to appear |
12 | Billy Bob Brumley and Kimmo U. Järvinen. Conversion algorithms and implementations for Koblitz curve cryptography. IEEE Transactions on Computers, to appear. |
|
2009 |
11 | Billy Bob Brumley and Kaisa Nyberg. On modular decomposition of integers. In Progress in Cryptology—AFRICACRYPT 2009, volume 5580 of Lecture Notes in Computer Science, pages 386–402. Springer-Verlag, 2009. |
|
10 | Billy Bob Brumley and Risto M. Hakala. Cache-timing template attacks. In Advances in Cryptology—ASIACRYPT 2009, volume 5912 of Lecture Notes in Computer Science, pages 667–684. Springer-Verlag, 2009. |
|
9 | Billy Bob Brumley. Studies on Elliptic Curve Cryptography Engineering. Licentiate's thesis, Helsinki University of Technology, Department of Information and Computer Science, 2009. |
|
2008 |
8 | Billy Bob Brumley and Jukka Valkonen. Attacks on message stream encryption. In Hanne Riis Nielson and Christian W. Probst, editors, Proceedings of the 13th Nordic Workshop on Secure IT Systems—NordSec '08, pages 163–173, October 2008. |
|
7 | Billy Bob Brumley and Kimmo U. Järvinen. Fast point decompression for standard elliptic curves. In Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice—EuroPKI '08, volume 5057 of Lecture Notes in Computer Science, pages 134–149. Springer-Verlag, 2008. |
|
6 | Billy Bob Brumley. Implementing cryptography for packet level authentication. In Proceedings of the 2008 International Conference on Security & Management—SAM '08, pages 475–480. CSREA Press, 2008. Special track on Applied Cryptology and Network Security. |
|
2007 |
5 | Billy Bob Brumley and Kaisa Nyberg. Differential properties of elliptic curves and blind signatures. In Information Security, 10th International Conference—ISC '07, volume 4779 of Lecture Notes in Computer Science, pages 376–389. Springer-Verlag, 2007. |
|
4 | Billy Bob Brumley and Kimmo Järvinen. Koblitz curves and integer equivalents of Frobenius expansions. In Selected Areas in Cryptography, 14th International Workshop—SAC '07, volume 4876 of Lecture Notes in Computer Science, pages 126–137. Springer-Verlag, 2007. |
|
2006 |
3 | Billy Bob Brumley. Efficient elliptic curve algorithms for compact digital signatures. Master's thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Laboratory for Theoretical Computer Science, November 2006. |
|
2 | Billy Bob Brumley. Efficient three-term simultaneous elliptic scalar multiplication with applications. In Viiveke Fåk, editor, Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec '06, pages 105–116, Linköping, Sweden, October 2006. |
|
1 | Billy Bob Brumley. Left-to-right signed-bit -adic representations of integers (short paper). In Information and Communications Security, 8th International Conference—ICICS '06, volume 4307 of Lecture Notes in Computer Science, pages 469–478. Springer-Verlag, 2006. |
|