Gaven Watson
Gaven Watson
Visa Research
Verified email at visa.com
Title
Cited by
Cited by
Year
Plaintext recovery attacks against SSH
MR Albrecht, KG Paterson, GJ Watson
2009 30th IEEE Symposium on Security and Privacy, 16-26, 2009
1282009
Lost: location based storage
GJ Watson, R Safavi-Naini, M Alimomeni, ME Locasto, S Narayan
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 59-70, 2012
662012
Provable security in the real world
JP Degabriele, K Paterson, G Watson
IEEE Security & Privacy 9 (3), 33-41, 2010
442010
Plaintext-dependent decryption: A formal security treatment of SSH-CTR
KG Paterson, GJ Watson
Annual International Conference on the Theory and Applications of …, 2010
432010
An analysis of the EMV channel establishment protocol
C Brzuska, NP Smart, B Warinschi, GJ Watson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
422013
On cipher-dependent related-key attacks in the ideal-cipher model
MR Albrecht, P Farshim, KG Paterson, GJ Watson
International Workshop on Fast Software Encryption, 128-145, 2011
342011
Anonymity guarantees of the UMTS/LTE authentication and connection protocol
MF Lee, NP Smart, B Warinschi, GJ Watson
International journal of information security 13 (6), 513-527, 2014
292014
Immunising CBC mode against padding oracle attacks: A formal security treatment
KG Paterson, GJ Watson
International Conference on Security and Cryptography for Networks, 340-357, 2008
212008
Authenticated-encryption with padding: A formal security treatment
KG Paterson, GJ Watson
Cryptography and Security: From Theory to Applications, 83-107, 2012
142012
Algorithms, key size and protocols report
NP Smart, M Abdalla, C Cid, B Gierlichs, A Hülsing, A Luykx, KG Paterson, ...
Deliverable D5 2, 2018
112018
Algorithms, key size and protocols report
M Abdalla, B Gierlichs, KG Paterson, V Rijmen, AR Sadeghi, NP Smart, ...
ECRYPT–Coordination & Support Action, 2016
92016
The low-call diet: Authenticated Encryption for call counting HSM users
M Bond, G French, NP Smart, GJ Watson
Cryptographers’ Track at the RSA Conference, 359-374, 2013
42013
Provable Security in Practice: Analysis of SSH and CBC mode with Padding
GJ Watson
Royal Holloway, University of London, 2010
22010
White-box Cryptography with Device Binding from Token-based Obfuscation and more
S Agrawal, EA Bock, Y Chen, G Watson
Cryptology ePrint Archive, 2021
2021
Reducing {HSM} Reliance in Payments through Proxy Re-Encryption
S Gaddam, A Luykx, R Sinha, G Watson
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
2021
Mobile payments using multiple cryptographic protocols
S Agrawal, D Bannikov, A Luykx, P Mohassel, S Smirnoff, S Vasudevan, ...
US Patent App. 16/583,634, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–16