BibTeX records: Victor Shoup

download as .bib file

@article{DBLP:journals/joc/ShoupS24,
  author       = {Victor Shoup and
                  Nigel P. Smart},
  title        = {Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience},
  journal      = {J. Cryptol.},
  volume       = {37},
  number       = {3},
  pages        = {27},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00145-024-09505-6},
  doi          = {10.1007/S00145-024-09505-6},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ShoupS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/AlvarezABBBEFGJ24,
  author       = {Mario M. Alvarez and
                  Henry Arneson and
                  Ben Berger and
                  Lee Bousfield and
                  Chris Buckland and
                  Yafah Edelman and
                  Edward W. Felten and
                  Daniel Goldman and
                  Raul Jordan and
                  Mahimna Kelkar and
                  Akaki Mamageishvili and
                  Harry Ng and
                  Aman Sanghi and
                  Victor Shoup and
                  Terence Tsao},
  editor       = {Rainer B{\"{o}}hme and
                  Lucianna Kiffer},
  title        = {BoLD: Fast and Cheap Dispute Resolution},
  booktitle    = {6th Conference on Advances in Financial Technologies, {AFT} 2024,
                  September 23-25, 2024, Vienna, Austria},
  series       = {LIPIcs},
  volume       = {316},
  pages        = {2:1--2:19},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2024},
  url          = {https://doi.org/10.4230/LIPIcs.AFT.2024.2},
  doi          = {10.4230/LIPICS.AFT.2024.2},
  timestamp    = {Mon, 16 Sep 2024 17:07:54 +0200},
  biburl       = {https://dblp.org/rec/conf/aft/AlvarezABBBEFGJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GrothS24,
  author       = {Jens Groth and
                  Victor Shoup},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {Fast Batched Asynchronous Distributed Key Generation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14655},
  pages        = {370--400},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58740-5\_13},
  doi          = {10.1007/978-3-031-58740-5\_13},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GrothS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-10491,
  author       = {Mario M. Alvarez and
                  Henry Arneson and
                  Ben Berger and
                  Lee Bousfield and
                  Chris Buckland and
                  Yafah Edelman and
                  Edward W. Felten and
                  Daniel Goldman and
                  Raul Jordan and
                  Mahimna Kelkar and
                  Akaki Mamageishvili and
                  Harry Ng and
                  Aman Sanghi and
                  Victor Shoup and
                  Terence Tsao},
  title        = {BoLD: Fast and Cheap Dispute Resolution},
  journal      = {CoRR},
  volume       = {abs/2404.10491},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.10491},
  doi          = {10.48550/ARXIV.2404.10491},
  eprinttype    = {arXiv},
  eprint       = {2404.10491},
  timestamp    = {Wed, 15 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-10491.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LocherS24,
  author       = {Thomas Locher and
                  Victor Shoup},
  title        = {MiniCast: Minimizing the Communication Complexity of Reliable Broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/571},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LocherS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasDLMRS24,
  author       = {Sourav Das and
                  Sisi Duan and
                  Shengqi Liu and
                  Atsuki Momose and
                  Ling Ren and
                  Victor Shoup},
  title        = {Asynchronous Consensus without Trusted Setup or Public-Key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/677},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasDLMRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup24,
  author       = {Victor Shoup},
  title        = {A Theoretical Take on a Practical Consensus Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {696},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/696},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup24a,
  author       = {Victor Shoup},
  title        = {Blue fish, red fish, live fish, dead fish},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1235},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1235},
  timestamp    = {Sun, 01 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShoupS23,
  author       = {Victor Shoup and
                  Nigel P. Smart},
  title        = {Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/536},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShoupS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CerulliCNPS23,
  author       = {Andrea Cerulli and
                  Aisling Connolly and
                  Gregory Neven and
                  Franz{-}Stefan Preiss and
                  Victor Shoup},
  title        = {vetKeys: How a Blockchain Can Keep Many Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/616},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CerulliCNPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup23,
  author       = {Victor Shoup},
  title        = {The many faces of Schnorr},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1019},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1019},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrothS23,
  author       = {Jens Groth and
                  Victor Shoup},
  title        = {Fast batched asynchronous distributed key generation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1175},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1175},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrothS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup23a,
  author       = {Victor Shoup},
  title        = {DispersedSimplex: simple and efficient atomic broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1916},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1916},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GrothS22,
  author       = {Jens Groth and
                  Victor Shoup},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {On the Security of {ECDSA} with Additive Key Derivation and Presignatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {365--396},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_13},
  doi          = {10.1007/978-3-031-06944-4\_13},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GrothS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/CamenischDHPS022,
  author       = {Jan Camenisch and
                  Manu Drijvers and
                  Timo Hanke and
                  Yvonne{-}Anne Pignolet and
                  Victor Shoup and
                  Dominic Williams},
  editor       = {Alessia Milani and
                  Philipp Woelfel},
