Seguir
Billy Brumley
Título
Citado por
Citado por
Año
Remote timing attacks are still practical
BB Brumley, N Tuveri
European Symposium on Research in Computer Security, 355-371, 2011
3482011
New results on instruction cache attacks
O Acıiçmez, BB Brumley, P Grabher
International workshop on cryptographic hardware and embedded systems, 110-124, 2010
2712010
Port contention for fun and profit
AC Aldaya, BB Brumley, S ul Hassan, CP García, N Tuveri
2019 IEEE Symposium on Security and Privacy (SP), 870-887, 2019
2472019
Cache-timing template attacks
BB Brumley, RM Hakala
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
2132009
Amplifying side channels through performance degradation
T Allan, BB Brumley, K Falkner, J Van de Pol, Y Yarom
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
1262016
Make sure DSA signing exponentiations really are constant-time
C Pereida García, BB Brumley, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
852016
Cache-timing attacks on RSA key generation
AC Aldaya, CP García, LMA Tapia, BB Brumley
Cryptology ePrint Archive, 2018
722018
{Constant-Time} Callees with {Variable-Time} Callers
CP García, BB Brumley
26th USENIX Security Symposium (USENIX Security 17), 83-98, 2017
682017
Practical realisation and elimination of an ECC-related software bug attack
BB Brumley, M Barbosa, D Page, F Vercauteren
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
512012
Conversion algorithms and implementations for Koblitz curve cryptography
BB Brumley, KU Jarvinen
IEEE Transactions on computers 59 (1), 81-92, 2009
432009
Semi-deterministic digital signature generation
BB Brumley
US Patent 9,621,525, 2017
322017
Consecutive S-box lookups: A Timing Attack on SNOW 3G
BB Brumley, RM Hakala, K Nyberg, S Sovio
Information and Communications Security: 12th International Conference …, 2010
302010
Side-channel analysis of SM2: A late-stage featurization case study
N Tuveri, S Hassan, CP García, BB Brumley
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
242018
Certified Side Channels
C Pereida García, N Tuveri, I Gridin, A Cabrera Aldaya, BB Brumley
arXiv e-prints, arXiv: 1909.01785, 2019
23*2019
From A to Z: Projective coordinates leakage in the wild
AC Aldaya, CP García, BB Brumley
IACR Transactions on Cryptographic Hardware and Embedded Systems, 428-453, 2020
222020
Efficient three-term simultaneous elliptic scalar multiplication with applications
BB Brumley
Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec 6, 105-116, 2006
222006
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
AC Aldaya, BB Brumley
Cryptology ePrint Archive, 2020
212020
{OpenSSLNTRU}: Faster post-quantum {TLS} key exchange
DJ Bernstein, BB Brumley, MS Chen, N Tuveri
31st USENIX Security Symposium (USENIX Security 22), 845-862, 2022
182022
Koblitz curves and integer equivalents of Frobenius expansions
BB Brumley, K Järvinen
Selected Areas in Cryptography: 14th International Workshop, SAC 2007 …, 2007
182007
Method for protecting the integrity of a fixed-length data structure
AW Dent, CE Acar, BB Brumley
US Patent 9,298,947, 2016
172016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20