Author Archives: Billy Brumley

ATHENA: Authenticated Encryption Analysis

As opposed to a traditional block cipher that only provides confidentiality, Authenticated Encryption (AE) is a cryptographic primitive achieving confidentiality, integrity, and authenticity in a single function. AE is a fundamental concept in e.g. TLS, with several cipher suites utilizing … Continue reading

Posted in Projects, Uncategorized | Tagged , , | Leave a comment

Person of the Day: Assistant Professor Billy Brumley

My employees were nice enough to come up with three questions, allowing me to share some of my insight into security and cryptography. At least, I hope I have some insight ūüėČ I give some bio stuff at the end … Continue reading

Posted in employee of the day, research | Leave a comment

Report: Lightweight Crypto Day 2016

At the end of March, I attended Technion’s Lightweight Crypto Day 2016 in Haifa, Israel. There’s so much technical stuff happening in Haifa — from startups to Fortune 500 presence. In my opinion, lightweight crypto is kind of a buzz … Continue reading

Posted in conference | Tagged , , | Leave a comment

Report: NordSec 2015

Last week, I attended the Nordic Conference on Secure IT Systems (NordSec 2015). Although it’s experienced some internationalization, NordSec is traditionally a local conference — and with this year being the 20th anniversary, it has a rich history. On average, … Continue reading

Posted in conference, research | Tagged , , | 2 Comments

Report: CriM 2015 and Oulu Winter School

I recently returned from Oulu, where Juha R√∂ning and Thomas Schaberreiter organized the co-located Ninth International Crisis Management Workshop (CriM15) and Oulu Winter School. At a high level, the event focused on security, trust, privacy, risk, and cryptography. I caught … Continue reading

Posted in conference | Tagged , | 2 Comments

Authenticated Encryption: CAESAR Round 2

The crypto community likes algorithm competitions. It gives us a chance to practice all sorts of skills: design, cryptanalysis, implementation, and standardization. Maybe even soft skills too like collaboration and communication. I’ll also half-jokingly comment it helps the field self-sustain: … Continue reading

Posted in news, research | Tagged , | 1 Comment

Report: BalkanCryptSec 2015

I attended the second annual International Conference on Cryptography and Information Security that took place 03-04 September in Koper, Slovenia in the Faculty of Mathematics, Natural Sciences and Information Technologies (FAMNIT). Koper is a beautiful cozy coastal town on the … Continue reading

Posted in conference, research | Tagged , | 1 Comment

Report: Summer school on real-world crypto and privacy

Meet Bob. Bob is a doctoral student or post-doc — I don’t recall, maybe even an MSc student. Bob doesn’t like social / professional networking. He prefers to spend his time alone in his office at TUT. Maybe with the … Continue reading

Posted in conference, research | Tagged , , , , | Leave a comment

Report: RSA Conference 2015

I attended the 24th annual RSA Conference 2015 in San Francisco from 20-24 April. Previously, I published at RSAC in 2012 and attended in 2013. RSAC is strange for academics because it is so commercial — over 28,000 attendees, over … Continue reading

Posted in conference, research | Tagged , , , | 1 Comment

Workshop report: COSADE 2015

I attended the workshop Constructive Side-Channel Analysis and Secure Design (COSADE 2015) 13-14 April in Berlin. This marks the 6th iteration of the annual workshop that launched in 2010, and the 2nd time I’ve attended — previously in 2011. To … Continue reading

Posted in conference, research | Tagged , , , | 2 Comments