No photo of Victor Shoup

Victor Shoup

Professor Of Computer Science

    1986 …2019

    Research output per year

    If you made any changes in Pure these will be visible here soon.

    Research Output

    2019

    An Improved RNS Variant of the BFV Homomorphic Encryption Scheme

    Halevi, S., Polyakov, Y. & Shoup, V., Jan 1 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Springer Verlag, p. 83-105 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2018

    Doing real work with FHE: The case of logistic regression

    Crawford, J. L. H., Gentry, C., Halevi, S., Platt, D. & Shoup, V., Oct 15 2018, WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018. Association for Computing Machinery, p. 1-12 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Faster homomorphic linear transformations in HElib

    Halevi, S. & Shoup, V., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 93-120 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2017

    Implementing BP-Obfuscation Using graph-induced encoding

    Halevi, S., Halevi, T., Shoup, V. & Stephens-Davidowitz, N., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 783-798 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2015

    Bootstrapping for HElib

    Halevi, S. & Shoup, V., Jan 1 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 641-670 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    GNUC: A New Universal Composability Framework

    Hofheinz, D. & Shoup, V., Jul 12 2015, In : Journal of Cryptology. 28, 3, p. 423-508 86 p.

    Research output: Contribution to journalArticle

    2014

    Algorithms in HElib

    Halevi, S. & Shoup, V., Jan 1 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 1 ed. Springer Verlag, p. 554-571 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8616 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2013

    Practical and employable protocols for UC-secure circuit evaluation over ℤn

    Camenisch, J., Enderlein, R. R. & Shoup, V., Oct 4 2013, Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings. p. 19-37 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8134 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Practical chosen ciphertext secure encryption from factoring

    Hofheinz, D., Kiltz, E. & Shoup, V., Jan 1 2013, In : Journal of Cryptology. 26, 1, p. 102-118 17 p.

    Research output: Contribution to journalArticle

    2011

    A framework for practical universally composable zero-knowledge protocols

    Camenisch, J., Krenn, S. & Shoup, V., Dec 12 2011, Advances in Cryptology, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 449-467 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7073 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Anonymous credentials on Java card

    Bichsel, P., Camenisch, J., Gross, T. & Shoup, V., 2011, 21st Fraunhofer SIT-Smartcard Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2010

    A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack

    Desmedt, Y., Gennaro, R., Kurosawa, K. & Shoup, V., Jan 1 2010, In : Journal of Cryptology. 23, 1, p. 91-120 30 p.

    Research output: Contribution to journalArticle

    Credential authenticated identification and key exchange

    Camenisch, J., Casati, N., Gross, T. & Shoup, V., Sep 29 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 255-276 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Simple and efficient public-key encryption from computational diffie-hellman in the standard model

    Haralambiev, K., Jager, T., Kiltz, E. & Shoup, V., Dec 1 2010, Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6056 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2009

    Anonymous credentials on a standard Java card

    Bichsel, P., Camenisch, J., Groß, T. & Shoup, V., Dec 1 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 600-610 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks

    Camenisch, J., Chandran, N. & Shoup, V., Jul 23 2009, Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 351-368 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    The twin diffie-hellman problem and applications

    Cash, D., Kiltz, E. & Shoup, V., Oct 1 2009, In : Journal of Cryptology. 22, 4, p. 470-504 35 p.

    Research output: Contribution to journalArticle

    2008

    Efficient constructions of composable commitments and zero-knowledge proofs

    Dodis, Y., Shoup, V. & Walfish, S., Sep 22 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    The twin diffie-hellman problem and applications

    Cash, D., Kiltz, E. & Shoup, V., Jun 5 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 127-145 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2006

    Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation

    Bellare, M., Kohno, T. & Shoup, V., Dec 1 2006, In : Proceedings of the ACM Conference on Computer and Communications Security. p. 380-389 10 p., 1180452.

    Research output: Contribution to journalConference article

    2005

    Advances in Cryptology: CRYPTO 2005

    Shoup, V. (ed.), Aug 2005, Springer. 568 p. (LNCS 3621)

    Research output: Book/ReportBook

    Optimistic asynchronous atomic broadcast

    Kursawe, K. & Shoup, V., 2005, Lecture Notes in Computer Science. Caires, L., Italiano, G. F., Monteiro, L., Palamidessi, C. & Yung, M. (eds.). Vol. 3580. p. 204-215 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random oracles in constantinople: Practical asynchronous Byzantine agreement using cryptography

    Cachin, C., Kursawe, K. & Shoup, V., Jul 1 2005, In : Journal of Cryptology. 18, 3, p. 219-246 28 p.

