Research Output per year

## Research Output

## An Improved RNS Variant of the BFV Homomorphic Encryption Scheme

Halevi, S., Polyakov, Y. & Shoup, V., 2019,*Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings.*Matsui, M. (ed.). Springer Verlag, p. 83-105 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Doing real work with FHE: The case of logistic regression

Crawford, J. L. H., Gentry, C., Halevi, S., Platt, D. & Shoup, V., Oct 15 2018,*WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018.*Association for Computing Machinery, p. 1-12 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Faster homomorphic linear transformations in HElib

Halevi, S. & Shoup, V., 2018,*Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings.*Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 93-120 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Implementing BP-Obfuscation Using graph-induced encoding

Halevi, S., Halevi, T., Shoup, V. & Stephens-Davidowitz, N., Oct 30 2017,*CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.*Association for Computing Machinery, p. 783-798 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Bootstrapping for HElib

Halevi, S. & Shoup, V., 2015,*Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 641-670 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Algorithms in HElib

Halevi, S. & Shoup, V., 2014,*Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings.*PART 1 ed. Springer Verlag, p. 554-571 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8616 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Practical and employable protocols for UC-secure circuit evaluation over ℤ_{n}

Camenisch, J., Enderlein, R. R. & Shoup, V., 2013, *Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings.*p. 19-37 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8134 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A framework for practical universally composable zero-knowledge protocols

Camenisch, J., Krenn, S. & Shoup, V., 2011,*Advances in Cryptology, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings.*p. 449-467 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7073 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Anonymous credentials on Java card

Bichsel, P., Camenisch, J., Gross, T. & Shoup, V., 2011,*21st Fraunhofer SIT-Smartcard Workshop.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Credential authenticated identification and key exchange

Camenisch, J., Casati, N., Gross, T. & Shoup, V., 2010,*Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings.*p. 255-276 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Simple and efficient public-key encryption from computational diffie-hellman in the standard model

Haralambiev, K., Jager, T., Kiltz, E. & Shoup, V., 2010,*Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings.*p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6056 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Anonymous credentials on a standard Java card

Bichsel, P., Camenisch, J., Groß, T. & Shoup, V., 2009,*CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security.*p. 600-610 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks

Camenisch, J., Chandran, N. & Shoup, V., 2009,*Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 351-368 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient constructions of composable commitments and zero-knowledge proofs

Dodis, Y., Shoup, V. & Walfish, S., 2008,*Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings.*p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## The twin diffie-hellman problem and applications

Cash, D., Kiltz, E. & Shoup, V., 2008,*Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 127-145 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Optimistic asynchronous atomic broadcast

Kursawe, K. & Shoup, V., 2005,*Lecture Notes in Computer Science.*Caires, L., Italiano, G. F., Monteiro, L., Palamidessi, C. & Yung, M. (eds.). Vol. 3580. p. 204-215 12 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient computation modulo a shared secret with application to the generation of shared safe-prime products

Algesheimer, J., Camenisch, J. & Shoup, V., 2002,*Advances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings.*Yung, M. (ed.). Springer Verlag, p. 417-432 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2442).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption

Cramer, R. & Shoup, V., 2002,*Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings.*Knudsen, L. R. (ed.). Springer Verlag, p. 45-64 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Universal hash proofs and a paradigm for chosen ciphertext secure public key encryption

Cramer, R. & Shoup, V., 2002,*Proceedings of Eurocrypt.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## OAEP reconsidered

Shoup, V., 2001,*Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings.*Kilian, J. (ed.). Springer Verlag, p. 239-259 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2139 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A composition theorem for universal one-way hash functions

Shoup, V., 2000,*Proceedings of Eurocrypt.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Practical threshold signatures

Shoup, V., 2000,*Proceedings of Eurocrypt.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Using hash functions as a hedge against chosen ciphertext attack

Shoup, V., 2000,*Proceedings of Eurocrypt.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient computation of minimal polynomials in algebraic extension of finite fields

Shoup, V., 1999,*Proceedings of the International Symposium on Symbolic and Algebraic Computation.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Signature schemes based on the strong RSA assumption

Cramer, R. & Shoup, V., 1999,*Proceedings of the ACM Conference on Computer and Communications Security.*ACM, p. 46-51 6 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack

Cramer, R. & Shoup, V., 1998,*Proceedings of CRYPTO.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Optimistic fair exchange of digital signatures

Asokan, N., Shoup, V. & Waidner, M., 1998,*Advances in Cryptology — EUROCRYPT 1998, International Conference on the Theory and Application of Cryptographic Techniques, Proceedings.*Nyberg, K. (ed.). Springer Verlag, p. 591-606 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1403).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Securing threshold cryptosystems against chosen ciphertext attack

Shoup, V. & Gennaro, R., 1998,*Proceedings of Eurocrypt.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Lower bounds for discrete logarithms and related problems

Shoup, V., 1997,*Proceedings of Eurocrypt .*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On fast and provably secure message authentication based on universal hashing

Shoup, V., 1996,*Proceedings of CRYPTO.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the security of a practical identification scheme

Shoup, V., 1996,*Advances in Cryptology - EUROCRYPT 1996 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings.*Maurer, U. (ed.). Springer Verlag, p. 344-353 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1070).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Session key distribution using smart cards

Shoup, V. & Rubin, A., 1996,*Advances in Cryptology - EUROCRYPT 1996 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings.*Maurer, U. (ed.). Springer Verlag, p. 321-331 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1070).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Counting the number of points on elliptic curves of characteristic greater than three

Lehmann, F., Mauerer, M., Mueller, V. & Shoup, V., 1994,*Proceedings of the First Algorithmic Number Theory Symposium.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Counting the number of points on elliptic curves over finite fields of characteristic greater than three

Lehmann, F., Maurer, M., Müller, V. & Shoup, V., 1994,*Algorithmic Number Theory - 1st International Symposium, ANTS-I, Proceedings.*Adleman, L. M. & Huang, M-D. (eds.). Springer Verlag, p. 60-70 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 877 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Factoring polynomials over finite fields: Asymptotic complexity vs. reality

Shoup, V., 1993,*Proceedings of the IMACS Symposium.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Fast construction of irreducible polynomials over finite fields

Shoup, V., 1993,*Proceedings of the Fourth Annual ACM-SIAM Symposium on Discrete Algorithms.*Publ by ACM, p. 484-492 9 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Computing Frobenius maps and factoring polynomials

Von Zur Gathen, J. & Shoup, V., Jul 1 1992,*Proceedings of the 24th Annual ACM Symposium on Theory of Computing, STOC 1992.*Association for Computing Machinery, p. 97-105 9 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. Part F129722).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A fast deterministic algorithm for factoring polynomials over finite fields of small characteristic

Shoup, V., Jun 1 1991,*ISSAC 1991 - Proceedings of the 1991 International Symposium on Symbolic and Algebraic Computation.*Watt, S. M. (ed.). Association for Computing Machinery, p. 14-21 8 p. (Proceedings of the International Symposium on Symbolic and Algebraic Computation, ISSAC).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Constructing nonresidues in finite fields riemann hypothesis (Preliminary Version)

Buchmann, J. & Shoup, V., Jan 3 1991,*Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, STOC 1991.*Association for Computing Machinery, p. 72-79 8 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. Part F130073).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Hiding instances in zero-knowledge proof systems

Beaver, D., Feigenbaum, J. & Shoup, V., 1991,*Advances in Cryptology – CRYPTO 1990, Proceedings.*Menezes, A. J. & Vanstone, S. A. (eds.). Springer Verlag, p. 326-338 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 537 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Lower bounds for polynomial evaluation and interpolation problems

Shoup, V. & Smolensky, R., Dec 1991,*Annual Symposium on Foundations of Computer Science (Proceedings).*Publ by IEEE, p. 378-383 6 p. (Annual Symposium on Foundations of Computer Science (Proceedings)).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Searching for primitive roots in finite fields

Shoup, V., 1990,*Proc 22nd Annu ACM Symp Theory Comput.*Publ by ACM, p. 546-554 9 p. (Proc 22nd Annu ACM Symp Theory Comput).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## New algorithms for finding irreducible polynomials over finite fields

Shoup, V., 1988,*Annual Symposium on Foundations of Computer Science (Proceedings).*Publ by IEEE, p. 283-290 8 p. (Annual Symposium on Foundations of Computer Science (Proceedings)).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution