default search action
Billy Bob Brumley
Person information
- affiliation: Rochester Institute of Technology, NY, USA
- affiliation (former): Tampere University, Finland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i30]Juha Nurmi, Arttu Paju, Billy Bob Brumley, Tegan Insoll, Anna K. Ovaska, Valeriia Soloveva, Nina Vaaranen-Valkonen, Mikko Aaltonen, David Arroyo:
Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy. CoRR abs/2404.14112 (2024) - 2023
- [c36]Arttu Paju, Muhammad Owais Javed, Juha Nurmi, Juha Savimäki, Brian McGillion, Billy Bob Brumley:
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications. ARES 2023: 34:1-34:15 - [c35]Juha Nurmi, Mikko S. Niemelä, Billy Bob Brumley:
Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access. ARES 2023: 108:1-108:12 - [i29]Arttu Paju, Muhammad Owais Javed, Juha Nurmi, Juha Savimäki, Brian McGillion, Billy Bob Brumley:
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications. CoRR abs/2306.15025 (2023) - [i28]Juha Nurmi, Mikko S. Niemelä, Billy Bob Brumley:
Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access. CoRR abs/2306.15726 (2023) - 2022
- [c34]Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri:
OpenSSLNTRU: Faster post-quantum TLS key exchange. USENIX Security Symposium 2022: 845-862 - [c33]Alejandro Cabrera Aldaya, Billy Bob Brumley:
HyperDegrade: From GHz to MHz Effective CPU Frequencies. USENIX Security Symposium 2022: 2801-2818 - 2021
- [j6]Alejandro Cabrera Aldaya, Billy Bob Brumley:
Online Template Attacks: Revisited. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 28-59 (2021) - [c32]Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley:
SoK: Remote Power Analysis. ARES 2021: 7:1-7:12 - [c31]Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley:
A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks. ASIACRYPT (1) 2021: 130-159 - [c30]Ignacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Bob Brumley, Antonis Michalas:
Attestation Waves: Platform Trust via Remote Power Analysis. CANS 2021: 460-482 - [e2]Nicola Tuveri, Antonis Michalas, Billy Bob Brumley:
Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings. Lecture Notes in Computer Science 13115, Springer 2021, ISBN 978-3-030-91624-4 [contents] - [i27]Alejandro Cabrera Aldaya, Billy Bob Brumley:
HyperDegrade: From GHz to MHz Effective CPU Frequencies. CoRR abs/2101.01077 (2021) - [i26]Ignacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Bob Brumley, Antonis Michalas:
Attestation Waves: Platform Trust via Remote Power Analysis. CoRR abs/2105.02435 (2021) - [i25]Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri:
OpenSSLNTRU: Faster post-quantum TLS key exchange. CoRR abs/2106.08759 (2021) - [i24]Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley:
SoK: Remote Power Analysis. IACR Cryptol. ePrint Arch. 2021: 15 (2021) - [i23]Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri:
OpenSSLNTRU: Faster post-quantum TLS key exchange. IACR Cryptol. ePrint Arch. 2021: 826 (2021) - [i22]Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley:
A formula for disaster: a unified approach to elliptic curve special-point-based attacks. IACR Cryptol. ePrint Arch. 2021: 1595 (2021) - 2020
- [j5]Alejandro Cabrera Aldaya, Billy Bob Brumley:
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 196-221 (2020) - [j4]Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley:
From A to Z: Projective coordinates leakage in the wild. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 428-453 (2020) - [c29]Dmitry Belyavsky, Billy Bob Brumley, Jesús-Javier Chi-Domínguez, Luis Rivera-Zamarripa, Igor Ustinov:
Set It and Forget It! Turnkey ECC for Instant Integration. ACSAC 2020: 760-771 - [c28]Sohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley:
