The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Billy Bob Brumley" ( http://dblp.L3S.de/Authors/Billy_Bob_Brumley )

URL (Homepage):  https://scholar.google.com/citations?user=7QX0AQYAAAAJ  Author page on DBLP  Author page in RDF  Community of Billy Bob Brumley in ASPL-2

Publication years (Num. hits)
2006-2011 (17) 2012-2016 (15) 2017-2019 (10)
Publication types (Num. hits)
article(17) inproceedings(23) phdthesis(1) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 21 occurrences of 13 keywords

Results
Found 43 publication records. Showing 42 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Alejandro Cabrera Aldaya, Billy Bob Brumley, Alejandro Cabrera Sarmiento, Santiago Sánchez-Solano Memory Tampering Attack on Binary GCD Based Inversion Algorithms. Search on Bibsonomy International Journal of Parallel Programming The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi Batch Binary Weierstrass. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2019 DBLP  BibTeX  RDF
1Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley Triggerflow: Regression Testing by Advanced Execution Path Inspection. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2019 DBLP  BibTeX  RDF
1Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley Triggerflow: Regression Testing by Advanced Execution Path Inspection. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley Cache-Timing Attacks on RSA Key Generation. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2018 DBLP  BibTeX  RDF
1Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Bob Brumley Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2018 DBLP  BibTeX  RDF
1Nicola Tuveri, Billy Bob Brumley Start your ENGINEs: dynamically loadable contemporary crypto. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2018 DBLP  BibTeX  RDF
1Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida García, Nicola Tuveri Port Contention for Fun and Profit. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2018 DBLP  BibTeX  RDF
1Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Bob Brumley Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Cesar Pereida García, Billy Bob Brumley Constant-Time Callees with Variable-Time Callers. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2017 DBLP  BibTeX  RDF
1Cesar Pereida García, Billy Bob Brumley, Yuval Yarom "Make Sure DSA Signing Exponentiations Really are Constant-Time". Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Cesar Pereida García, Billy Bob Brumley Constant-Time Callees with Variable-Time Callers. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Cesar Pereida García, Billy Bob Brumley, Yuval Yarom "Make Sure DSA Signing Exponentiations Really are Constant-Time". Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley, Juha Röning (eds.) Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas Allan, Billy Bob Brumley, Katrina E. Falkner, Joop van de Pol, Yuval Yarom Amplifying side channels through performance degradation. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Billy Bob Brumley Faster software for fast endomorphisms. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Thomas Allan, Billy Bob Brumley, Katrina E. Falkner, Joop van de Pol, Yuval Yarom Amplifying Side Channels Through Performance Degradation. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Billy Bob Brumley Faster Software for Fast Endomorphisms. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley Cache Storage Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley Faster Binary Curve Software: A Case Study. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Markku-Juhani O. Saarinen, Billy Bob Brumley WHIRLBOB, the Whirlpool Based Variant of STRIBOB. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Markku-Juhani O. Saarinen, Billy Bob Brumley Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2014 DBLP  BibTeX  RDF
1Roberto Avanzi, Billy Bob Brumley Faster 128-EEA3 and 128-EIA3 Software. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2013 DBLP  BibTeX  RDF
1Roberto Avanzi, Billy Bob Brumley Faster 128-EEA3 and 128-EIA3 Software. Search on Bibsonomy ISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren Practical Realisation and Elimination of an ECC-Related Software Bug Attack. Search on Bibsonomy CT-RSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley, Nicola Tuveri Remote Timing Attacks are Still Practical. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2011 DBLP  BibTeX  RDF
1Billy Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren Practical realisation and elimination of an ECC-related software bug attack. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2011 DBLP  BibTeX  RDF
1Billy Bob Brumley, Dan Page Bit-Sliced Binary Normal Basis Multiplication. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley, Nicola Tuveri Remote Timing Attacks Are Still Practical. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley Covert timing channels, caching, and cryptography. Search on Bibsonomy 2011   RDF
1Billy Bob Brumley, Kimmo U. Järvinen Conversion Algorithms and Implementations for Koblitz Curve Cryptography. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF field-programmable gate arrays, Elliptic curve cryptography, public-key cryptosystems, Koblitz curves
1Billy Bob Brumley Secure and Fast Implementations of Two Involution Ciphers. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Billy Bob Brumley Secure and Fast Implementations of Two Involution Ciphers. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Onur Aciiçmez, Billy Bob Brumley, Philipp Grabher New Results on Instruction Cache Attacks. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio Consecutive S-box Lookups: A Timing Attack on SNOW 3G. Search on Bibsonomy ICICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley, Risto M. Hakala Cache-Timing Template Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cache-timing attacks, elliptic curve cryptography, side channel attacks
1Billy Bob Brumley, Kaisa Nyberg On Modular Decomposition of Integers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF GLV method, integer decompositions, elliptic curve cryptography
1Billy Bob Brumley Implementing Cryptography for Packet Level Authentication. Search on Bibsonomy Security and Management The full citation details ... 2008 DBLP  BibTeX  RDF
1Billy Bob Brumley, Kimmo U. Järvinen Fast Point Decompression for Standard Elliptic Curves. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF square roots modulo p, elliptic curve cryptography, exponentiation, addition chains
1Billy Bob Brumley, Kimmo U. Järvinen Koblitz Curves and Integer Equivalents of Frobenius Expansions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF digital signatures, elliptic curve cryptography, Koblitz curves
1Billy Bob Brumley, Kaisa Nyberg Differential Properties of Elliptic Curves and Blind Signatures. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF differential uniformity, implicit public key certificates, key issuing protocols, provable security, Elliptic curves, blind signatures, digital signature schemes, message recovery
1Billy Bob Brumley Left-to-Right Signed-Bit tau-Adic Representations of n Integers (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF joint sparse form, simultaneous elliptic scalar multiplication, digital signatures, elliptic curve cryptography, Koblitz curves
Displaying result #1 - #42 of 42 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license