    Research output: Contribution to journalArticle

    Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM

    Abe, M., Gennaro, R., Kurosawa, K. & Shoup, V., Sep 26 2005, In : Lecture Notes in Computer Science. 3494, p. 128-146 19 p.

    Research output: Contribution to journalConference article

    2004
    2003

    Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack

    Cramer, R. & Shoup, V., Nov 1 2003, In : SIAM Journal on Computing. 33, 1, p. 167-226 60 p.

    Research output: Contribution to journalArticle

    Practical verifiable encryption and decryption of discrete logarithms

    Camenisch, J. & Shoup, V., Jan 1 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). Springer Verlag, p. 126-144 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    2002

    Efficient computation modulo a shared secret with application to the generation of shared safe-prime products

    Algesheimer, J., Camenisch, J. & Shoup, V., Jan 1 2002, Advances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings. Yung, M. (ed.). Springer Verlag, p. 417-432 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access

    OAEP Reconsidered

    Shoup, V., Sep 1 2002, In : Journal of Cryptology. 15, 4, p. 223-249 27 p.

    Research output: Contribution to journalArticle

    Securing threshold cryptosystems against chosen ciphertext attack

    Shoup, V. & Gennaro, R., 2002, In : Journal of Cryptology. 15, 2, p. 75-96

    Research output: Contribution to journalArticle

    Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption

    Cramer, R. & Shoup, V., Jan 1 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Knudsen, L. R. (ed.). Springer Verlag, p. 45-64 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access

    Universal hash proofs and a paradigm for chosen ciphertext secure public key encryption

    Cramer, R. & Shoup, V., 2002, Proceedings of Eurocrypt.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2001

    OAEP reconsidered

    Shoup, V., Dec 1 2001, Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings. p. 239-259 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2139 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Secure and efficient asynchronous broadcast protocols

    Cachin, C., Kursawe, K., Petzold, F. & Shoup, V., Jan 1 2001, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139, p. 524-541 18 p.

    Research output: Contribution to journalArticle

    Open Access
    2000

    A composition theorem for universal one-way hash functions

    Shoup, V., 2000, Proceedings of Eurocrypt.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Algorithms for Exponentiation in Finite Fields

    Gao, S., Von Zur Gathen, J., Panario, D. & Shoup, V., Jun 1 2000, In : Journal of Symbolic Computation. 29, 6, p. 879-889 11 p.

    Research output: Contribution to journalArticle

    Factorization in Z[x]: The Searching Phase

    Abbott, J., Shoup, V. & Zimmermann, P., Jan 1 2000, p. 1-7. 7 p.

    Research output: Contribution to conferencePaper

    Optimistic fair exchange of digital signatures

    Asokan, N., Shoup, V. & Waidner, M., Apr 1 2000, In : IEEE Journal on Selected Areas in Communications. 18, 4, p. 593-610 18 p.

    Research output: Contribution to journalArticle

    Practical threshold signatures

    Shoup, V., 2000, Proceedings of Eurocrypt.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random oracles in constantinople: practical asynchronous Byzantine agreement using cryptography

    Cachin, C., Kursawe, K. & Shoup, V., Dec 1 2000, p. 123-132. 10 p.

    Research output: Contribution to conferencePaper

    Signature Schemes Based on the Strong RSA Assumption

    Cramer, R. & Shoup, V., Aug 1 2000, In : ACM Transactions on Information and System Security. 3, 3, p. 161-185 25 p.

    Research output: Contribution to journalArticle

    Using hash functions as a hedge against chosen ciphertext attack

    Shoup, V., 2000, Proceedings of Eurocrypt.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1999

    Efficient computation of minimal polynomials in algebraic extension of finite fields

    Shoup, V., 1999, Proceedings of the International Symposium on Symbolic and Algebraic Computation.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the security of a practical identification

    Shoup, S. V., Jan 1 1999, In : Journal of Cryptology. 12, 4, p. 247-260 14 p.

    Research output: Contribution to journalArticle

    On the security of a practical identification scheme

    Shoup, V., 1999, In : Journal of Cryptology. 12, 4, p. 247-260

    Research output: Contribution to journalArticle

    Signature schemes based on the strong RSA assumption

    Cramer, R. & Shoup, V., 1999, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 46-51 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1998

    A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack

    Cramer, R. & Shoup, V., 1998, Proceedings of CRYPTO.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution