No photo of Victor Shoup

Victor Shoup

Professor Of Computer Science

    1986 …2019

    Research output per year

    If you made any changes in Pure these will be visible here soon.

    Research Output

    Filter
    Conference contribution
    2019

    An Improved RNS Variant of the BFV Homomorphic Encryption Scheme

    Halevi, S., Polyakov, Y. & Shoup, V., 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Springer Verlag, p. 83-105 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2018

    Doing real work with FHE: The case of logistic regression

    Crawford, J. L. H., Gentry, C., Halevi, S., Platt, D. & Shoup, V., Oct 15 2018, WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018. Association for Computing Machinery, p. 1-12 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Faster homomorphic linear transformations in HElib

    Halevi, S. & Shoup, V., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 93-120 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2017

    Implementing BP-Obfuscation Using graph-induced encoding

    Halevi, S., Halevi, T., Shoup, V. & Stephens-Davidowitz, N., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 783-798 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2015

    Bootstrapping for HElib

    Halevi, S. & Shoup, V., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 641-670 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2014

    Algorithms in HElib

    Halevi, S. & Shoup, V., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 1 ed. Springer Verlag, p. 554-571 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8616 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2013

    Practical and employable protocols for UC-secure circuit evaluation over ℤn

    Camenisch, J., Enderlein, R. R. & Shoup, V., 2013, Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings. p. 19-37 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8134 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2011

    A framework for practical universally composable zero-knowledge protocols

    Camenisch, J., Krenn, S. & Shoup, V., 2011, Advances in Cryptology, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 449-467 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7073 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Anonymous credentials on Java card

    Bichsel, P., Camenisch, J., Gross, T. & Shoup, V., 2011, 21st Fraunhofer SIT-Smartcard Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2010

    Credential authenticated identification and key exchange

    Camenisch, J., Casati, N., Gross, T. & Shoup, V., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 255-276 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Simple and efficient public-key encryption from computational diffie-hellman in the standard model

    Haralambiev, K., Jager, T., Kiltz, E. & Shoup, V., 2010, Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6056 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2009

    Anonymous credentials on a standard Java card

    Bichsel, P., Camenisch, J., Groß, T. & Shoup, V., 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 600-610 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks

    Camenisch, J., Chandran, N. & Shoup, V., 2009, Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 351-368 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2008

    Efficient constructions of composable commitments and zero-knowledge proofs

    Dodis, Y., Shoup, V. & Walfish, S., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    The twin diffie-hellman problem and applications

    Cash, D., Kiltz, E. & Shoup, V., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 127-145 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2005

    Optimistic asynchronous atomic broadcast

    Kursawe, K. & Shoup, V., 2005, Lecture Notes in Computer Science. Caires, L., Italiano, G. F., Monteiro, L., Palamidessi, C. & Yung, M. (eds.). Vol. 3580. p. 204-215 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2002

    Efficient computation modulo a shared secret with application to the generation of shared safe-prime products

    Algesheimer, J., Camenisch, J. & Shoup, V., 2002, Advances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings. Yung, M. (ed.). Springer Verlag, p. 417-432 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access

    Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption

    Cramer, R. & Shoup, V., 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Knudsen, L. R. (ed.). Springer Verlag, p. 45-64 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access

    Universal hash proofs and a paradigm for chosen ciphertext secure public key encryption

    Cramer, R. & Shoup, V., 2002, Proceedings of Eurocrypt.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2001

    OAEP reconsidered

    Shoup, V., 2001, Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings. Kilian, J. (ed.). Springer Verlag, p. 239-259 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2139 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2000

    A composition theorem for universal one-way hash functions

    Shoup, V., 2000, Proceedings of Eurocrypt.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Practical threshold signatures

    Shoup, V., 2000, Proceedings of Eurocrypt.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Using hash functions as a hedge against chosen ciphertext attack

    Shoup, V., 2000, Proceedings of Eurocrypt.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1999

    Efficient computation of minimal polynomials in algebraic extension of finite fields

    Shoup, V., 1999, Proceedings of the International Symposium on Symbolic and Algebraic Computation.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Signature schemes based on the strong RSA assumption

    Cramer, R. & Shoup, V., 1999, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 46-51 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1998

