Publications by Billy Bob Brumley

2012

20Billy Bob Brumley. Secure and fast implementations of two involution ciphers. In Tuomas Aura, Kimmo Järvinen, and Kaisa Nyberg, editors, Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers, volume 7127 of Lecture Notes in Computer Science, pages 269–282. Springer, 2012.
Info
See dx.doi.org ...
19Billy Bob Brumley, Manuel Barbosa, Dan Page, and Frederik Vercauteren. Practical realisation and elimination of an ECC-related software bug attack. In Orr Dunkelman, editor, Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings, volume 7178 of Lecture Notes in Computer Science, pages 171–186. Springer, 2012.
Info
See dx.doi.org ...

2011

18Billy Bob Brumley and Nicola Tuveri. Cache-timing attacks and shared contexts. In 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2011, Darmstadt, Germany, 24-25 February 2011. Proceedings, pages 233–242, 2011.
Info
See cosade2011.cased.de ...
17Billy Bob Brumley and Dan Page. Bit-sliced binary normal basis multiplication. In Elisardo Antelo, David Hough, and Paolo Ienne, editors, 20th IEEE Symposium on Computer Arithmetic, ARITH 2011, Tübingen, Germany, 25-27 July 2011, pages 205–212. IEEE Computer Society, 2011.
Info
See dx.doi.org ...
16Billy Bob Brumley and Nicola Tuveri. Remote timing attacks are still practical. In Vijay Atluri and Claudia Díaz, editors, Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, volume 6879 of Lecture Notes in Computer Science, pages 355–371. Springer, 2011.
Info
See dx.doi.org ...
15Billy Bob Brumley. Covert Timing Channels, Caching, and Cryptography. Doctoral dissertation, Aalto University School of Science, 2011.
Info
See lib.tkk.fi ...

2010

14Billy Bob Brumley and Kimmo U. Järvinen. Conversion algorithms and implementations for Koblitz curve cryptography. IEEE Trans. Computers, 59(1):81–92, 2010.
Info
See doi.ieeecomputersociety.org ...
13Onur Aciicmez, Billy Bob Brumley, and Philipp Grabher. New results on instruction cache attacks. In Stefan Mangard and Francois-Xavier Standaert, editors, Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings, volume 6225 of Lecture Notes in Computer Science, pages 110–124. Springer, 2010.
Info
See dx.doi.org ...
12Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, and Sampo Sovio. Consecutive S-box lookups: a timing attack on SNOW 3G. In Miguel Soriano, Sihan Qing, and Javier López, editors, Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings, volume 6476 of Lecture Notes in Computer Science, pages 171–185. Springer, 2010.
Info
See dx.doi.org ...

2009

11Billy Bob Brumley and Kaisa Nyberg. On modular decomposition of integers. In Bart Preneel, editor, Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, volume 5580 of Lecture Notes in Computer Science, pages 386–402. Springer, 2009.
Info
See dx.doi.org ...
10Billy Bob Brumley and Risto M. Hakala. Cache-timing template attacks. In Mitsuru Matsui, editor, Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, volume 5912 of Lecture Notes in Computer Science, pages 667–684. Springer, 2009.
Info
See dx.doi.org ...
9Billy Bob Brumley. Studies on elliptic curve cryptography engineering. Licentiate's thesis, Helsinki University of Technology, Department of Information and Computer Science, Espoo, Finland, 2009.
Info

2008

8Billy Bob Brumley. Implementing cryptography for Packet Level Authentication. In Hamid R. Arabnia and Selim Aissi, editors, Proceedings of the 2008 International Conference on Security & Management, SAM 2008, Las Vegas, Nevada, USA, July 14-17, 2008, pages 475–480. CSREA Press, 2008.
PDF (182 kB)
Info
7Billy Bob Brumley and Kimmo U. Järvinen. Fast point decompression for standard elliptic curves. In Stig Fr. Mjølsnes, Sjouke Mauw, and Sokratis K. Katsikas, editors, Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, volume 5057 of Lecture Notes in Computer Science, pages 134–149. Springer, 2008.
Info
See dx.doi.org ...
6Billy Bob Brumley and Jukka Valkonen. Attacks on Message Stream Encryption. In Hanne Riis Nielson and Christian W. Probst, editors, 13th Nordic Conference on Secure IT Systems, NordSec 2008, Lyngby, Denmark, 9-10 October 2008. Proceedings, pages 163–173, 2008.
PDF (192 kB)
Info

2007

5Billy Bob Brumley and Kaisa Nyberg. Differential properties of elliptic curves and blind signatures. In Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, and René Peralta, editors, Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, volume 4779 of Lecture Notes in Computer Science, pages 376–389. Springer, 2007.
Info
See dx.doi.org ...
4Billy Bob Brumley and Kimmo U. Järvinen. Koblitz curves and integer equivalents of Frobenius expansions. In Carlisle M. Adams, Ali Miri, and Michael J. Wiener, editors, Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, volume 4876 of Lecture Notes in Computer Science, pages 126–137. Springer, 2007.
Info
See dx.doi.org ...

2006

3Billy Bob Brumley. Efficient three-term simultaneous elliptic scalar multiplication with applications. In Viiveke Fåk, editor, 11th Nordic Conference on Secure IT Systems, NordSec 2006, Linköping, Sweden, 19-20 October 2006. Proceedings, pages 105–116, 2006.
PDF (187 kB)
Info
2Billy Bob Brumley. Left-to-right signed-bit -adic representations of integers (short paper). In Peng Ning, Sihan Qing, and Ninghui Li, editors, Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, volume 4307 of Lecture Notes in Computer Science, pages 469–478. Springer, 2006.
Info
See dx.doi.org ...
1Billy Bob Brumley. Efficient elliptic curve algorithms for compact digital signatures. Master's thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Laboratory for Theoretical Computer Science, 2006.
Info
See research.ics.tkk.fi ...