2012 |
20 | Billy Bob Brumley. Secure and fast implementations of two involution ciphers. In Tuomas Aura, Kimmo Järvinen, and Kaisa Nyberg, editors, Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers, volume 7127 of Lecture Notes in Computer Science, pages 269–282. Springer, 2012. |
|
19 | Billy Bob Brumley, Manuel Barbosa, Dan Page, and Frederik Vercauteren. Practical realisation and elimination of an ECC-related software bug attack. In Orr Dunkelman, editor, Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings, volume 7178 of Lecture Notes in Computer Science, pages 171–186. Springer, 2012. |
|
2011 |
18 | Billy Bob Brumley and Nicola Tuveri. Cache-timing attacks and shared contexts. In 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2011, Darmstadt, Germany, 24-25 February 2011. Proceedings, pages 233–242, 2011. |
|
17 | Billy Bob Brumley and Dan Page. Bit-sliced binary normal basis multiplication. In Elisardo Antelo, David Hough, and Paolo Ienne, editors, 20th IEEE Symposium on Computer Arithmetic, ARITH 2011, Tübingen, Germany, 25-27 July 2011, pages 205–212. IEEE Computer Society, 2011. |
|
16 | Billy Bob Brumley and Nicola Tuveri. Remote timing attacks are still practical. In Vijay Atluri and Claudia Díaz, editors, Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, volume 6879 of Lecture Notes in Computer Science, pages 355–371. Springer, 2011. |
|
15 | Billy Bob Brumley. Covert Timing Channels, Caching, and Cryptography. Doctoral dissertation, Aalto University School of Science, 2011. |
|
2010 |
14 | Billy Bob Brumley and Kimmo U. Järvinen. Conversion algorithms and implementations for Koblitz curve cryptography. IEEE Trans. Computers, 59(1):81–92, 2010. |
|
13 | Onur Aciicmez, Billy Bob Brumley, and Philipp Grabher. New results on instruction cache attacks. In Stefan Mangard and Francois-Xavier Standaert, editors, Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings, volume 6225 of Lecture Notes in Computer Science, pages 110–124. Springer, 2010. |
|
12 | Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, and Sampo Sovio. Consecutive S-box lookups: a timing attack on SNOW 3G. In Miguel Soriano, Sihan Qing, and Javier López, editors, Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings, volume 6476 of Lecture Notes in Computer Science, pages 171–185. Springer, 2010. |
|
2009 |
11 | Billy Bob Brumley and Kaisa Nyberg. On modular decomposition of integers. In Bart Preneel, editor, Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, volume 5580 of Lecture Notes in Computer Science, pages 386–402. Springer, 2009. |
|
10 | Billy Bob Brumley and Risto M. Hakala. Cache-timing template attacks. In Mitsuru Matsui, editor, Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, volume 5912 of Lecture Notes in Computer Science, pages 667–684. Springer, 2009. |
|
9 | Billy Bob Brumley. Studies on elliptic curve cryptography engineering. Licentiate's thesis, Helsinki University of Technology, Department of Information and Computer Science, Espoo, Finland, 2009. |
|
2008 |
8 | Billy Bob Brumley. Implementing cryptography for Packet Level Authentication. In Hamid R. Arabnia and Selim Aissi, editors, Proceedings of the 2008 International Conference on Security & Management, SAM 2008, Las Vegas, Nevada, USA, July 14-17, 2008, pages 475–480. CSREA Press, 2008. |
|
7 | Billy Bob Brumley and Kimmo U. Järvinen. Fast point decompression for standard elliptic curves. In Stig Fr. Mjølsnes, Sjouke Mauw, and Sokratis K. Katsikas, editors, Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, volume 5057 of Lecture Notes in Computer Science, pages 134–149. Springer, 2008. |
|
6 | Billy Bob Brumley and Jukka Valkonen. Attacks on Message Stream Encryption. In Hanne Riis Nielson and Christian W. Probst, editors, 13th Nordic Conference on Secure IT Systems, NordSec 2008, Lyngby, Denmark, 9-10 October 2008. Proceedings, pages 163–173, 2008. |
|
2007 |
5 | Billy Bob Brumley and Kaisa Nyberg. Differential properties of elliptic curves and blind signatures. In Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, and René Peralta, editors, Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, volume 4779 of Lecture Notes in Computer Science, pages 376–389. Springer, 2007. |
|
4 | Billy Bob Brumley and Kimmo U. Järvinen. Koblitz curves and integer equivalents of Frobenius expansions. In Carlisle M. Adams, Ali Miri, and Michael J. Wiener, editors, Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, volume 4876 of Lecture Notes in Computer Science, pages 126–137. Springer, 2007. |
|
2006 |
3 | Billy Bob Brumley. Efficient three-term simultaneous elliptic scalar multiplication with applications. In Viiveke Fåk, editor, 11th Nordic Conference on Secure IT Systems, NordSec 2006, Linköping, Sweden, 19-20 October 2006. Proceedings, pages 105–116, 2006. |
|
2 | Billy Bob Brumley. Left-to-right signed-bit -adic representations of integers (short paper). In Peng Ning, Sihan Qing, and Ninghui Li, editors, Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, volume 4307 of Lecture Notes in Computer Science, pages 469–478. Springer, 2006. |
|
1 | Billy Bob Brumley. Efficient elliptic curve algorithms for compact digital signatures. Master's thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Laboratory for Theoretical Computer Science, 2006. |
|