    A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack

    Cramer, R. & Shoup, V., 1998, Proceedings of CRYPTO.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Optimistic fair exchange of digital signatures

    Asokan, N., Shoup, V. & Waidner, M., 1998, Advances in Cryptology — EUROCRYPT 1998, International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Nyberg, K. (ed.). Springer Verlag, p. 591-606 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1403).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Securing threshold cryptosystems against chosen ciphertext attack

    Shoup, V. & Gennaro, R., 1998, Proceedings of Eurocrypt.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1997

    Lower bounds for discrete logarithms and related problems

    Shoup, V., 1997, Proceedings of Eurocrypt .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1996

    On fast and provably secure message authentication based on universal hashing

    Shoup, V., 1996, Proceedings of CRYPTO.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the security of a practical identification scheme

    Shoup, V., 1996, Advances in Cryptology - EUROCRYPT 1996 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Maurer, U. (ed.). Springer Verlag, p. 344-353 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1070).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access

    Session key distribution using smart cards

    Shoup, V. & Rubin, A., 1996, Advances in Cryptology - EUROCRYPT 1996 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Maurer, U. (ed.). Springer Verlag, p. 321-331 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1070).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1994

    Counting the number of points on elliptic curves of characteristic greater than three

    Lehmann, F., Mauerer, M., Mueller, V. & Shoup, V., 1994, Proceedings of the First Algorithmic Number Theory Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Counting the number of points on elliptic curves over finite fields of characteristic greater than three

    Lehmann, F., Maurer, M., Müller, V. & Shoup, V., 1994, Algorithmic Number Theory - 1st International Symposium, ANTS-I, Proceedings. Adleman, L. M. & Huang, M-D. (eds.). Springer Verlag, p. 60-70 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 877 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1993

    Factoring polynomials over finite fields: Asymptotic complexity vs. reality

    Shoup, V., 1993, Proceedings of the IMACS Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fast construction of irreducible polynomials over finite fields

    Shoup, V., 1993, Proceedings of the Fourth Annual ACM-SIAM Symposium on Discrete Algorithms. Publ by ACM, p. 484-492 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1992

    Computing Frobenius maps and factoring polynomials

    Von Zur Gathen, J. & Shoup, V., Jul 1 1992, Proceedings of the 24th Annual ACM Symposium on Theory of Computing, STOC 1992. Association for Computing Machinery, p. 97-105 9 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. Part F129722).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1991

    A fast deterministic algorithm for factoring polynomials over finite fields of small characteristic

    Shoup, V., Jun 1 1991, ISSAC 1991 - Proceedings of the 1991 International Symposium on Symbolic and Algebraic Computation. Watt, S. M. (ed.). Association for Computing Machinery, p. 14-21 8 p. (Proceedings of the International Symposium on Symbolic and Algebraic Computation, ISSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Constructing nonresidues in finite fields riemann hypothesis (Preliminary Version)

    Buchmann, J. & Shoup, V., Jan 3 1991, Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, STOC 1991. Association for Computing Machinery, p. 72-79 8 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. Part F130073).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hiding instances in zero-knowledge proof systems

    Beaver, D., Feigenbaum, J. & Shoup, V., 1991, Advances in Cryptology – CRYPTO 1990, Proceedings. Menezes, A. J. & Vanstone, S. A. (eds.). Springer Verlag, p. 326-338 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access

    Lower bounds for polynomial evaluation and interpolation problems

    Shoup, V. & Smolensky, R., Dec 1991, Annual Symposium on Foundations of Computer Science (Proceedings). Publ by IEEE, p. 378-383 6 p. (Annual Symposium on Foundations of Computer Science (Proceedings)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1990

    Searching for primitive roots in finite fields

    Shoup, V., 1990, Proc 22nd Annu ACM Symp Theory Comput. Publ by ACM, p. 546-554 9 p. (Proc 22nd Annu ACM Symp Theory Comput).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1988

    New algorithms for finding irreducible polynomials over finite fields

    Shoup, V., 1988, Annual Symposium on Foundations of Computer Science (Proceedings). Publ by IEEE, p. 283-290 8 p. (Annual Symposium on Foundations of Computer Science (Proceedings)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution