Cryptographers' World
 

Victor Shoup


Author's Web Page Link

26 papers and 1 book in database with 4621 citations StarStarStarStar

Editor of 1 conference proceedings book

H-number: 23

Books

 
1. Victor ShoupA Computational Introduction to Number Theory and Algebra. Cambridge University Press, 2009. ISBN 978-0-521-51644-0.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 124 times Red StarRed Star]


Conference Proceedings

 
1. Victor Shoup, editor, Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings. Springer, 2005. ISBN 3-540-28114-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Christian Cachin,  Klaus Kursawe,  Victor Shoup,  Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography, Journal of Cryptology, Volume 18(3), pp. 219 - 246, Springer, 2005.

[Cited 162 times Red StarRed Star]

2. Victor Shoup,  OAEP Reconsidered, Journal of Cryptology, Volume 15(4), pp. 223 - 249, Springer, 2002.

[Cited 282 times Red StarRed StarRed Star]

3. Victor Shoup,  Rosario Gennaro,  Securing Threshold Cryptosystems against Chosen Ciphertext Attack, Journal of Cryptology, Volume 15(2), pp. 75 - 96, Springer, 2002.

[Cited 157 times Red StarRed Star]

4. Victor Shoup,  On the Security of a Practical Identification Scheme, Journal of Cryptology, Volume 12(4), pp. 247 - 260, Springer, 1999.

[Cited 46 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Jan Camenisch,  Nishanth Chandran,  Victor Shoup,  A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks, pp. 351 - 368, EUROCRYPT 2009.

[Electronic Edition][Cited 23 times ]

2. Yevgeniy Dodis,  Victor Shoup,  Shabsi Walfish,  Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs, pp. 515 - 535, CRYPTO 2008.

[Electronic Edition][Cited 4 times ]

3. David Cash,  Eike Kiltz,  Victor Shoup,  The Twin Diffie-Hellman Problem and Applications, pp. 127 - 145, EUROCRYPT 2008.

[Electronic Edition][Cited 56 times Red Star]

4. Masayuki Abe,  Rosario Gennaro,  Kaoru Kurosawa,  Victor Shoup,  Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM, pp. 128 - 146, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 106 times Red StarRed Star]

5. Yevgeniy Dodis,  Aggelos Kiayias,  Antonio Nicolosi,  Victor Shoup,  Anonymous Identification in Ad Hoc Groups, pp. 609 - 626, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 126 times Red StarRed Star]

6. Jan Camenisch,  Victor Shoup,  Practical Verifiable Encryption and Decryption of Discrete Logarithms, pp. 126 - 144, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 227 times Red StarRed Star]

7. Dan Boneh,  Ilya Mironov,  Victor Shoup,  A Secure Signature Scheme from Bilinear Maps, pp. 98 - 110, CT-RSA 2003.

[Electronic Edition][Cited 37 times ]

8. Joy Algesheimer,  Jan Camenisch,  Victor Shoup,  Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products, pp. 417 - 432, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 80 times Red Star]

9. Ronald Cramer,  Victor Shoup,  Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption, pp. 45 - 64, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 236 times Red StarRed Star]

10. Victor Shoup,  OAEP Reconsidered, pp. 239 - 259, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 376 times Red StarRed StarRed Star]

11. Christian Cachin,  Klaus Kursawe,  Frank Petzold,  Victor Shoup,  Secure and Efficient Asynchronous Broadcast Protocols, pp. 524 - 541, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 101 times Red StarRed Star]

12. Victor Shoup,  Practical Threshold Signatures, pp. 207 - 220, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 491 times Red StarRed StarRed Star]

13. Victor Shoup,  Using Hash Functions as a Hedge against Chosen Ciphertext Attack, pp. 275 - 288, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 139 times Red StarRed Star]

14. Victor Shoup,  A Composition Theorem for Universal One-Way Hash Functions, pp. 445 - 452, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 75 times Red Star]

15. Ronald Cramer,  Victor Shoup,  A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack, pp. 13 - 25, CRYPTO 1998.

[Electronic Edition][Cited 792 times Red StarRed StarRed StarRed Star]

16. N. Asokan,  Victor Shoup,  Michael Waidner,  Optimistic Fair Exchange of Digital Signatures (Extended Abstract), pp. 591 - 606, EUROCRYPT 1998.

[Electronic Edition][Cited 550 times Red StarRed StarRed StarRed Star]

17. Victor Shoup,  Rosario Gennaro,  Securing Threshold Cryptosystems against Chosen Ciphertext Attack, pp. 1 - 16, EUROCRYPT 1998.

[Electronic Edition][Cited 139 times Red StarRed Star]

18. Victor Shoup,  Lower Bounds for Discrete Logarithms and Related Problems, pp. 256 - 266, EUROCRYPT 1997.

[Electronic Edition][Cited 530 times Red StarRed StarRed StarRed Star]

19. Victor Shoup,  On Fast and Provably Secure Message Authentication Based on Universal Hashing, pp. 313 - 328, CRYPTO 1996.

[Electronic Edition][Cited 110 times Red StarRed Star]

20. Victor Shoup,  On the Security of a Practical Identification Scheme, pp. 344 - 353, EUROCRYPT 1996.

[Electronic Edition][Cited 33 times ]

21. Victor Shoup,  Aviel D. Rubin,  Session Key Distribution Using Smart Cards, pp. 321 - 331, EUROCRYPT 1996.

[Electronic Edition][Cited 80 times Red Star]

22. Donald Beaver,  Joan Feigenbaum,  Victor Shoup,  Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract), pp. 326 - 338, CRYPTO 1990.

[Electronic Edition][Cited 24 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...