Billy Brumley
Billy Brumley
Tampere University
Bestätigte E-Mail-Adresse bei tuni.fi
Titel
Zitiert von
Zitiert von
Jahr
Remote timing attacks are still practical
BB Brumley, N Tuveri
European Symposium on Research in Computer Security, 355-371, 2011
2622011
New results on instruction cache attacks
O Acıiçmez, BB Brumley, P Grabher
International Workshop on Cryptographic Hardware and Embedded Systems, 110-124, 2010
2152010
Cache-timing template attacks
BB Brumley, RM Hakala
International Conference on the Theory and Application of Cryptology and …, 2009
1702009
Port contention for fun and profit
AC Aldaya, BB Brumley, S ul Hassan, CP García, N Tuveri
2019 IEEE Symposium on Security and Privacy (SP), 870-887, 2019
932019
Amplifying side channels through performance degradation
T Allan, BB Brumley, K Falkner, J Van de Pol, Y Yarom
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
862016
Make sure DSA signing exponentiations really are constant-time
C Pereida García, BB Brumley, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
632016
Constant-time callees with variable-time callers
CP García, BB Brumley
26th {USENIX} Security Symposium ({USENIX} Security 17), 83-98, 2017
502017
Practical realisation and elimination of an ECC-related software bug attack
BB Brumley, M Barbosa, D Page, F Vercauteren
Cryptographers’ Track at the RSA Conference, 171-186, 2012
462012
Conversion algorithms and implementations for Koblitz curve cryptography
BB Brumley, KU Jarvinen
IEEE Transactions on computers 59 (1), 81-92, 2009
402009
Cache-timing attacks on RSA key generation
AC Aldaya, CP García, LMA Tapia, BB Brumley
IACR Transactions on Cryptographic Hardware and Embedded Systems, 213-242, 2019
362019
Efficient three-term simultaneous elliptic scalar multiplication with applications
BB Brumley
Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec 6, 105-116, 2006
202006
Consecutive S-box lookups: A Timing Attack on SNOW 3G
BB Brumley, RM Hakala, K Nyberg, S Sovio
International conference on information and communications security, 171-185, 2010
192010
Side-channel analysis of SM2: A late-stage featurization case study
N Tuveri, S Hassan, CP García, BB Brumley
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
182018
Koblitz curves and integer equivalents of Frobenius expansions
BB Brumley, K Järvinen
International Workshop on Selected Areas in Cryptography, 126-137, 2007
152007
Faster software for fast endomorphisms
BB Brumley
International Workshop on Constructive Side-Channel Analysis and Secure …, 2015
142015
Triggerflow: Regression testing by advanced execution path inspection
I Gridin, CP García, N Tuveri, BB Brumley
International Conference on Detection of Intrusions and Malware, and …, 2019
132019
Whirlbob, the whirlpool based variant of STRIBOB
MJO Saarinen, BB Brumley
Nordic Conference on Secure IT Systems, 106-122, 2015
13*2015
Cache storage attacks
BB Brumley
Cryptographers’ Track at the RSA Conference, 22-34, 2015
122015
Fast point decompression for standard elliptic curves
BB Brumley, KU Järvinen
European Public Key Infrastructure Workshop, 134-149, 2008
102008
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
AC Aldaya, BB Brumley
IACR Transactions on Cryptographic Hardware and Embedded Systems, 196-221, 2020
92020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20