Gavin Lowe | |
---|---|
Nationality | British |
Alma mater | Oxford University |
Scientific career | |
Fields | Computer Science |
Institutions | University of Oxford (from 2000) [1] University of Leicester (until 2000) [2] |
Thesis | Probabilities and Priorities in Timed CSP (1993) |
Doctoral advisor | Bill Roscoe |
Gavin Lowe is a British academic. He is a professor of computer science [3] and tutorial fellow at St Catherine's College, Oxford, [1] a professor at the University of Oxford, [3] and President of the Senior Common Room of St Catherine's College, Oxford. [1] His research interests include computer security, for which he developed the cryptographic protocol analysis tool Casper, and concurrency.
Lowe studied mathematics as an undergraduate at St John's College, Oxford, [4] then took an MSc in computation at the University of Oxford. [1] He undertook a DPhil at St Hugh's College, Oxford, [5] writing a thesis titled Probabilities and Priorities in Timed CSP. [5] [6] He published a paper detailing an attack on the Needham–Schroeder protocol, as well as a method to fix the issue, in 1995. [7] [8] The fixed version of the protocol described in the paper is referred to as the Needham–Shroeder–Lowe protocol. [9]
His research interests have included computer security, for which he developed the cryptographic protocol analysis tool Casper. [10] This tool translates a security protocol description into CSP, which is then processed by the FDR refinement checker. Recently, he has moved to researching the field of concurrency. [3]
He was Program Co-chair of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security in 2010. [11]
Lowe is a distinguished teacher, having won teaching awards in 2008 [12] and 2010. [13] [14] Along with Peter Millican, he is responsible for the development and establishment of a new joint degree in Computer Science and Philosophy at the University of Oxford in 2012. [13] [15]
Lowe enjoys caving. [16] He was the secretary of the Oxford University Cave Club from 1988 to 1989, and tackle master in 1990. [4]
Andrew D. Gordon is a British computer scientist previously employed by Microsoft Research. His research interests include programming language design, formal methods, concurrency, cryptography, and access control.
In computer science, communicating sequential processes (CSP) is a formal language for describing patterns of interaction in concurrent systems. It is a member of the family of mathematical theories of concurrency known as process algebras, or process calculi, based on message passing via channels. CSP was highly influential in the design of the occam programming language and also influenced the design of programming languages such as Limbo, RaftLib, Erlang, Go, Crystal, and Clojure's core.async.
Manuel Blum is a Venezuelan born American computer scientist who received the Turing Award in 1995 "In recognition of his contributions to the foundations of computational complexity theory and its application to cryptography and program checking".
The Needham–Schroeder protocol is one of the two key transport protocols intended for use over an insecure network, both proposed by Roger Needham and Michael Schroeder. These are:
A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives. A protocol describes how the algorithms should be used and includes details about data structures and representations, at which point it can be used to implement multiple, interoperable versions of a program.
Provable security refers to any type or level of computer security that can be proved. It is used in different ways by different fields.
Andrew William Roscoe is a Scottish computer scientist. He was Head of the Department of Computer Science, University of Oxford from 2003 to 2014, and is a Professor of Computer Science. He is also a Fellow of University College, Oxford.
CSP may refer to:
The Department of Computer Science is the computer science department of the University of Oxford, England, which is part of the university's Mathematical, Physical and Life Sciences Division. It was founded in 1957 as the Computing Laboratory. By 2014 the staff count was 52 members of academic staff and over 80 research staff. The 2019, 2020 and 2021 Times World University Subject Rankings places Oxford University 1st in the world for Computer Science. Oxford University is also the top university for computer science in the UK and Europe according to Business Insider. The 2020 QS University Subject Rankings places The University of Oxford 5th in the world for Computer Science.
Michael Schroeder is an American computer scientist. His areas of research include computer security, distributed systems and operating systems and he is perhaps best known as the co-inventor of the Needham–Schroeder protocol. In 2001 he co-founded the Microsoft Research Silicon Valley lab and was the assistant managing director until the lab was disbanded in 2014.
In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication. It is often a random or pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused in replay attacks. They can also be useful as initialization vectors and in cryptographic hash functions.
Michael J. Butler is an Irish computer scientist. As of 2022, he is professor of computer science and Dean of the Faculty of Engineering and Physical Sciences at the University of Southampton, England.
Martín Abadi is an Argentine computer scientist, working at Google as of 2024. He earned his Doctor of Philosophy (PhD) in computer science from Stanford University in 1987 as a student of Zohar Manna.
Roger Michael Needham was a British computer scientist.
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution, which offers an information-theoretically secure solution to the key exchange problem. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. For example, it is impossible to copy data encoded in a quantum state. If one attempts to read the encoded data, the quantum state will be changed due to wave function collapse. This could be used to detect eavesdropping in quantum key distribution (QKD).
Michael Goldsmith is a British computer scientist, senior research fellow and Lecturer at the University of Oxford, England. He is a member of Oxford University's Department of Computer Science. He is an associate director of Oxford University's Cyber Security Centre, and an Oxford Martin Fellow of The Global Cyber Security Capacity Centre. He is a fellow of Worcester College, Oxford.
Casimier Joseph Franciscus "Cas" Cremers is a computer scientist and a faculty member at the CISPA Helmholtz Center for Information Security in Saarbruecken, Germany.
Steve Schneider FBCS, CITP is an English computer scientist and Professor of Security. He is Director of the Surrey Centre for Cyber Security and Associate Dean at the University of Surrey.
Ran Canetti is a professor of Computer Science at Boston University. and the director of the Check Point Institute for Information Security and of the Center for Reliable Information System and Cyber Security. He is also associate editor of the Journal of Cryptology and Information and Computation. His main areas of research span cryptography and information security, with an emphasis on the design, analysis and use of cryptographic protocols.
{{cite book}}
: CS1 maint: others (link)