Gaven J. Watson

Affiliations:
  • Visa Research


According to our database1, Gaven J. Watson authored at least 17 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

2022
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE.
IACR Cryptol. ePrint Arch., 2022

Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures.
IACR Cryptol. ePrint Arch., 2022

2021
A PKI-based Framework for Establishing Efficient MPC Channels.
IACR Cryptol. ePrint Arch., 2021

Reducing HSM Reliance in Payments through Proxy Re-Encryption.
IACR Cryptol. ePrint Arch., 2021

White-box Cryptography with Device Binding from Token-based Obfuscation and more.
IACR Cryptol. ePrint Arch., 2021

2013
Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol.
IACR Cryptol. ePrint Arch., 2013

An Analysis of the EMV Channel Establishment Protocol.
IACR Cryptol. ePrint Arch., 2013

2012
The low-call diet: Authenticated Encryption for call counting HSM users.
IACR Cryptol. ePrint Arch., 2012

LoSt: location based storage.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

Authenticated-Encryption with Padding: A Formal Security Treatment.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Provable Security in the Real World.
IEEE Secur. Priv., 2011

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model.
IACR Cryptol. ePrint Arch., 2011

2010
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR.
IACR Cryptol. ePrint Arch., 2010

2009
Plaintext Recovery Attacks against SSH.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008


  Loading...