  title        = {Internet Computer Consensus},
  booktitle    = {{PODC} '22: {ACM} Symposium on Principles of Distributed Computing,
                  Salerno, Italy, July 25 - 29, 2022},
  pages        = {81--91},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3519270.3538430},
  doi          = {10.1145/3519270.3538430},
  timestamp    = {Mon, 25 Jul 2022 15:01:51 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/CamenischDHPS022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrothS22,
  author       = {Jens Groth and
                  Victor Shoup},
  title        = {Design and analysis of a distributed {ECDSA} signing service},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/506},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrothS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HaleviS21,
  author       = {Shai Halevi and
                  Victor Shoup},
  title        = {Bootstrapping for HElib},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {1},
  pages        = {7},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-020-09368-7},
  doi          = {10.1007/S00145-020-09368-7},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/HaleviS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDHPSW21,
  author       = {Jan Camenisch and
                  Manu Drijvers and
                  Timo Hanke and
                  Yvonne{-}Anne Pignolet and
                  Victor Shoup and
                  Dominic Williams},
  title        = {Internet Computer Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/632},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischDHPSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrothS21,
  author       = {Jens Groth and
                  Victor Shoup},
  title        = {On the security of {ECDSA} with additive key derivation and presignatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1330},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1330},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GrothS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Shoup20,
  author       = {Victor Shoup},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Security Analysis of itSPAKE2+},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12552},
  pages        = {31--60},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64381-2\_2},
  doi          = {10.1007/978-3-030-64381-2\_2},
  timestamp    = {Tue, 15 Dec 2020 12:05:01 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Shoup20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup20,
  author       = {Victor Shoup},
  title        = {Security analysis of {SPAKE2+}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviS20,
  author       = {Shai Halevi and
                  Victor Shoup},
  title        = {Design and implementation of HElib: a homomorphic encryption library},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1481},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1481},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HaleviPS19,
  author       = {Shai Halevi and
                  Yuriy Polyakov and
                  Victor Shoup},
  editor       = {Mitsuru Matsui},
  title        = {An Improved {RNS} Variant of the {BFV} Homomorphic Encryption Scheme},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {83--105},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_5},
  doi          = {10.1007/978-3-030-12612-4\_5},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HaleviPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CrawfordGHPS18,
  author       = {Jack L. H. Crawford and
                  Craig Gentry and
                  Shai Halevi and
                  Daniel Platt and
                  Victor Shoup},
  editor       = {Michael Brenner and
                  Kurt Rohloff},
  title        = {Doing Real Work with {FHE:} The Case of Logistic Regression},
  booktitle    = {Proceedings of the 6th Workshop on Encrypted Computing {\&} Applied
                  Homomorphic Cryptography, WAHC@CCS 2018, Toronto, ON, Canada, October
                  19, 2018},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3267973.3267974},
  doi          = {10.1145/3267973.3267974},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CrawfordGHPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviS18,
  author       = {Shai Halevi and
                  Victor Shoup},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Faster Homomorphic Linear Transformations in HElib},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {93--120},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_4},
  doi          = {10.1007/978-3-319-96884-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviPS18,
  author       = {Shai Halevi and
                  Yuriy Polyakov and
                  Victor Shoup},
  title        = {An Improved {RNS} Variant of the {BFV} Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrawfordGHPS18,
  author       = {Jack L. H. Crawford and
                  Craig Gentry and
                  Shai Halevi and
                  Daniel Platt and
                  Victor Shoup},
  title        = {Doing Real Work with {FHE:} The Case of Logistic Regression},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrawfordGHPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviS18,
  author       = {Shai Halevi and
                  Victor Shoup},
  title        = {Faster Homomorphic Linear Transformations in HElib},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaleviHSS17,
  author       = {Shai Halevi and
                  Tzipora Halevi and
                  Victor Shoup and
                  Noah Stephens{-}Davidowitz},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Implementing BP-Obfuscation Using Graph-Induced Encoding},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {783--798},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133976},
  doi          = {10.1145/3133956.3133976},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HaleviHSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviHSS17,
  author       = {Shai Halevi and
                  Tzipora Halevi and
                  Victor Shoup and
                  Noah Stephens{-}Davidowitz},
  title        = {Implementing BP-Obfuscation Using Graph-Induced Encoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviHSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HofheinzS15,
  author       = {Dennis Hofheinz and
                  Victor Shoup},
  title        = {{GNUC:} {A} New Universal Composability Framework},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {3},
  pages        = {423--508},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9160-y},
  doi          = {10.1007/S00145-013-9160-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HofheinzS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HaleviS15,
  author       = {Shai Halevi and
                  Victor Shoup},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Bootstrapping for HElib},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {641--670},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_25},
