Folgen
Gaven Watson
Gaven Watson
Visa Research
Bestätigte E-Mail-Adresse bei visa.com
Titel
Zitiert von
Zitiert von
Jahr
Plaintext recovery attacks against SSH
MR Albrecht, KG Paterson, GJ Watson
2009 30th IEEE Symposium on Security and Privacy, 16-26, 2009
1312009
Lost: location based storage
GJ Watson, R Safavi-Naini, M Alimomeni, ME Locasto, S Narayan
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 59-70, 2012
702012
An analysis of the EMV channel establishment protocol
C Brzuska, NP Smart, B Warinschi, GJ Watson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
462013
Provable security in the real world
JP Degabriele, K Paterson, G Watson
IEEE Security & Privacy 9 (3), 33-41, 2010
452010
Plaintext-dependent decryption: A formal security treatment of SSH-CTR
KG Paterson, GJ Watson
Annual International Conference on the Theory and Applications of …, 2010
432010
On cipher-dependent related-key attacks in the ideal-cipher model
MR Albrecht, P Farshim, KG Paterson, GJ Watson
International Workshop on Fast Software Encryption, 128-145, 2011
352011
Anonymity guarantees of the UMTS/LTE authentication and connection protocol
MF Lee, NP Smart, B Warinschi, GJ Watson
International journal of information security 13 (6), 513-527, 2014
312014
Immunising CBC mode against padding oracle attacks: A formal security treatment
KG Paterson, GJ Watson
International Conference on Security and Cryptography for Networks, 340-357, 2008
212008
Algorithms, key size and protocols report (2018)
N Smart, M Abdalla, E Bjørstad, C Cid, B Gierlichs, A Hülsing, A Luykx, ...
ECRYPT—CSA, H2020-ICT-2014—Project 645421, 2018
162018
Authenticated-encryption with padding: A formal security treatment
KG Paterson, GJ Watson
Cryptography and Security: From Theory to Applications, 83-107, 2012
162012
Algorithms, key size and protocols report
M Abdalla, B Gierlichs, KG Paterson, V Rijmen, AR Sadeghi, NP Smart, ...
ECRYPT-CSA, Tech. Rep. H2020-ICT-2014–Project 645421, 2018
102018
The low-call diet: Authenticated Encryption for call counting HSM users
M Bond, G French, NP Smart, GJ Watson
Cryptographers’ Track at the RSA Conference, 359-374, 2013
52013
Unidirectional updatable encryption and proxy re-encryption from ddh or lwe
P Miao, S Patranabis, G Watson
Cryptology ePrint Archive, 2022
22022
Provable Security in Practice: Analysis of SSH and CBC mode with Padding
GJ Watson
Royal Holloway, University of London, 2010
22010
A PKI-based Framework for Establishing Efficient MPC Channels
D Masny, G Watson
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
12021
Method, system, and computer program product for network bound proxy re-encryption and pin translation
S Gaddam, GJ Watson, R Sinha, A Luykx
US Patent App. 17/421,587, 2022
2022
Method, system, and computer program product for network bound proxy re-encryption and pin translation
S Gaddam, GJ Watson, R Sinha, P Mukherjee
US Patent App. 17/421,608, 2022
2022
Privacy-preserving identity attribute verification using policy tokens
KR Wagner, SS Arora, GJ Watson, M Christodorescu, S Agrawal
US Patent App. 16/928,367, 2022
2022
SYSTEM AND METHOD FOR REVOKING COMPROMISED CRYPTOGRAPHIC KEY FROM DATABASE
D MASNY, G WATSON
2021
White-box Cryptography with Device Binding from Token-based Obfuscation and more
S Agrawal, EA Bock, Y Chen, G Watson
Cryptology ePrint Archive, 2021
2021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20