Billy Brumley
Billy Brumley
Tampere University
Verified email at
Cited by
Cited by
Remote timing attacks are still practical
BB Brumley, N Tuveri
European Symposium on Research in Computer Security, 355-371, 2011
New results on instruction cache attacks
O Acıiçmez, BB Brumley, P Grabher
International workshop on cryptographic hardware and embedded systems, 110-124, 2010
Cache-timing template attacks
BB Brumley, RM Hakala
International Conference on the Theory and Application of Cryptology and …, 2009
Port contention for fun and profit
AC Aldaya, BB Brumley, S ul Hassan, CP García, N Tuveri
2019 IEEE Symposium on Security and Privacy (SP), 870-887, 2019
Amplifying side channels through performance degradation
T Allan, BB Brumley, K Falkner, J Van de Pol, Y Yarom
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Make sure DSA signing exponentiations really are constant-time
C Pereida García, BB Brumley, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
{Constant-Time} Callees with {Variable-Time} Callers
CP García, BB Brumley
26th USENIX Security Symposium (USENIX Security 17), 83-98, 2017
Practical realisation and elimination of an ECC-related software bug attack
BB Brumley, M Barbosa, D Page, F Vercauteren
Cryptographers’ Track at the RSA Conference, 171-186, 2012
Cache-timing attacks on RSA key generation
AC Aldaya, CP García, LMA Tapia, BB Brumley
Cryptology ePrint Archive, 2018
Conversion algorithms and implementations for Koblitz curve cryptography
BB Brumley, KU Jarvinen
IEEE Transactions on computers 59 (1), 81-92, 2009
Efficient three-term simultaneous elliptic scalar multiplication with applications
BB Brumley
Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec 6, 105-116, 2006
Side-channel analysis of SM2: A late-stage featurization case study
N Tuveri, S Hassan, CP García, BB Brumley
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
Consecutive S-box lookups: A Timing Attack on SNOW 3G
BB Brumley, RM Hakala, K Nyberg, S Sovio
International conference on information and communications security, 171-185, 2010
Semi-deterministic digital signature generation
BB Brumley
US Patent 9,621,525, 2017
Koblitz curves and integer equivalents of Frobenius expansions
BB Brumley, K Järvinen
International Workshop on Selected Areas in Cryptography, 126-137, 2007
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
AC Aldaya, BB Brumley
Cryptology ePrint Archive, 2020
Faster software for fast endomorphisms
BB Brumley
International Workshop on Constructive Side-Channel Analysis and Secure …, 2015
Whirlbob, the whirlpool based variant of STRIBOB
MJO Saarinen, BB Brumley
Nordic Conference on Secure IT Systems, 106-122, 2015
Cache storage attacks
BB Brumley
Cryptographers’ Track at the RSA Conference, 22-34, 2015
Certified Side Channels
C Pereida García, N Tuveri, I Gridin, A Cabrera Aldaya, BB Brumley
arXiv e-prints, arXiv: 1909.01785, 2019
The system can't perform the operation now. Try again later.
Articles 1–20