  doi          = {10.1007/978-3-662-46800-5\_25},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HaleviS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviS14,
  author       = {Shai Halevi and
                  Victor Shoup},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Algorithms in HElib},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {554--571},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_31},
  doi          = {10.1007/978-3-662-44371-2\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviS14,
  author       = {Shai Halevi and
                  Victor Shoup},
  title        = {Algorithms in HElib},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviS14a,
  author       = {Shai Halevi and
                  Victor Shoup},
  title        = {Bootstrapping for HElib},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {873},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/873},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HofheinzKS13,
  author       = {Dennis Hofheinz and
                  Eike Kiltz and
                  Victor Shoup},
  title        = {Practical Chosen Ciphertext Secure Encryption from Factoring},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {1},
  pages        = {102--118},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-011-9115-0},
  doi          = {10.1007/S00145-011-9115-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HofheinzKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischES13,
  author       = {Jan Camenisch and
                  Robert R. Enderlein and
                  Victor Shoup},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Practical and Employable Protocols for UC-Secure Circuit Evaluation
                  over {\(\mathbb{Z}\)}n},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {19--37},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_2},
  doi          = {10.1007/978-3-642-40203-6\_2},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CamenischES13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischES13,
  author       = {Jan Camenisch and
                  Robert R. Enderlein and
                  Victor Shoup},
  title        = {Practical and Employable Protocols for UC-Secure Circuit Evaluation
                  over Z\({}_{\mbox{n}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischES13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischKS11,
  author       = {Jan Camenisch and
                  Stephan Krenn and
                  Victor Shoup},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {A Framework for Practical Universally Composable Zero-Knowledge Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {449--467},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_24},
  doi          = {10.1007/978-3-642-25385-0\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CamenischKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKS11,
  author       = {Jan Camenisch and
                  Stephan Krenn and
                  Victor Shoup},
  title        = {A Framework for Practical Universally Composable Zero-Knowledge Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzS11,
  author       = {Dennis Hofheinz and
                  Victor Shoup},
  title        = {{GNUC:} {A} New Universal Composability Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DesmedtGKS10,
  author       = {Yvo Desmedt and
                  Rosario Gennaro and
                  Kaoru Kurosawa and
                  Victor Shoup},
  title        = {A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext
                  Attack},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {1},
  pages        = {91--120},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-009-9051-4},
  doi          = {10.1007/S00145-009-9051-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DesmedtGKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischCGS10,
  author       = {Jan Camenisch and
                  Nathalie Casati and
                  Thomas Gross and
                  Victor Shoup},
  editor       = {Tal Rabin},
  title        = {Credential Authenticated Identification and Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {255--276},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_14},
  doi          = {10.1007/978-3-642-14623-7\_14},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CamenischCGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HaralambievJKS10,
  author       = {Kristiyan Haralambiev and
                  Tibor Jager and
                  Eike Kiltz and
                  Victor Shoup},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman
                  in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_1},
  doi          = {10.1007/978-3-642-13013-7\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HaralambievJKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaralambievJKS10,
  author       = {Kristiyan Haralambiev and
                  Tibor Jager and
                  Eike Kiltz and
                  Victor Shoup},
  title        = {Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman
                  in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaralambievJKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCGS10,
  author       = {Jan Camenisch and
                  Nathalie Casati and
                  Thomas Gross and
                  Victor Shoup},
  title        = {Credential Authenticated Identification and Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischCGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CashKS09,
  author       = {David Cash and
                  Eike Kiltz and
                  Victor Shoup},
  title        = {The Twin Diffie-Hellman Problem and Applications},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {4},
  pages        = {470--504},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-009-9041-6},
  doi          = {10.1007/S00145-009-9041-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CashKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BichselCGS09,
  author       = {Patrik Bichsel and
                  Jan Camenisch and
                  Thomas Gro{\ss} and
                  Victor Shoup},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Anonymous credentials on a standard java card},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {600--610},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653734},
  doi          = {10.1145/1653662.1653734},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BichselCGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischCS09,
  author       = {Jan Camenisch and
                  Nishanth Chandran and
                  Victor Shoup},
  editor       = {Antoine Joux},
  title        = {A Public Key Encryption Scheme Secure against Key Dependent Chosen
                  Plaintext and Adaptive Chosen Ciphertext Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_20},
