Follow
Carolyn Whitnall
Carolyn Whitnall
Verified email at bris.ac.uk - Homepage
Title
Cited by
Cited by
Year
Did'targets and terror'reduce waiting times in England for hospital care?
C Propper, M Sutton, C Whitnall, F Windmeijer
The BE Journal of Economic Analysis & Policy 8 (2), 2008
1972008
Incentives and targets in hospital care: evidence from a natural experiment
C Propper, M Sutton, C Whitnall, F Windmeijer
Journal of Public Economics 94 (3-4), 318-335, 2010
1802010
An exploration of the kolmogorov-smirnov test as a competitor to mutual information analysis
C Whitnall, E Oswald, L Mather
International Conference on Smart Card Research and Advanced Applications …, 2011
982011
The myth of generic DPA… and the magic of learning
C Whitnall, E Oswald, FX Standaert
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
942014
Towards Practical Tools for Side Channel Aware Software Engineering:'Grey Box'Modelling for Instruction Leakages
D McCann, E Oswald, C Whitnall
26th USENIX security symposium (USENIX Security 17), 199-216, 2017
912017
A fair evaluation framework for comparing side-channel distinguishers
C Whitnall, E Oswald
Journal of Cryptographic Engineering 1, 145-160, 2011
882011
A comprehensive evaluation of mutual information analysis using a fair evaluation framework
C Whitnall, E Oswald
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
792011
Masking tables—an underestimated security risk
M Tunstall, C Whitnall, E Oswald
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
542014
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
L Mather, E Oswald, C Whitnall
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
522014
A critical analysis of ISO 17825 (‘testing methods for the mitigation of non-invasive attack classes against cryptographic modules’)
C Whitnall, E Oswald
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
462019
Robust profiling for DPA-style attacks
C Whitnall, E Oswald
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
452015
A systematic appraisal of side channel evaluation strategies
M Azouaoui, D Bellizia, I Buhan, N Debande, S Duval, C Giraud, ...
Security Standardisation Research: 6th International Conference, SSR 2020 …, 2020
442020
A cautionary note regarding the usage of leakage detection tests in security evaluation
C Whitnall, E Oswald
Cryptology ePrint Archive, 2019
272019
ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab.
D McCann, C Whitnall, E Oswald
IACR Cryptol. ePrint Arch. 2016, 517, 2016
252016
Profiling DPA: efficacy and efficiency trade-offs
C Whitnall, E Oswald
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
252013
Reliable information extraction for single trace attacks
V Banciu, E Oswald, C Whitnall
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 133-138, 2015
172015
Did ‘targets and terror’reduce English waiting times for elective hospital care
C Propper, M Sutton, C Whitnall, F Windmeijer
Bristol: CMPO, University of Bristol, 2007
172007
The myth of generic DPA... and the magic of learning
C Whitnall, E Oswald, FX Standaert
Cryptology ePrint Archive, 2012
142012
Choosing distinguishers for differential power analysis attacks
E Oswald, L Mather, C Whitnall
Non-Invasive Attack Testing Workshop, 1-14, 2011
92011
Exploring the resilience of some lightweight ciphers against profiled single trace attacks
V Banciu, E Oswald, C Whitnall
Constructive Side-Channel Analysis and Secure Design: 6th International …, 2015
82015
The system can't perform the operation now. Try again later.
Articles 1–20