What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Billy Bob Brumley
Google Scholar
ORCID:
0000-0001-9160-0463
26
publications in security and cryptology related venues
Year
Venue
Title
2022
conf/uss
OpenSSLNTRU: Faster post-quantum TLS key exchange.
Daniel J. Bernstein
Billy Bob Brumley
Ming-Shing Chen
Nicola Tuveri
2022
conf/uss
HyperDegrade: From GHz to MHz Effective CPU Frequencies.
Alejandro Cabrera Aldaya
Billy Bob Brumley
2021
journals/tches
Online Template Attacks: Revisited.
Alejandro Cabrera Aldaya
Billy Bob Brumley
2021
conf/asiacrypt
A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks.
Vladimir Sedlacek
Jesús-Javier Chi-Domínguez
Jan Jancar
Billy Bob Brumley
2021
conf/cans
Attestation Waves: Platform Trust via Remote Power Analysis.
Ignacio M. Delgado-Lozano
Macarena C. Martínez-Rodríguez
Alexandros Bakas
Billy Bob Brumley
Antonis Michalas
2020
journals/tches
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA.
Alejandro Cabrera Aldaya
Billy Bob Brumley
2020
journals/tches
From A to Z: Projective coordinates leakage in the wild.
Alejandro Cabrera Aldaya
Cesar Pereida García
Billy Bob Brumley
2020
conf/ccs
Déjà Vu: Side-Channel Analysis of Mozilla's NSS.
Sohaib ul Hassan
Iaroslav Gridin
Ignacio M. Delgado-Lozano
Cesar Pereida García
Jesús-Javier Chi-Domínguez
Alejandro Cabrera Aldaya
Billy Bob Brumley
2020
conf/uss
Certified Side Channels.
Cesar Pereida García
Sohaib ul Hassan
Nicola Tuveri
Iaroslav Gridin
Alejandro Cabrera Aldaya
Billy Bob Brumley
2020
conf/acsac
Set It and Forget It! Turnkey ECC for Instant Integration.
Dmitry Belyavsky
Billy Bob Brumley
Jesús-Javier Chi-Domínguez
Luis Rivera-Zamarripa
Igor Ustinov
2019
journals/tches
Cache-Timing Attacks on RSA Key Generation.
Alejandro Cabrera Aldaya
Cesar Pereida García
Luis Manuel Alvarez Tapia
Billy Bob Brumley
2019
conf/latincrypt
Batch Binary Weierstrass.
Billy Bob Brumley
Sohaib ul Hassan
Alex Shaindlin
Nicola Tuveri
Kide Vuojärvi
2019
conf/sp
Port Contention for Fun and Profit.
Alejandro Cabrera Aldaya
Billy Bob Brumley
Sohaib ul Hassan
Cesar Pereida García
Nicola Tuveri
2018
conf/acsac
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study.
Nicola Tuveri
Sohaib ul Hassan
Cesar Pereida García
Billy Bob Brumley
2017
conf/uss
Constant-Time Callees with Variable-Time Callers.
Cesar Pereida García
Billy Bob Brumley
2016
conf/ccs
"Make Sure DSA Signing Exponentiations Really are Constant-Time".
Cesar Pereida García
Billy Bob Brumley
Yuval Yarom
2016
conf/acsac
Amplifying side channels through performance degradation.
Thomas Allan
Billy Bob Brumley
Katrina Falkner
Joop van de Pol
Yuval Yarom
2015
conf/ctrsa
Cache Storage Attacks.
Billy Bob Brumley
2012
conf/ctrsa
Practical Realisation and Elimination of an ECC-Related Software Bug Attack.
Billy Bob Brumley
Manuel Barbosa
Dan Page
Frederik Vercauteren
2011
conf/esorics
Remote Timing Attacks Are Still Practical.
Billy Bob Brumley
Nicola Tuveri
2010
conf/ches
New Results on Instruction Cache Attacks.
Onur Aciiçmez
Billy Bob Brumley
Philipp Grabher
2010
conf/icics
Consecutive S-box Lookups: A Timing Attack on SNOW 3G.
Billy Bob Brumley
Risto M. Hakala
Kaisa Nyberg
Sampo Sovio
2009
conf/asiacrypt
Cache-Timing Template Attacks.
Billy Bob Brumley
Risto M. Hakala
2009
conf/africacrypt
On Modular Decomposition of Integers.
Billy Bob Brumley
Kaisa Nyberg
2007
conf/sacrypt
Koblitz Curves and Integer Equivalents of Frobenius Expansions.
Billy Bob Brumley
Kimmo U. Järvinen
2006
conf/icics
Integers (Short Paper).
Billy Bob Brumley
Coauthors
Alejandro Cabrera Aldaya
(8)
Alex Shaindlin
(1)
Alexandros Bakas
(1)
Antonis Michalas
(1)
Billy Bob Brumley
(26)
Cesar Pereida García
(8)
Dan Page
(1)
Daniel J. Bernstein
(1)
Dmitry Belyavsky
(1)
Frederik Vercauteren
(1)
Iaroslav Gridin
(2)
Ignacio M. Delgado-Lozano
(2)
Igor Ustinov
(1)
Jan Jancar
(1)
Jesús-Javier Chi-Domínguez
(3)
Joop van de Pol
(1)
Kaisa Nyberg
(2)
Katrina Falkner
(1)
Kide Vuojärvi
(1)
Kimmo U. Järvinen
(1)
Luis Manuel Alvarez Tapia
(1)
Luis Rivera-Zamarripa
(1)
Macarena C. Martínez-Rodríguez
(1)
Manuel Barbosa
(1)
Ming-Shing Chen
(1)
Nicola Tuveri
(6)
Onur Aciiçmez
(1)
Philipp Grabher
(1)
Risto M. Hakala
(2)
Sampo Sovio
(1)
Sohaib ul Hassan
(5)
Thomas Allan
(1)
Vladimir Sedlacek
(1)
Yuval Yarom
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to