  doi          = {10.1007/978-3-642-01001-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CamenischCS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisSW08,
  author       = {Yevgeniy Dodis and
                  Victor Shoup and
                  Shabsi Walfish},
  editor       = {David A. Wagner},
  title        = {Efficient Constructions of Composable Commitments and Zero-Knowledge
                  Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {515--535},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_29},
  doi          = {10.1007/978-3-540-85174-5\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CashKS08,
  author       = {David Cash and
                  Eike Kiltz and
                  Victor Shoup},
  editor       = {Nigel P. Smart},
  title        = {The Twin Diffie-Hellman Problem and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_8},
  doi          = {10.1007/978-3-540-78967-3\_8},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CashKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashKS08,
  author       = {David Cash and
                  Eike Kiltz and
                  Victor Shoup},
  title        = {The Twin Diffie-Hellman Problem and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCS08,
  author       = {Jan Camenisch and
                  Nishanth Chandran and
                  Victor Shoup},
  title        = {A public key encryption scheme secure against key dependent chosen
                  plaintext and adaptive chosen ciphertext attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0018101,
  author       = {Victor Shoup},
  title        = {A computational introduction to number theory and algebra},
  publisher    = {Cambridge University Press},
  year         = {2006},
  isbn         = {978-0-521-85154-1},
  timestamp    = {Thu, 24 Mar 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0018101.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareKS06,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Victor Shoup},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Stateful public-key cryptosystems: how to encrypt with one 160-bit
                  exponentiation},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {380--389},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180452},
  doi          = {10.1145/1180405.1180452},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKS06,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Victor Shoup},
  title        = {Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit
                  Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CachinKS05,
  author       = {Christian Cachin and
                  Klaus Kursawe and
                  Victor Shoup},
  title        = {Random Oracles in Constantinople: Practical Asynchronous Byzantine
                  Agreement Using Cryptography},
  journal      = {J. Cryptol.},
  volume       = {18},
  number       = {3},
  pages        = {219--246},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00145-005-0318-0},
  doi          = {10.1007/S00145-005-0318-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CachinKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AbeGKS05,
  author       = {Masayuki Abe and
                  Rosario Gennaro and
                  Kaoru Kurosawa and
                  Victor Shoup},
  editor       = {Ronald Cramer},
  title        = {Tag-KEM/DEM: {A} New Framework for Hybrid Encryption and {A} New Analysis
                  of Kurosawa-Desmedt {KEM}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {128--146},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_8},
  doi          = {10.1007/11426639\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AbeGKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/KursaweS05,
  author       = {Klaus Kursawe and
                  Victor Shoup},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Optimistic Asynchronous Atomic Broadcast},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {204--215},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_17},
  doi          = {10.1007/11523468\_17},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/KursaweS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2005,
  editor       = {Victor Shoup},
  title        = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218},
  doi          = {10.1007/11535218},
  isbn         = {3-540-28114-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisKNS04,
  author       = {Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Antonio Nicolosi and
                  Victor Shoup},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Anonymous Identification in Ad Hoc Groups},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {609--626},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_36},
  doi          = {10.1007/978-3-540-24676-3\_36},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisKNS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroS04,
  author       = {Rosario Gennaro and
                  Victor Shoup},
  title        = {A Note on An Encryption Scheme of Kurosawa and Desmedt},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup04,
  author       = {Victor Shoup},
  title        = {Sequences of games: a tool for taming complexity in security proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/CramerS03,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Design and Analysis of Practical Public-Key Encryption Schemes Secure
                  against Adaptive Chosen Ciphertext Attack},
  journal      = {{SIAM} J. Comput.},
  volume       = {33},
  number       = {1},
  pages        = {167--226},
  year         = {2003},
  url          = {https://doi.org/10.1137/S0097539702403773},
  doi          = {10.1137/S0097539702403773},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/CramerS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischS03,
  author       = {Jan Camenisch and
                  Victor Shoup},
  editor       = {Dan Boneh},
  title        = {Practical Verifiable Encryption and Decryption of Discrete Logarithms},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {126--144},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_8},
  doi          = {10.1007/978-3-540-45146-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CamenischS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BonehMS03,
  author       = {Dan Boneh and
                  Ilya Mironov and
                  Victor Shoup},
  editor       = {Marc Joye},
  title        = {A Secure Signature Scheme from Bilinear Maps},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {98--110},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_7},
  doi          = {10.1007/3-540-36563-X\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BonehMS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ShoupG02,
  author       = {Victor Shoup and
                  Rosario Gennaro},
  title        = {Securing Threshold Cryptosystems against Chosen Ciphertext Attack},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {2},
