Billy Brumley
Billy Brumley
Tampere University
Verified email at tuni.fi
Title
Cited by
Cited by
Year
Remote timing attacks are still practical
BB Brumley, N Tuveri
European Symposium on Research in Computer Security, 355-371, 2011
2412011
New results on instruction cache attacks
O Acıiçmez, BB Brumley, P Grabher
International Workshop on Cryptographic Hardware and Embedded Systems, 110-124, 2010
2032010
Cache-timing template attacks
BB Brumley, RM Hakala
International Conference on the Theory and Application of Cryptology and …, 2009
1612009
Amplifying side channels through performance degradation
T Allan, BB Brumley, K Falkner, J Van de Pol, Y Yarom
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
772016
Port contention for fun and profit
AC Aldaya, BB Brumley, S ul Hassan, CP García, N Tuveri
2019 IEEE Symposium on Security and Privacy (SP), 870-887, 2019
662019
Make sure DSA signing exponentiations really are constant-time
C Pereida García, BB Brumley, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
572016
Constant-time callees with variable-time callers
CP García, BB Brumley
26th {USENIX} Security Symposium ({USENIX} Security 17), 83-98, 2017
432017
Practical realisation and elimination of an ECC-related software bug attack
BB Brumley, M Barbosa, D Page, F Vercauteren
Cryptographers’ Track at the RSA Conference, 171-186, 2012
402012
Conversion algorithms and implementations for Koblitz curve cryptography
BB Brumley, KU Jarvinen
IEEE Transactions on computers 59 (1), 81-92, 2009
392009
Cache-timing attacks on RSA key generation
AC Aldaya, CP García, LMA Tapia, BB Brumley
IACR Transactions on Cryptographic Hardware and Embedded Systems, 213-242, 2019
272019
Efficient three-term simultaneous elliptic scalar multiplication with applications
BB Brumley
Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec 6, 105-116, 2006
202006
Consecutive S-box lookups: A Timing Attack on SNOW 3G
BB Brumley, RM Hakala, K Nyberg, S Sovio
International conference on information and communications security, 171-185, 2010
182010
Side-channel analysis of SM2: A late-stage featurization case study
N Tuveri, S Hassan, CP García, BB Brumley
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
152018
Koblitz curves and integer equivalents of Frobenius expansions
BB Brumley, K Järvinen
International Workshop on Selected Areas in Cryptography, 126-137, 2007
152007
Whirlbob, the whirlpool based variant of STRIBOB
MJO Saarinen, BB Brumley
Nordic Conference on Secure IT Systems, 106-122, 2015
13*2015
Faster software for fast endomorphisms
BB Brumley
International Workshop on Constructive Side-Channel Analysis and Secure …, 2015
132015
Cache storage attacks
BB Brumley
Cryptographers’ Track at the RSA Conference, 22-34, 2015
122015
Fast point decompression for standard elliptic curves
BB Brumley, KU Järvinen
European Public Key Infrastructure Workshop, 134-149, 2008
102008
Triggerflow: Regression testing by advanced execution path inspection
I Gridin, CP García, N Tuveri, BB Brumley
International Conference on Detection of Intrusions and Malware, and …, 2019
92019
Attacks on message stream encryption
BB Brumley, J Valkonen
Proceedings of the 13th Nordic Workshop on Secure IT Systems, 163-173, 2008
92008
The system can't perform the operation now. Try again later.
Articles 1–20