-
-
Recent Posts
Recent Comments
- California coding | Tampere University (Pervasive) Computing Blog on Oliphant, IT era
- Project of the Day: Human-Centered Robotics (year 2018) | Tampere University (Pervasive) Computing Blog on Robot-Assisted Break Exercises
- Person of the Day: Assistant Professor Jarno Vanne | Tampere University (Pervasive) Computing Blog on Kesä- ja dippatyöpaikkoja tulevaisuuden videoteknologian parissa
- COMPACT 2017-2020 | Tampere University (Pervasive) Computing Blog on Person of the Day: Assistant Professor Jani Boutellier
- Project of the Day: Human-Centered Robotics (year 2018) | Tampere University (Pervasive) Computing Blog on International students love Pepper!
Archives
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
Categories
- conference
- Courses
- Digikuntoutus
- education
- employee of the day
- events
- internet of things
- it infrastructure
- job available
- new employee
- news
- old employee
- people
- pervasive_advent
- PhD thesis
- Project of the Day
- Projects
- research
- Research groups
- research visit
- RoboUX
- seminar
- summer job
- teaching
- thesis worker
- training school
- Uncategorized
- wishes
Meta
Author Archives: Billy Brumley
ATHENA: Authenticated Encryption Analysis
As opposed to a traditional block cipher that only provides confidentiality, Authenticated Encryption (AE) is a cryptographic primitive achieving confidentiality, integrity, and authenticity in a single function. AE is a fundamental concept in e.g. TLS, with several cipher suites utilizing … Continue reading
Person of the Day: Assistant Professor Billy Brumley
My employees were nice enough to come up with three questions, allowing me to share some of my insight into security and cryptography. At least, I hope I have some insight 😉 I give some bio stuff at the end … Continue reading
Posted in employee of the day, research
Leave a comment
Report: Lightweight Crypto Day 2016
At the end of March, I attended Technion’s Lightweight Crypto Day 2016 in Haifa, Israel. There’s so much technical stuff happening in Haifa — from startups to Fortune 500 presence. In my opinion, lightweight crypto is kind of a buzz … Continue reading
Report: NordSec 2015
Last week, I attended the Nordic Conference on Secure IT Systems (NordSec 2015). Although it’s experienced some internationalization, NordSec is traditionally a local conference — and with this year being the 20th anniversary, it has a rich history. On average, … Continue reading
Report: CriM 2015 and Oulu Winter School
I recently returned from Oulu, where Juha Röning and Thomas Schaberreiter organized the co-located Ninth International Crisis Management Workshop (CriM15) and Oulu Winter School. At a high level, the event focused on security, trust, privacy, risk, and cryptography. I caught … Continue reading
Authenticated Encryption: CAESAR Round 2
The crypto community likes algorithm competitions. It gives us a chance to practice all sorts of skills: design, cryptanalysis, implementation, and standardization. Maybe even soft skills too like collaboration and communication. I’ll also half-jokingly comment it helps the field self-sustain: … Continue reading
Report: BalkanCryptSec 2015
I attended the second annual International Conference on Cryptography and Information Security that took place 03-04 September in Koper, Slovenia in the Faculty of Mathematics, Natural Sciences and Information Technologies (FAMNIT). Koper is a beautiful cozy coastal town on the … Continue reading
Report: Summer school on real-world crypto and privacy
Meet Bob. Bob is a doctoral student or post-doc — I don’t recall, maybe even an MSc student. Bob doesn’t like social / professional networking. He prefers to spend his time alone in his office at TUT. Maybe with the … Continue reading
Posted in conference, research
Tagged cryptography, digital interaction, mobility, privacy, security
Leave a comment
Report: RSA Conference 2015
I attended the 24th annual RSA Conference 2015 in San Francisco from 20-24 April. Previously, I published at RSAC in 2012 and attended in 2013. RSAC is strange for academics because it is so commercial — over 28,000 attendees, over … Continue reading
Posted in conference, research
Tagged cryptography, digital interaction, mobility, security
Leave a comment
Workshop report: COSADE 2015
I attended the workshop Constructive Side-Channel Analysis and Secure Design (COSADE 2015) 13-14 April in Berlin. This marks the 6th iteration of the annual workshop that launched in 2010, and the 2nd time I’ve attended — previously in 2011. To … Continue reading
Posted in conference, research
Tagged cryptography, digital interaction, mobility, security
Leave a comment