Seguir
Gaven Watson
Gaven Watson
Meta
E-mail confirmado em meta.com
Título
Citado por
Citado por
Ano
Plaintext recovery attacks against SSH
MR Albrecht, KG Paterson, GJ Watson
2009 30th IEEE Symposium on Security and Privacy, 16-26, 2009
1622009
Lost: location based storage
GJ Watson, R Safavi-Naini, M Alimomeni, ME Locasto, S Narayan
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 59-70, 2012
752012
Provable security in the real world
JP Degabriele, K Paterson, G Watson
IEEE Security & Privacy 9 (3), 33-41, 2010
562010
An analysis of the EMV channel establishment protocol
C Brzuska, NP Smart, B Warinschi, GJ Watson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
512013
Plaintext-dependent decryption: A formal security treatment of SSH-CTR
KG Paterson, GJ Watson
Annual International Conference on the Theory and Applications of …, 2010
472010
On cipher-dependent related-key attacks in the ideal-cipher model
MR Albrecht, P Farshim, KG Paterson, GJ Watson
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011
372011
Anonymity guarantees of the UMTS/LTE authentication and connection protocol
MF Lee, NP Smart, B Warinschi, GJ Watson
International journal of information security 13, 513-527, 2014
332014
Unidirectional updatable encryption and proxy re-encryption from DDH
P Miao, S Patranabis, G Watson
IACR International Conference on Public-Key Cryptography, 368-398, 2023
26*2023
Algorithms, key size and protocols report (2018)
N Smart, M Abdalla, E Bjørstad, C Cid, B Gierlichs, A Hülsing, A Luykx, ...
ECRYPT—CSA, H2020-ICT-2014—Project 645421, 2018
252018
Authenticated-encryption with padding: A formal security treatment
KG Paterson, GJ Watson
Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012
222012
Immunising CBC mode against padding oracle attacks: A formal security treatment
KG Paterson, GJ Watson
International Conference on Security and Cryptography for Networks, 340-357, 2008
222008
Algorithms, key size and protocols report
M Abdalla, TE Bjørstad, C Cid, B Gierlichs, A Hülsing, A Luykx, ...
ECRYPT-CSA, Tech. Rep. H2020-ICT-2014–Project 645421, 2018
122018
Avoiding lock outs: Proactive FIDO account recovery using managerless group signatures
SS Arora, S Badrinarayanan, S Raghuraman, M Shirvanian, K Wagner, ...
Cryptology ePrint Archive, 2022
102022
Mobile payments using multiple cryptographic protocols
S Agrawal, D Bannikov, A Luykx, P Mohassel, S Smirnoff, S Vasudevan, ...
US Patent App. 16/583,634, 2020
82020
The low-call diet: Authenticated Encryption for call counting HSM users
M Bond, G French, NP Smart, GJ Watson
Cryptographers’ Track at the RSA Conference, 359-374, 2013
62013
Privacy-preserving identity attribute verification using policy tokens
KR Wagner, SS Arora, GJ Watson, M Christodorescu, S Agrawal
US Patent 12,028,455, 2024
52024
A PKI-based framework for establishing efficient MPC channels
D Masny, G Watson
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
52021
White-box cryptography with global device binding from message-recoverable signatures and token-based obfuscation
S Agrawal, E Alpírez Bock, Y Chen, G Watson
International Workshop on Constructive Side-Channel Analysis and Secure …, 2023
42023
White-box Cryptography with Device Binding from Token-based Obfuscation and more.
S Agrawal, EA Bock, Y Chen, GJ Watson
IACR Cryptol. ePrint Arch. 2021, 767, 2021
42021
Zero-knowledge interaction processing system and method
GJ Watson, K Wagner, S Badrinarayanan, S Raghuraman
US Patent 12,200,129, 2025
32025
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20