storage attacks
BB Brumley
Cryptographers’ Track at the RSA Conference, 22-34, 2015
132015
Certified Side Channels
C Pereida García, N Tuveri, I Gridin, A Cabrera Aldaya, BB Brumley
arXiv e-prints, arXiv: 1909.01785, 2019
12*2019
The system can't perform the operation now. Try again later.
Articles 1–20