Publications
  1. M-F. Lee, N.P. Smart, B. Warinschi and G.J. Watson.
    Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol.
    To appear in International Journal of Information Security. (pdf)

  2. C. Brzuska, N.P. Smart, B. Warinschi and G.J. Watson.
    An Analysis of the EMV Channel Establishment Protocol.
    In A-R. Sadeghi, V.D. Gligor and M. Yung, (eds.), 20th ACM Conference on Computer and Communications Security, CCS 2013, pp. 373-386. ACM, 2013. (pdf)

  3. M. Bond, G. French, N.P. Smart and G.J. Watson.
    The Low-Call Diet: Authenticated Encryption for Call Counting HSM users.
    In E. Dawson (ed.), CT-RSA 2013, Lecture Notes in Computer Science Vol. 7779, pp. 359-374, Springer-Verlag, Berlin, 2013. (pdf)

  4. G.J. Watson, R. Safavi-Naini, M. Alimomeni, M. Locasto and S. Narayan.
    LoSt: Location Based Storage.
    In S. Capkun and S. Kamara (eds.), Cloud Computing Security Workshop, CCSW 2012, pp. 59-70, ACM, 2012.

  5. K.G. Paterson and G.J. Watson.
    Authenticated-Encryption with Padding: A Formal Security Treatment.
    In D. Naccache (ed.), Cryptography and Security, Lecture Notes in Computer Science Vol. 6805, pp. 83-107, Springer-Verlag, Berlin, 2011.

  6. J.P. Degabriele, K.G. Paterson and G.J. Watson,
    Provable Security in the Real World
    In IEEE Security and Privacy, vol. 9, no. 3, pp. 33-41, May/June 2011.

  7. M.R. Albrecht, P. Farshim, K.G. Paterson and G.J. Watson,
    On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model.
    In A. Joux (ed.), FSE 2011, Lecture Notes in Computer Science Vol. 6733, pp. 128-145, Springer-Verlag, Berlin, 2011. (Full Version)

  8. K.G. Paterson and G.J. Watson,
    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR.
    In H. Gilbert (ed.), EUROCRYPT 2010, Lecture Notes in Computer Science Vol. 6110, pp. 345-361, Springer-Verlag, Berlin, 2010. (Full Version)

  9. M.R. Albrecht, K.G. Paterson and G.J. Watson,
    Plaintext Recovery Attacks Against SSH.
    In IEEE Symposium on Security and Privacy, 2009. (pdf)

  10. K.G. Paterson and G.J. Watson,
    Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment.
    In R. Ostrovsky, R. De Prisco and I. Visconti (eds.), SCN 2008, Lecture Notes in Computer Science Vol. 5229, pp. 340-357, Springer-Verlag, Berlin, 2008.