Gaven Watson
Gaven Watson
Visa Research
Verified email at
Cited by
Cited by
Plaintext recovery attacks against SSH
MR Albrecht, KG Paterson, GJ Watson
2009 30th IEEE Symposium on Security and Privacy, 16-26, 2009
Lost: location based storage
GJ Watson, R Safavi-Naini, M Alimomeni, ME Locasto, S Narayan
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 59-70, 2012
Plaintext-dependent decryption: A formal security treatment of SSH-CTR
KG Paterson, GJ Watson
Annual International Conference on the Theory and Applications of …, 2010
Algorithms, Key Size and Parameters: Report-2014
NP Smart
ENISA, 2014
An analysis of the EMV channel establishment protocol
C Brzuska, NP Smart, B Warinschi, GJ Watson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Provable security in the real world
JP Degabriele, K Paterson, G Watson
IEEE Security & Privacy 9 (3), 33-41, 2010
On cipher-dependent related-key attacks in the ideal-cipher model
MR Albrecht, P Farshim, KG Paterson, GJ Watson
International Workshop on Fast Software Encryption, 128-145, 2011
Anonymity guarantees of the UMTS/LTE authentication and connection protocol
MF Lee, NP Smart, B Warinschi, GJ Watson
International journal of information security 13 (6), 513-527, 2014
Immunising CBC mode against padding oracle attacks: A formal security treatment
KG Paterson, GJ Watson
International Conference on Security and Cryptography for Networks, 340-357, 2008
Algorithms, key size and protocols report
M Abdalla, B Gierlichs, KG Paterson, V Rijmen, AR Sadeghi, NP Smart, ...
ECRYPT–Coordination & Support Action, 2016
Authenticated-encryption with padding: A formal security treatment
KG Paterson, GJ Watson
Cryptography and Security: From Theory to Applications, 83-107, 2012
Algorithms, Key Size and Protocols Report (2018)
NP Smart, M Abdalla, E Bjørstad, C Cid, B Gierlichs, A Hülsing, A Luykx, ...
ECRYPT—CSA, H2020-ICT-2014—Project 645421, 2018
The low-call diet: Authenticated Encryption for call counting HSM users
M Bond, G French, NP Smart, GJ Watson
Cryptographers’ Track at the RSA Conference, 359-374, 2013
Provable Security in Practice: Analysis of SSH and CBC mode with Padding
GJ Watson
Royal Holloway, University of London, 2010
Reducing {HSM} Reliance in Payments through Proxy Re-Encryption
S Gaddam, A Luykx, R Sinha, G Watson
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
Mobile payments using multiple cryptographic protocols
S Agrawal, D Bannikov, A Luykx, P Mohassel, S Smirnoff, S Vasudevan, ...
US Patent App. 16/583,634, 2020
White-box Cryptography with Device Binding from Token-based Obfuscation and more
S Agrawal, EA Bock, Y Chen, G Watson
The system can't perform the operation now. Try again later.
Articles 1–17