Gaven J. Watson

Affiliations:
  • Visa Research


According to our database1, Gaven J. Watson authored at least 17 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

2022
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE.
IACR Cryptol. ePrint Arch., 2022

Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures.
IACR Cryptol. ePrint Arch., 2022

2021
White-box Cryptography with Device Binding from Token-based Obfuscation and more.
IACR Cryptol. ePrint Arch., 2021

Reducing HSM Reliance in Payments through Proxy Re-Encryption.
Proceedings of the 30th USENIX Security Symposium, 2021

A PKI-based Framework for Establishing Efficient MPC Channels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2013
Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol.
IACR Cryptol. ePrint Arch., 2013

The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

An analysis of the EMV channel establishment protocol.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
LoSt: location based storage.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

Authenticated-Encryption with Padding: A Formal Security Treatment.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Provable Security in the Real World.
IEEE Secur. Priv., 2011

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Plaintext Recovery Attacks against SSH.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008


  Loading...