Billy Brumley
Cited by
Cited by
Remote timing attacks are still practical
BB Brumley, N Tuveri
European Symposium on Research in Computer Security, 355-371, 2011
New results on instruction cache attacks
O Acıiçmez, BB Brumley, P Grabher
International workshop on cryptographic hardware and embedded systems, 110-124, 2010
Port contention for fun and profit
AC Aldaya, BB Brumley, S ul Hassan, CP García, N Tuveri
2019 IEEE Symposium on Security and Privacy (SP), 870-887, 2019
Cache-timing template attacks
BB Brumley, RM Hakala
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
Amplifying side channels through performance degradation
T Allan, BB Brumley, K Falkner, J Van de Pol, Y Yarom
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Make sure DSA signing exponentiations really are constant-time
C Pereida García, BB Brumley, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Cache-timing attacks on RSA key generation
AC Aldaya, CP García, LMA Tapia, BB Brumley
Cryptology ePrint Archive, 2018
{Constant-Time} Callees with {Variable-Time} Callers
CP García, BB Brumley
26th USENIX Security Symposium (USENIX Security 17), 83-98, 2017
Practical realisation and elimination of an ECC-related software bug attack
BB Brumley, M Barbosa, D Page, F Vercauteren
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
Conversion algorithms and implementations for Koblitz curve cryptography
BB Brumley, KU Jarvinen
IEEE Transactions on computers 59 (1), 81-92, 2009
Semi-deterministic digital signature generation
BB Brumley
US Patent 9,621,525, 2017
Consecutive S-box lookups: A Timing Attack on SNOW 3G
BB Brumley, RM Hakala, K Nyberg, S Sovio
Information and Communications Security: 12th International Conference …, 2010
Certified Side Channels
C Pereida García, N Tuveri, I Gridin, A Cabrera Aldaya, BB Brumley
arXiv e-prints, arXiv: 1909.01785, 2019
Side-channel analysis of SM2: A late-stage featurization case study
N Tuveri, S Hassan, CP García, BB Brumley
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
From A to Z: Projective coordinates leakage in the wild
AC Aldaya, CP García, BB Brumley
IACR Transactions on Cryptographic Hardware and Embedded Systems, 428-453, 2020
Efficient three-term simultaneous elliptic scalar multiplication with applications
BB Brumley
Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec 6, 105-116, 2006
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
AC Aldaya, BB Brumley
Cryptology ePrint Archive, 2020
{OpenSSLNTRU}: Faster post-quantum {TLS} key exchange
DJ Bernstein, BB Brumley, MS Chen, N Tuveri
31st USENIX Security Symposium (USENIX Security 22), 845-862, 2022
Countermeasures against side-channel attacks on cryptographic algorithms
X Guo, X Guo, BB Brumley
US Patent App. 14/171,558, 2015
Koblitz curves and integer equivalents of Frobenius expansions
BB Brumley, K Järvinen
Selected Areas in Cryptography: 14th International Workshop, SAC 2007 …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20