Plaintext recovery attacks against SSH MR Albrecht, KG Paterson, GJ Watson 2009 30th IEEE Symposium on Security and Privacy, 16-26, 2009 | 131 | 2009 |
Lost: location based storage GJ Watson, R Safavi-Naini, M Alimomeni, ME Locasto, S Narayan Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 59-70, 2012 | 70 | 2012 |
An analysis of the EMV channel establishment protocol C Brzuska, NP Smart, B Warinschi, GJ Watson Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 46 | 2013 |
Provable security in the real world JP Degabriele, K Paterson, G Watson IEEE Security & Privacy 9 (3), 33-41, 2010 | 45 | 2010 |
Plaintext-dependent decryption: A formal security treatment of SSH-CTR KG Paterson, GJ Watson Annual International Conference on the Theory and Applications of …, 2010 | 43 | 2010 |
On cipher-dependent related-key attacks in the ideal-cipher model MR Albrecht, P Farshim, KG Paterson, GJ Watson International Workshop on Fast Software Encryption, 128-145, 2011 | 35 | 2011 |
Anonymity guarantees of the UMTS/LTE authentication and connection protocol MF Lee, NP Smart, B Warinschi, GJ Watson International journal of information security 13 (6), 513-527, 2014 | 31 | 2014 |
Immunising CBC mode against padding oracle attacks: A formal security treatment KG Paterson, GJ Watson International Conference on Security and Cryptography for Networks, 340-357, 2008 | 21 | 2008 |
Algorithms, key size and protocols report (2018) N Smart, M Abdalla, E Bjørstad, C Cid, B Gierlichs, A Hülsing, A Luykx, ... ECRYPT—CSA, H2020-ICT-2014—Project 645421, 2018 | 16 | 2018 |
Authenticated-encryption with padding: A formal security treatment KG Paterson, GJ Watson Cryptography and Security: From Theory to Applications, 83-107, 2012 | 16 | 2012 |
Algorithms, key size and protocols report M Abdalla, B Gierlichs, KG Paterson, V Rijmen, AR Sadeghi, NP Smart, ... ECRYPT-CSA, Tech. Rep. H2020-ICT-2014–Project 645421, 2018 | 10 | 2018 |
The low-call diet: Authenticated Encryption for call counting HSM users M Bond, G French, NP Smart, GJ Watson Cryptographers’ Track at the RSA Conference, 359-374, 2013 | 5 | 2013 |
Unidirectional updatable encryption and proxy re-encryption from ddh or lwe P Miao, S Patranabis, G Watson Cryptology ePrint Archive, 2022 | 2 | 2022 |
Provable Security in Practice: Analysis of SSH and CBC mode with Padding GJ Watson Royal Holloway, University of London, 2010 | 2 | 2010 |
A PKI-based Framework for Establishing Efficient MPC Channels D Masny, G Watson Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 1 | 2021 |
Method, system, and computer program product for network bound proxy re-encryption and pin translation S Gaddam, GJ Watson, R Sinha, A Luykx US Patent App. 17/421,587, 2022 | | 2022 |
Method, system, and computer program product for network bound proxy re-encryption and pin translation S Gaddam, GJ Watson, R Sinha, P Mukherjee US Patent App. 17/421,608, 2022 | | 2022 |
Privacy-preserving identity attribute verification using policy tokens KR Wagner, SS Arora, GJ Watson, M Christodorescu, S Agrawal US Patent App. 16/928,367, 2022 | | 2022 |
SYSTEM AND METHOD FOR REVOKING COMPROMISED CRYPTOGRAPHIC KEY FROM DATABASE D MASNY, G WATSON | | 2021 |
White-box Cryptography with Device Binding from Token-based Obfuscation and more S Agrawal, EA Bock, Y Chen, G Watson Cryptology ePrint Archive, 2021 | | 2021 |