Billy Brumley
Billy Brumley
Tampere University
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Remote timing attacks are still practical
BB Brumley, N Tuveri
European Symposium on Research in Computer Security, 355-371, 2011
New results on instruction cache attacks
O Acıiçmez, BB Brumley, P Grabher
International Workshop on Cryptographic Hardware and Embedded Systems, 110-124, 2010
Cache-timing template attacks
BB Brumley, RM Hakala
International Conference on the Theory and Application of Cryptology and …, 2009
Port contention for fun and profit
AC Aldaya, BB Brumley, S ul Hassan, CP García, N Tuveri
2019 IEEE Symposium on Security and Privacy (SP), 870-887, 2019
Amplifying side channels through performance degradation
T Allan, BB Brumley, K Falkner, J Van de Pol, Y Yarom
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Make sure DSA signing exponentiations really are constant-time
C Pereida García, BB Brumley, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Constant-time callees with variable-time callers
CP García, BB Brumley
26th {USENIX} Security Symposium ({USENIX} Security 17), 83-98, 2017
Practical realisation and elimination of an ECC-related software bug attack
BB Brumley, M Barbosa, D Page, F Vercauteren
Cryptographers’ Track at the RSA Conference, 171-186, 2012
Conversion algorithms and implementations for Koblitz curve cryptography
BB Brumley, KU Jarvinen
IEEE Transactions on computers 59 (1), 81-92, 2009
Cache-timing attacks on RSA key generation
AC Aldaya, CP García, LMA Tapia, BB Brumley
IACR Transactions on Cryptographic Hardware and Embedded Systems, 213-242, 2019
Efficient three-term simultaneous elliptic scalar multiplication with applications
BB Brumley
Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec 6, 105-116, 2006
Consecutive S-box lookups: A Timing Attack on SNOW 3G
BB Brumley, RM Hakala, K Nyberg, S Sovio
International conference on information and communications security, 171-185, 2010
Side-channel analysis of SM2: A late-stage featurization case study
N Tuveri, S Hassan, CP García, BB Brumley
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
Koblitz curves and integer equivalents of Frobenius expansions
BB Brumley, K Järvinen
International Workshop on Selected Areas in Cryptography, 126-137, 2007
Faster software for fast endomorphisms
BB Brumley
International Workshop on Constructive Side-Channel Analysis and Secure …, 2015
Triggerflow: Regression testing by advanced execution path inspection
I Gridin, CP García, N Tuveri, BB Brumley
International Conference on Detection of Intrusions and Malware, and …, 2019
Whirlbob, the whirlpool based variant of STRIBOB
MJO Saarinen, BB Brumley
Nordic Conference on Secure IT Systems, 106-122, 2015
Cache storage attacks
BB Brumley
Cryptographers’ Track at the RSA Conference, 22-34, 2015
Fast point decompression for standard elliptic curves
BB Brumley, KU Järvinen
European Public Key Infrastructure Workshop, 134-149, 2008
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
AC Aldaya, BB Brumley
IACR Transactions on Cryptographic Hardware and Embedded Systems, 196-221, 2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20