Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Victor Shoup
Search web for home page
Program Committees
1
2010
TCC
pc
2
2008
PKC
pc
3
2008
TCC
general chair
4
2007
TCC
pc
5
2005
Crypto
pc chair
6
2003
Crypto
pc
7
2000
Crypto
pc
8
1999
Eurocrypt
pc
9
1999
CHES
pc
Publications
year
title
booktitle
pages
1
2011
A Framework for Practical Universally Composable Zero-Knowledge Protocols
asiacrypt
449-467
2
2010
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
pkc
1-18
3
2010
Credential Authenticated Identification and Key Exchange
crypto
255-276
4
2010
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
jofc
91-120
5
2010
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
eprint
online
6
2010
Credential Authenticated Identification and Key Exchange
eprint
online
7
2009
The Twin Diffie-Hellman Problem and Applications
jofc
470-504
8
2009
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
eurocrypt
351-368
9
2008
Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs
crypto
515-535
10
2008
The Twin Diffie-Hellman Problem and Applications
eprint
online
11
2008
The Twin Diffie-Hellman Problem and Applications
eurocrypt
127-145
12
2008
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
eprint
online
13
2006
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation
eprint
online
14
2005
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography
jofc
219-246
15
2005
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
eurocrypt
online
16
2004
Sequences of games: a tool for taming complexity in security proofs
eprint
online
17
2004
A Note on An Encryption Scheme of Kurosawa and Desmedt
eprint
online
18
2004
Anonymous Identification in Ad Hoc Groups
eurocrypt
online
19
2003
Practical Verifiable Encryption and Decryption of Discrete Logarithms
crypto
online
20
2002
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
eprint
online
21
2002
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
eurocrypt
online
22
2002
Practical Verifiable Encryption and Decryption of Discrete Logarithms
eprint
online
23
2002
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
crypto
online
24
2002
OAEP Reconsidered
jofc
223-249
25
2002
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
jofc
75-96
26
2001
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
eprint
online
27
2001
A Proposal for an ISO Standard for Public Key Encryption
eprint
online
28
2001
Secure and Efficient Asynchronous Broadcast Protocols
crypto
524-541
29
2001
Secure and Efficient Asynchronous Broadcast Protocols
eprint
online
30
2001
Optimistic Asynchronous Atomic Broadcast
eprint
online
31
2001
OAEP Reconsidered
crypto
239-259
32
2001
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
eprint
online
33
2000
ACE: The Advanced Cryptographic Engine
eprint
online
34
2000
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography
eprint
online
35
2000
OAEP Reconsidered
eprint
online
36
2000
Practical Threshold Signatures
eurocrypt
207-220
37
2000
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
eurocrypt
275-288
38
2000
A Composition Theorem for Universal One-Way Hash Functions
eurocrypt
445-452
39
1999
Signature Schemes Based on the Strong RSA Assumption
eprint
online
40
1999
Practical Threshold Signatures
eprint
online
41
1999
On Formal Models for Secure Key Exchange
eprint
online
42
1999
A Composition Theorem for Universal One-Way Hash Functions
eprint
online
43
1999
On the Security of a Practical Identification Scheme
jofc
247-260
44
1998
A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
eprint
online
45
1998
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
crypto
13-25
46
1998
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
eurocrypt
1-16
47
1998
Optimistic Fair Exchange of Digital Signatures (Extended Abstract)
eurocrypt
591-606
48
1997
Optimistic fair Exchange of Digital Signatures
eprint
online
49
1997
Lower Bounds for Discrete Logarithms and Related Problems
eurocrypt
256-266
50
1996
Private Information Storage
eprint
online
51
1996
On Fast and Provably Secure Message Authentication Based on Universal Hashing
crypto
313-328
52
1996
On the Security of a Practical Identification Scheme
eurocrypt
344-353
53
1996
Session Key Distribution Using Smart Cards
eurocrypt
321-331
54
1990
Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract)
crypto
326-338
Coauthors of Victor Shoup
Masayuki Abe
Joy Algesheimer
N. Asokan
Donald Beaver
Mihir Bellare
Christian Cachin
Jan Camenisch
Nathalie Casati
David Cash
Nishanth Chandran
Ronald Cramer
Yvo Desmedt
Yevgeniy Dodis
Joan Feigenbaum
Rosario Gennaro
Thomas Groß
Kristiyan Haralambiev
Tibor Jager
Aggelos Kiayias
Eike Kiltz
Tadayoshi Kohno
Stephan Krenn
Kaoru Kurosawa
Klaus Kursawe
Antonio Nicolosi
Rafail Ostrovsky
Frank Petzold
Aviel D. Rubin
Thomas Schweinberger
Michael Waidner
Shabsi Walfish