Billy Bob Brumley. Implementing Cryptography for Packet Level
Authentication. To appear in proceedings of International Conference on
Security & Management---SAM '08.
Billy Bob Brumley and Kimmo Järvinen. Fast Point Decompression for
Standard Elliptic Curves. To appear in Proceedings of the 5th European
PKI Workshop, EuroPKI 2008, Trondheim, Norway, 16-17 June, 2008.
Kimmo Järvinen and Jorma Skyttä. High-Speed Elliptic Curve
Cryptography Accelerator for Koblitz Curves. To appear in Proceedings of
the 16th IEEE Symposium on Field-programmable Custom Computing Machines,
FCCM 2008, Palo Alto, California, USA, April 14-15, 2008.
Kimmo Järvinen, Juha Forsten and Jorma Skyttä.
FPGA Design of
Self-certified Signature Verification on Koblitz Curves.
Proceedings of the Workshop on
Cryptographic Hardware and Embedded Systems, CHES 2007, Vienna, Austria, Sept.
10-13, 2007, pages 256-271. Springer-Verlag LNCS 4727.
Dmitrij Lagutin and Hannu H. Kari.
Controlling incoming connections
using certificates and distributed hash tables. In proceedins of The
7th International Conference on Next Generation Teletraffic and Wired/Wireless
Advanced Networking (NEW2AN 2007), St. Petersburg, Russia,
September 10-14, 2007, pages 455-467. Springer-Verlag LNCS 4712.
Billy Bob Brumley and Kimmo Järvinen.
Koblitz Curves
and Integer Equivalents of Frobenius Expansions. Revised Selected
Papers of the 14th Annual Workshop on Selected Areas in Cryptography, SAC 2007,
Ottawa, Canada, Aug. 16-17, 2007, pages 126-137. Springer-Verlag LNCS 4876.
Billy Bob Brumley and Kaisa Nyberg.
Differential
properties of elliptic curves and blind signatures. In Information
Security, 10th International Conference--ISC '07, volume 4779 of Lecture
Notes in Computer Science, pages 376-389. Springer-Verlag, 2007.
Kimmo Järvinen, Juha Forsten and Jorma Skyttä.
Efficient Circuitry
for Computing tau-adic Non-Adjacent Form. In proceedings of the
13th IEEE International Conference on Electronics, Circuits and Systems,
ICECS 2006, Nice, France, December 10-13, 2006, pages 232- 235.
Billy Bob Brumley. Efficient three-term simultaneous elliptic scalar
multiplication with applications. In Viiveke Fåk, editor, Proceedings
of the 11th Nordic Workshop on Secure IT Systems--NordSec '06,
pages 105-116, Linkoping, Sweden, October 2006.
Kimmo Järvinen and Jorma Skyttä. On Parallelization of High-Speed
Processors for Elliptic Curve Cryptography. IEEE Transactions on Very
Large Scale Integration (VLSI) Systems, to appear.
Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson, Jr., Wai
Fong Chan and Zhun Huang. Provably Sublinear Point Multiplication on
Koblitz Curves and its Hardware Implementation. IEEE Transactions on
Computers, in press.
Billy Bob Brumley. Efficient elliptic curve algorithms for compact
digital signatures. Master's thesis, Helsinki University of Technology,
Department of Computer Science and Engineering, Laboratory for
Theoretical Computer Science, November 2006.
Presentations
Hannu H. Kari: "Utilizing data networks in stealth attacks", The 5th European Conference on Information Warfare and Security, ECIW-2006, 1-2 June, 2006, Helsinki. (Keynote speaker)
Hannu H. Kari: "Protecting network infrastructures with strong cryptographic algorithms", CITRIS in Europe, 20-21 June, 2006, Helsinki, Finland. (invited talk)
Hannu H. Kari: "Dynamic Trust Management for Decision Making Systems using Context Aware Management/Policy Manager Architecture", NATO STANAG 4660 -standardization meeting, 28 July 2006, London, UK. (Invited talk)
Hannu H. Kari: " Dynamic Trust Management for Decision Making Systems using Context Aware Management/Policy Manager Architecture", Towards a Science of Networks Workshop: Communication Networks and Complexity, 31 August - 1 September, 2006, Athenes, Greece. (Invited talk)
Hannu H. Kari: " Packet Level Authentication (PLA) Short introduction", 3rd Critical Information Infrastructure Protection (CIIP)-Network workshop, Critical Information Infrastructure Research Co-ordination Project (CIIRCO), 8 June, 2006, Amsterdam, the Netherlands. (Invited talk)
Hannu H. Kari: "Protecting network infrastructures with strong cryptographic algorithms - the concept of Packet Level Authentication", 18-19 May, 2006, Dependability of all-IP networks -workshop, Espoo, Finland. (Invited talk)