Victor Shoup
Orcid: 0009-0003-6996-5660
According to our database1,
Victor Shoup
authored at least 97 papers
between 1988 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on shoup.net
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
The many faces of Schnorr: a toolkit for the modular design of threshold Schnorr signatures.
IACR Commun. Cryptol., 2025
Proceedings of the 39th International Symposium on Distributed Computing, 2025
Proceedings of the 2025 IEEE International Conference on Blockchain and Cryptocurrency, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 38th International Symposium on Distributed Computing, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
2014
2013
Practical and Employable Protocols for UC-Secure Circuit Evaluation over Z<sub>n</sub>.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack.
J. Cryptol., 2010
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Advances in Cryptology, 2010
2009
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks.
Proceedings of the Advances in Cryptology, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
A computational introduction to number theory and algebra.
Cambridge University Press, ISBN: 978-0-521-85154-1, 2006
2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
Proceedings of the Advances in Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Advances in Cryptology, 2004
2003
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack.
SIAM J. Comput., 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
2002
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products.
Proceedings of the Advances in Cryptology, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Universal Hash Proofs and and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
Electron. Colloquium Comput. Complex., 2001
Proceedings of the Advances in Cryptology, 2001
2000
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography.
IACR Cryptol. ePrint Arch., 2000
Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000
Proceedings of the 2000 International Symposium on Symbolic and Algebraic Computation, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Efficient Computation of Minimal Polynomials in Algebraic Extensions of Finite Fields.
Proceedings of the 1999 International Symposium on Symbolic and Algebraic Computation, 1999
Proceedings of the CCS '99, 1999
1998
Proceedings of the Security and Privacy, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997
Proceedings of the 1997 International Symposium on Symbolic and Algebraic Computation, 1997
Proceedings of the Advances in Cryptology, 1997
1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
J. Symb. Comput., 1995
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
1994
Counting the number of points on elliptic curves over finite fields of characteristic greater than three.
Proceedings of the Algorithmic Number Theory, First International Symposium, 1994
1993
Proceedings of the Fourth Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, 1993
1992
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992
1991
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991
A Fast Deterministic Algorithm for Factoring Polynomials over Finite Fields of Small Characteristic.
Proceedings of the 1991 International Symposium on Symbolic and Algebraic Computation, 1991
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991
1990
Inf. Process. Lett., 1990
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990
Proceedings of the Advances in Cryptology, 1990
1988
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988