Déjà Vu: Side-Channel Analysis of Mozilla's NSS. CCS 2020: 1887-1902 - [c27]Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley:
Certified Side Channels. USENIX Security Symposium 2020: 2021-2038 - [i21]Alejandro Cabrera Aldaya, Billy Bob Brumley:
Online Template Attacks: Revisited. CoRR abs/2007.05337 (2020) - [i20]Dmitry Belyavsky, Billy Bob Brumley, Jesús-Javier Chi-Domínguez, Luis Rivera-Zamarripa, Igor Ustinov:
Set It and Forget It! Turnkey ECC for Instant Integration. CoRR abs/2007.11481 (2020) - [i19]Sohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley:
Déjà Vu: Side-Channel Analysis of Mozilla's NSS. CoRR abs/2008.06004 (2020) - [i18]Alejandro Cabrera Aldaya, Billy Bob Brumley:
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA. IACR Cryptol. ePrint Arch. 2020: 55 (2020) - [i17]Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley:
From A to Z: Projective coordinates leakage in the wild. IACR Cryptol. ePrint Arch. 2020: 432 (2020)
2010 – 2019
- 2019
- [j3]Alejandro Cabrera Aldaya, Billy Bob Brumley, Alejandro Cabrera Sarmiento, Santiago Sánchez-Solano:
Memory Tampering Attack on Binary GCD Based Inversion Algorithms. Int. J. Parallel Program. 47(4): 621-640 (2019) - [j2]Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley:
Cache-Timing Attacks on RSA Key Generation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4): 213-242 (2019) - [c26]Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley:
Triggerflow: Regression Testing by Advanced Execution Path Inspection. DIMVA 2019: 330-350 - [c25]Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi:
Batch Binary Weierstrass. LATINCRYPT 2019: 364-384 - [c24]Nicola Tuveri, Billy Bob Brumley:
Start Your ENGINEs: Dynamically Loadable Contemporary Crypto. SecDev 2019: 4-19 - [c23]Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida García, Nicola Tuveri:
Port Contention for Fun and Profit. IEEE Symposium on Security and Privacy 2019: 870-887 - [i16]Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley:
Certified Side Channels. CoRR abs/1909.01785 (2019) - [i15]Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley:
Triggerflow: Regression Testing by Advanced Execution Path Inspection. IACR Cryptol. ePrint Arch. 2019: 366 (2019) - [i14]Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi:
Batch Binary Weierstrass. IACR Cryptol. ePrint Arch. 2019: 829 (2019) - 2018
- [c22]Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Bob Brumley:
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study. ACSAC 2018: 147-160 - [i13]Nicola Tuveri, Billy Bob Brumley:
Start your ENGINEs: dynamically loadable contemporary crypto. IACR Cryptol. ePrint Arch. 2018: 354 (2018) - [i12]Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley:
Cache-Timing Attacks on RSA Key Generation. IACR Cryptol. ePrint Arch. 2018: 367 (2018) - [i11]Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Bob Brumley:
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study. IACR Cryptol. ePrint Arch. 2018: 651 (2018) - [i10]Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida García, Nicola Tuveri:
Port Contention for Fun and Profit. IACR Cryptol. ePrint Arch. 2018: 1060 (2018) - 2017
- [c21]Cesar Pereida García, Billy Bob Brumley:
Constant-Time Callees with Variable-Time Callers. USENIX Security Symposium 2017: 83-98 - 2016
- [c20]Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom:
Amplifying side channels through performance degradation. ACSAC 2016: 422-435 - [c19]Cesar Pereida García, Billy Bob Brumley, Yuval Yarom:
"Make Sure DSA Signing Exponentiations Really are Constant-Time". CCS 2016: 1639-1650 - [e1]Billy Bob Brumley, Juha Röning:
Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings. Lecture Notes in Computer Science 10014, 2016, ISBN 978-3-319-47559-2 [contents] - [i9]Cesar Pereida García, Billy Bob Brumley, Yuval Yarom:
"Make Sure DSA Signing Exponentiations Really are Constant-Time". IACR Cryptol. ePrint Arch. 2016: 594 (2016) - [i8]Cesar Pereida García, Billy Bob Brumley:
Constant-Time Callees with Variable-Time Callers. IACR Cryptol. ePrint Arch. 2016: 1195 (2016) - 2015
- [c18]Billy Bob Brumley:
Faster Software for Fast Endomorphisms. COSADE 2015: 127-140 - [c17]Billy Bob Brumley:
Cache Storage Attacks. CT-RSA 2015: 22-34 - [c16]Billy Bob Brumley:
Faster Binary Curve Software: A Case Study. NordSec 2015: 91-105 - [c15]Markku-Juhani O. Saarinen, Billy Bob Brumley:
WHIRLBOB, the Whirlpool Based Variant of STRIBOB. NordSec 2015: 106-122 - [i7]Billy Bob Brumley:
Faster software for fast endomorphisms. IACR Cryptol. ePrint Arch. 2015: 36 (2015) - [i6]Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom:
Amplifying Side Channels Through Performance Degradation. IACR Cryptol. ePrint Arch. 2015: 1141 (2015) - 2014
- [i5]Markku-Juhani O. Saarinen, Billy Bob Brumley:
Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob. IACR Cryptol. ePrint Arch. 2014: 501 (2014) - 2013
- [c14]Roberto Avanzi, Billy Bob Brumley:
Faster 128-EEA3 and 128-EIA3 Software. ISC 2013: 199-208 - [i4]Roberto Avanzi, Billy Bob Brumley:
Faster 128-EEA3 and 128-EIA3 Software. IACR Cryptol. ePrint Arch. 2013: 428 (2013) - 2012
- [c13]Billy Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren:
Practical Realisation and Elimination of an ECC-Related Software Bug Attack. CT-RSA 2012: 171-186 - 2011
- [b1]Billy Bob Brumley:
Covert timing channels, caching, and cryptography. Aalto University, Espoo, Helsinki, Finland, 2011 - [c12]Billy Bob Brumley, Dan Page:
Bit-Sliced Binary Normal Basis Multiplication. IEEE Symposium on Computer Arithmetic 2011: 205-212 - [c11]Billy Bob Brumley, Nicola Tuveri:
Remote Timing Attacks Are Still Practical. ESORICS 2011: 355-371 - [i3]Billy Bob Brumley, Nicola Tuveri:
Remote Timing Attacks are Still Practical. IACR Cryptol. ePrint Arch. 2011: 232 (2011) - [i2]Billy Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren:
Practical realisation and elimination of an ECC-related software bug attack. IACR Cryptol. ePrint Arch. 2011: 633 (2011) - 2010
- [j1]Billy Bob Brumley, Kimmo U. Järvinen:
Conversion Algorithms and Implementations for Koblitz Curve Cryptography. IEEE Trans. Computers 59(1): 81-92 (2010) - [c10]Onur Aciiçmez, Billy Bob Brumley, Philipp Grabher:
New Results on Instruction Cache Attacks. CHES 2010: 110-124 - [c9]Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio:
Consecutive S-box Lookups: A Timing Attack on SNOW 3G. ICICS 2010: 171-185 - [c8]Billy Bob Brumley:
Secure and Fast Implementations of Two Involution Ciphers. NordSec 2010: 269-282 - [i1]Billy Bob Brumley:
Secure and Fast Implementations of Two Involution Ciphers. IACR Cryptol. ePrint Arch. 2010: 152 (2010)
2000 – 2009
- 2009
- [c7]Billy Bob Brumley, Kaisa Nyberg:
On Modular Decomposition of Integers. AFRICACRYPT 2009: 386-402 - [c6]Billy Bob Brumley, Risto M. Hakala:
Cache-Timing Template Attacks. ASIACRYPT 2009: 667-684 - 2008
- [c5]Billy Bob Brumley:
Implementing Cryptography for Packet Level Authentication. Security and Management 2008: 475-480 - [c4]Billy Bob Brumley, Kimmo U. Järvinen:
Fast Point Decompression for Standard Elliptic Curves. EuroPKI 2008: 134-149 - 2007
- [c3]Billy Bob Brumley, Kaisa Nyberg:
Differential Properties of Elliptic Curves and Blind Signatures. ISC 2007: 376-389 - [c2]Billy Bob Brumley, Kimmo U. Järvinen:
Koblitz Curves and Integer Equivalents of Frobenius Expansions. Selected Areas in Cryptography 2007: 126-137 - 2006
- [c1]Billy Bob Brumley:
Left-to-Right Signed-Bit tau-Adic Representations of n Integers (Short Paper). ICICS 2006: 469-478
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-27 20:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint