TCS / Research / Publications / Billy Bob Brumley
Helsinki University of Technology, 
     Laboratory for Theoretical Computer Science

Publications by Billy Bob Brumley

to appear

12Billy Bob Brumley and Kimmo U. Järvinen. Conversion algorithms and implementations for Koblitz curve cryptography. IEEE Transactions on Computers, to appear.
Info

2009

11Billy Bob Brumley and Kaisa Nyberg. On modular decomposition of integers. In Progress in Cryptology—AFRICACRYPT 2009, volume 5580 of Lecture Notes in Computer Science, pages 386–402. Springer-Verlag, 2009.
Info
See dx.doi.org ...
10Billy Bob Brumley and Risto M. Hakala. Cache-timing template attacks. In Advances in Cryptology—ASIACRYPT 2009, volume 5912 of Lecture Notes in Computer Science, pages 667–684. Springer-Verlag, 2009.
Info
See dx.doi.org ...
9Billy Bob Brumley. Studies on Elliptic Curve Cryptography Engineering. Licentiate's thesis, Helsinki University of Technology, Department of Information and Computer Science, 2009.
Info

2008

8Billy Bob Brumley and Jukka Valkonen. Attacks on message stream encryption. In Hanne Riis Nielson and Christian W. Probst, editors, Proceedings of the 13th Nordic Workshop on Secure IT Systems—NordSec '08, pages 163–173, October 2008.
PDF (192 kB)
Info
7Billy Bob Brumley and Kimmo U. Järvinen. Fast point decompression for standard elliptic curves. In Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice—EuroPKI '08, volume 5057 of Lecture Notes in Computer Science, pages 134–149. Springer-Verlag, 2008.
Info
See dx.doi.org ...
6Billy Bob Brumley. Implementing cryptography for packet level authentication. In Proceedings of the 2008 International Conference on Security & Management—SAM '08, pages 475–480. CSREA Press, 2008. Special track on Applied Cryptology and Network Security.
PDF (182 kB)
Info

2007

5Billy Bob Brumley and Kaisa Nyberg. Differential properties of elliptic curves and blind signatures. In Information Security, 10th International Conference—ISC '07, volume 4779 of Lecture Notes in Computer Science, pages 376–389. Springer-Verlag, 2007.
Info
See dx.doi.org ...
4Billy Bob Brumley and Kimmo Järvinen. Koblitz curves and integer equivalents of Frobenius expansions. In Selected Areas in Cryptography, 14th International Workshop—SAC '07, volume 4876 of Lecture Notes in Computer Science, pages 126–137. Springer-Verlag, 2007.
Info
See dx.doi.org ...

2006

3Billy Bob Brumley. Efficient elliptic curve algorithms for compact digital signatures. Master's thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Laboratory for Theoretical Computer Science, November 2006.
Info
See www.tcs.hut.fi ...
2Billy Bob Brumley. Efficient three-term simultaneous elliptic scalar multiplication with applications. In Viiveke Fåk, editor, Proceedings of the 11th Nordic Workshop on Secure IT Systems—NordSec '06, pages 105–116, Linköping, Sweden, October 2006.
PDF (187 kB)
Info
1Billy Bob Brumley. Left-to-right signed-bit -adic representations of integers (short paper). In Information and Communications Security, 8th International Conference—ICICS '06, volume 4307 of Lecture Notes in Computer Science, pages 469–478. Springer-Verlag, 2006.
Info
See dx.doi.org ...

[TCS main] [Contact Info] [Personnel] [Research] [Publications] [Software] [Studies] [News Archive] [Links]
Latest update: 19 January 2010.