Research Output per year

## Research Output

## An Improved RNS Variant of the BFV Homomorphic Encryption Scheme

Halevi, S., Polyakov, Y. & Shoup, V., Jan 1 2019,*Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings.*Matsui, M. (ed.). Springer Verlag, p. 83-105 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Doing real work with FHE: The case of logistic regression

Crawford, J. L. H., Gentry, C., Halevi, S., Platt, D. & Shoup, V., Oct 15 2018,*WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018.*Association for Computing Machinery, p. 1-12 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Faster homomorphic linear transformations in HElib

Halevi, S. & Shoup, V., Jan 1 2018,*Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings.*Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 93-120 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Implementing BP-Obfuscation Using graph-induced encoding

Halevi, S., Halevi, T., Shoup, V. & Stephens-Davidowitz, N., Oct 30 2017,*CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.*Association for Computing Machinery, p. 783-798 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A computational introduction to number theory and Algebra

Shoup, V., Jan 1 2015, Cambridge University Press. 580 p.Research output: Book/Report › Book

## Bootstrapping for HElib

Halevi, S. & Shoup, V., Jan 1 2015,*Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 641-670 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## GNUC: A New Universal Composability Framework

Hofheinz, D. & Shoup, V., Jul 12 2015, In : Journal of Cryptology. 28, 3, p. 423-508 86 p.Research output: Contribution to journal › Article

## Algorithms in HElib

Halevi, S. & Shoup, V., Jan 1 2014,*Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings.*PART 1 ed. Springer Verlag, p. 554-571 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8616 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Practical and employable protocols for UC-secure circuit evaluation over ℤ_{n}

Camenisch, J., Enderlein, R. R. & Shoup, V., Oct 4 2013, *Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings.*p. 19-37 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8134 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Practical chosen ciphertext secure encryption from factoring

Hofheinz, D., Kiltz, E. & Shoup, V., Jan 1 2013, In : Journal of Cryptology. 26, 1, p. 102-118 17 p.Research output: Contribution to journal › Article

## A framework for practical universally composable zero-knowledge protocols

Camenisch, J., Krenn, S. & Shoup, V., Dec 12 2011,*Advances in Cryptology, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings.*p. 449-467 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7073 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Anonymous credentials on Java card

Bichsel, P., Camenisch, J., Gross, T. & Shoup, V., 2011,*21st Fraunhofer SIT-Smartcard Workshop.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack

Desmedt, Y., Gennaro, R., Kurosawa, K. & Shoup, V., Jan 1 2010, In : Journal of Cryptology. 23, 1, p. 91-120 30 p.Research output: Contribution to journal › Article

## Credential authenticated identification and key exchange

Camenisch, J., Casati, N., Gross, T. & Shoup, V., Sep 29 2010,*Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings.*p. 255-276 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Simple and efficient public-key encryption from computational diffie-hellman in the standard model

Haralambiev, K., Jager, T., Kiltz, E. & Shoup, V., Dec 1 2010,*Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings.*p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6056 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Anonymous credentials on a standard Java card

Bichsel, P., Camenisch, J., Groß, T. & Shoup, V., Dec 1 2009,*CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security.*p. 600-610 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks

Camenisch, J., Chandran, N. & Shoup, V., Jul 23 2009,*Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 351-368 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## The twin diffie-hellman problem and applications

Cash, D., Kiltz, E. & Shoup, V., Oct 1 2009, In : Journal of Cryptology. 22, 4, p. 470-504 35 p.Research output: Contribution to journal › Article

## Efficient constructions of composable commitments and zero-knowledge proofs

Dodis, Y., Shoup, V. & Walfish, S., Sep 22 2008,*Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings.*p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## The twin diffie-hellman problem and applications

Cash, D., Kiltz, E. & Shoup, V., Jun 5 2008,*Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 127-145 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation

Bellare, M., Kohno, T. & Shoup, V., Dec 1 2006, In : Proceedings of the ACM Conference on Computer and Communications Security. p. 380-389 10 p., 1180452.Research output: Contribution to journal › Conference article

## A computational introduction to number theory and algebra

Shoup, V., Jan 1 2005, Cambridge University Press. 517 p.Research output: Book/Report › Book

## Advances in Cryptology: CRYPTO 2005

Shoup, V. (ed.), Aug 2005, Springer. 568 p. (LNCS 3621)Research output: Book/Report › Book

## Optimistic asynchronous atomic broadcast

Kursawe, K. & Shoup, V., 2005,*Lecture Notes in Computer Science.*Caires, L., Italiano, G. F., Monteiro, L., Palamidessi, C. & Yung, M. (eds.). Vol. 3580. p. 204-215 12 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Random oracles in constantinople: Practical asynchronous Byzantine agreement using cryptography

Cachin, C., Kursawe, K. & Shoup, V., Jul 1 2005, In : Journal of Cryptology. 18, 3, p. 219-246 28 p.Research output: Contribution to journal › Article

## Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM

Abe, M., Gennaro, R., Kurosawa, K. & Shoup, V., Sep 26 2005, In : Lecture Notes in Computer Science. 3494, p. 128-146 19 p.Research output: Contribution to journal › Conference article

## Anonymous identification in ad hoc groups

Dodis, Y., Kiayias, A., Nicolosi, A. & Shoup, V., Dec 1 2004, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027, p. 609-626 18 p.Research output: Contribution to journal › Article

## A secure signature scheme from bilinear maps

Boneh, D., Mironov, I. & Shoup, V., Dec 1 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612, p. 98-110 13 p.Research output: Contribution to journal › Article

## Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack

Cramer, R. & Shoup, V., Nov 1 2003, In : SIAM Journal on Computing. 33, 1, p. 167-226 60 p.Research output: Contribution to journal › Article

## Practical verifiable encryption and decryption of discrete logarithms

Camenisch, J. & Shoup, V., Jan 1 2003,*Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).*Boneh, D. (ed.). Springer Verlag, p. 126-144 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

Research output: Chapter in Book/Report/Conference proceeding › Chapter

## Efficient computation modulo a shared secret with application to the generation of shared safe-prime products

Algesheimer, J., Camenisch, J. & Shoup, V., Jan 1 2002,*Advances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings.*Yung, M. (ed.). Springer Verlag, p. 417-432 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2442).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## OAEP Reconsidered

Shoup, V., Sep 1 2002, In : Journal of Cryptology. 15, 4, p. 223-249 27 p.Research output: Contribution to journal › Article

## Securing threshold cryptosystems against chosen ciphertext attack

Shoup, V. & Gennaro, R., 2002, In : Journal of Cryptology. 15, 2, p. 75-96Research output: Contribution to journal › Article

## Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption

Cramer, R. & Shoup, V., Jan 1 2002,*Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings.*Knudsen, L. R. (ed.). Springer Verlag, p. 45-64 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Universal hash proofs and a paradigm for chosen ciphertext secure public key encryption

Cramer, R. & Shoup, V., 2002,*Proceedings of Eurocrypt.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## OAEP reconsidered

Shoup, V., Dec 1 2001,*Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings.*p. 239-259 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2139 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Secure and efficient asynchronous broadcast protocols

Cachin, C., Kursawe, K., Petzold, F. & Shoup, V., Jan 1 2001, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139, p. 524-541 18 p.Research output: Contribution to journal › Article

## A composition theorem for universal one-way hash functions

Shoup, V., 2000,*Proceedings of Eurocrypt.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Algorithms for Exponentiation in Finite Fields

Gao, S., Von Zur Gathen, J., Panario, D. & Shoup, V., Jun 1 2000, In : Journal of Symbolic Computation. 29, 6, p. 879-889 11 p.Research output: Contribution to journal › Article

## Factorization in Z[x]: The Searching Phase

Abbott, J., Shoup, V. & Zimmermann, P., Jan 1 2000, p. 1-7. 7 p.Research output: Contribution to conference › Paper

## Optimistic fair exchange of digital signatures

Asokan, N., Shoup, V. & Waidner, M., Apr 1 2000, In : IEEE Journal on Selected Areas in Communications. 18, 4, p. 593-610 18 p.Research output: Contribution to journal › Article

## Practical threshold signatures

Shoup, V., 2000,*Proceedings of Eurocrypt.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Random oracles in constantinople: practical asynchronous Byzantine agreement using cryptography

Cachin, C., Kursawe, K. & Shoup, V., Dec 1 2000, p. 123-132. 10 p.Research output: Contribution to conference › Paper

## Signature Schemes Based on the Strong RSA Assumption

Cramer, R. & Shoup, V., Aug 1 2000, In : ACM Transactions on Information and System Security. 3, 3, p. 161-185 25 p.Research output: Contribution to journal › Article

## Using hash functions as a hedge against chosen ciphertext attack

Shoup, V., 2000,*Proceedings of Eurocrypt.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient computation of minimal polynomials in algebraic extension of finite fields

Shoup, V., 1999,*Proceedings of the International Symposium on Symbolic and Algebraic Computation.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the security of a practical identification

Shoup, S. V., Jan 1 1999, In : Journal of Cryptology. 12, 4, p. 247-260 14 p.Research output: Contribution to journal › Article

## On the security of a practical identification scheme

Shoup, V., 1999, In : Journal of Cryptology. 12, 4, p. 247-260Research output: Contribution to journal › Article

## Signature schemes based on the strong RSA assumption

Cramer, R. & Shoup, V., 1999,*Proceedings of the ACM Conference on Computer and Communications Security.*ACM, p. 46-51 6 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack

Cramer, R. & Shoup, V., 1998,*Proceedings of CRYPTO.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution