Gaven Watson
Gaven Watson
Visa Research
Verified email at
Cited by
Cited by
Plaintext recovery attacks against SSH
MR Albrecht, KG Paterson, GJ Watson
2009 30th IEEE Symposium on Security and Privacy, 16-26, 2009
Lost: location based storage
GJ Watson, R Safavi-Naini, M Alimomeni, ME Locasto, S Narayan
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 59-70, 2012
Provable security in the real world
JP Degabriele, K Paterson, G Watson
IEEE Security & Privacy 9 (3), 33-41, 2010
Plaintext-dependent decryption: A formal security treatment of SSH-CTR
KG Paterson, GJ Watson
Annual International Conference on the Theory and Applications of …, 2010
An analysis of the EMV channel establishment protocol
C Brzuska, NP Smart, B Warinschi, GJ Watson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
On cipher-dependent related-key attacks in the ideal-cipher model
MR Albrecht, P Farshim, KG Paterson, GJ Watson
International Workshop on Fast Software Encryption, 128-145, 2011
Anonymity guarantees of the UMTS/LTE authentication and connection protocol
MF Lee, NP Smart, B Warinschi, GJ Watson
International journal of information security 13 (6), 513-527, 2014
Immunising CBC mode against padding oracle attacks: A formal security treatment
KG Paterson, GJ Watson
International Conference on Security and Cryptography for Networks, 340-357, 2008
Authenticated-encryption with padding: A formal security treatment
KG Paterson, GJ Watson
Cryptography and Security: From Theory to Applications, 83-107, 2012
Algorithms, key size and protocols report
NP Smart, M Abdalla, C Cid, B Gierlichs, A Hülsing, A Luykx, KG Paterson, ...
Deliverable D5 2, 2018
Algorithms, key size and protocols report
M Abdalla, B Gierlichs, KG Paterson, V Rijmen, AR Sadeghi, NP Smart, ...
ECRYPT–Coordination & Support Action, 2016
The low-call diet: Authenticated Encryption for call counting HSM users
M Bond, G French, NP Smart, GJ Watson
Cryptographers’ Track at the RSA Conference, 359-374, 2013
Provable Security in Practice: Analysis of SSH and CBC mode with Padding
GJ Watson
Royal Holloway, University of London, 2010
White-box Cryptography with Device Binding from Token-based Obfuscation and more
S Agrawal, EA Bock, Y Chen, G Watson
Cryptology ePrint Archive, 2021
Reducing {HSM} Reliance in Payments through Proxy Re-Encryption
S Gaddam, A Luykx, R Sinha, G Watson
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
Mobile payments using multiple cryptographic protocols
S Agrawal, D Bannikov, A Luykx, P Mohassel, S Smirnoff, S Vasudevan, ...
US Patent App. 16/583,634, 2020
The system can't perform the operation now. Try again later.
Articles 1–16