Victor Shoup
Affiliations: | Computer Science | New York University, New York, NY, United States |
Area:
Computer ScienceGoogle:
"Victor Shoup"Children
Sign in to add traineeAntonio R. Nicolosi | grad student | 2007 | NYU |
Sze-Ming Chow | grad student | 2010 | NYU |
Kristiyan Haralambiev | grad student | 2011 | NYU |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Hofheinz D, Shoup V. (2015) GNUC: A New Universal Composability Framework Journal of Cryptology. 28: 423-508 |
Halevi S, Shoup V. (2015) Bootstrapping for HElib Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9056: 641-670 |
Hofheinz D, Kiltz E, Shoup V. (2013) Practical chosen ciphertext secure encryption from factoring Journal of Cryptology. 26: 102-118 |
Camenisch J, Enderlein RR, Shoup V. (2013) Practical and employable protocols for UC-secure circuit evaluation over ℤ |
Camenisch J, Krenn S, Shoup V. (2011) A framework for practical universally composable zero-knowledge protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7073: 449-467 |
Desmedt Y, Gennaro R, Kurosawa K, et al. (2010) A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack Journal of Cryptology. 23: 91-120 |
Camenisch J, Casati N, Gross T, et al. (2010) Credential authenticated identification and key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6223: 255-276 |
Haralambiev K, Jager T, Kiltz E, et al. (2010) Simple and efficient public-key encryption from computational diffie-hellman in the standard model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6056: 1-18 |
Bichsel P, Camenisch J, Groß T, et al. (2009) Anonymous credentials on a standard Java card Proceedings of the Acm Conference On Computer and Communications Security. 600-610 |
Cash D, Kiltz E, Shoup V. (2009) The twin diffie-hellman problem and applications Journal of Cryptology. 22: 470-504 |