Carolyn Whitnall

Orcid: 0000-0002-8420-5438

According to our database1, Carolyn Whitnall authored at least 19 papers between 2011 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Systematic Appraisal of Side Channel Evaluation Strategies.
Proceedings of the Security Standardisation Research - 6th International Conference, 2020

2019
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation.
IACR Cryptol. ePrint Arch., 2019

A Critical Analysis of ISO 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules').
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018

2017
Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages.
Proceedings of the 26th USENIX Security Symposium, 2017

Categorising and Comparing Cluster-Based DPA Distinguishers.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab.
IACR Cryptol. ePrint Arch., 2016

2015
Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks.
IACR Cryptol. ePrint Arch., 2015

Reliable information extraction for single trace attacks.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Robust Profiling for DPA-Style Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2014
The Myth of Generic DPA...and the Magic of Learning.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Masking Tables - An Underestimated Security Risk.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Profiling DPA: Efficacy and Efficiency Trade-Offs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

2011
A fair evaluation framework for comparing side-channel distinguishers.
J. Cryptogr. Eng., 2011

A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis.
Proceedings of the Smart Card Research and Advanced Applications, 2011


  Loading...