  pages        = {75--96},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0020-9},
  doi          = {10.1007/S00145-001-0020-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ShoupG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Shoup02,
  author       = {Victor Shoup},
  title        = {{OAEP} Reconsidered},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {4},
  pages        = {223--249},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-002-0133-9},
  doi          = {10.1007/S00145-002-0133-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Shoup02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlgesheimerCS02,
  author       = {Joy Algesheimer and
                  Jan Camenisch and
                  Victor Shoup},
  editor       = {Moti Yung},
  title        = {Efficient Computation Modulo a Shared Secret with Application to the
                  Generation of Shared Safe-Prime Products},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {417--432},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_27},
  doi          = {10.1007/3-540-45708-9\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlgesheimerCS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerS02,
  author       = {Ronald Cramer and
                  Victor Shoup},
  editor       = {Lars R. Knudsen},
  title        = {Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext
                  Secure Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_4},
  doi          = {10.1007/3-540-46035-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlgesheimerCS02,
  author       = {Joy Algesheimer and
                  Jan Camenisch and
                  Victor Shoup},
  title        = {Efficient Computation Modulo a Shared Secret with Application to the
                  Generation of Shared Safe-Prime Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlgesheimerCS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischS02,
  author       = {Jan Camenisch and
                  Victor Shoup},
  title        = {Practical Verifiable Encryption and Decryption of Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shoup01,
  author       = {Victor Shoup},
  editor       = {Joe Kilian},
  title        = {{OAEP} Reconsidered},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {239--259},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_15},
  doi          = {10.1007/3-540-44647-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Shoup01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CachinKPS01,
  author       = {Christian Cachin and
                  Klaus Kursawe and
                  Frank Petzold and
                  Victor Shoup},
  editor       = {Joe Kilian},
  title        = {Secure and Efficient Asynchronous Broadcast Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {524--541},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_31},
  doi          = {10.1007/3-540-44647-8\_31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CachinKPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR01-072,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Universal Hash Proofs and and a Paradigm for Adaptive Chosen Ciphertext
                  Secure Public-Key Encryption},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR01-072}},
  year         = {2001},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-072/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR01-072},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR01-072.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinKPS01,
  author       = {Christian Cachin and
                  Klaus Kursawe and
                  Frank Petzold and
                  Victor Shoup},
  title        = {Secure and Efficient Asynchronous Broadcast Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinKPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KursaweS01,
  author       = {Klaus Kursawe and
                  Victor Shoup},
  title        = {Optimistic Asynchronous Atomic Broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KursaweS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS01,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext
                  Secure Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS01a,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Design and Analysis of Practical Public-Key Encryption Schemes Secure
                  against Adaptive Chosen Ciphertext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup01,
  author       = {Victor Shoup},
  title        = {A Proposal for an {ISO} Standard for Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/AsokanSW00,
  author       = {N. Asokan and
                  Victor Shoup and
                  Michael Waidner},
  title        = {Optimistic fair exchange of digital signatures},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {18},
  number       = {4},
  pages        = {593--610},
  year         = {2000},
  url          = {https://doi.org/10.1109/49.839935},
  doi          = {10.1109/49.839935},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/AsokanSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/GaoGPS00,
  author       = {Shuhong Gao and
                  Joachim von zur Gathen and
                  Daniel Panario and
                  Victor Shoup},
  title        = {Algorithms for Exponentiation in Finite Fields},
  journal      = {J. Symb. Comput.},
  volume       = {29},
  number       = {6},
  pages        = {879--889},
  year         = {2000},
  url          = {https://doi.org/10.1006/jsco.1999.0309},
  doi          = {10.1006/JSCO.1999.0309},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsc/GaoGPS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramerS00,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Signature schemes based on the strong {RSA} assumption},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {161--185},
  year         = {2000},
  url          = {https://doi.org/10.1145/357830.357847},
  doi          = {10.1145/357830.357847},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CramerS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Shoup00,
  author       = {Victor Shoup},
  editor       = {Bart Preneel},
  title        = {Practical Threshold Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {207--220},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_15},
  doi          = {10.1007/3-540-45539-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Shoup00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Shoup00a,
  author       = {Victor Shoup},
  editor       = {Bart Preneel},
  title        = {Using Hash Functions as a Hedge against Chosen Ciphertext Attack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {275--288},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_19},
  doi          = {10.1007/3-540-45539-6\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Shoup00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Shoup00b,
  author       = {Victor Shoup},
  editor       = {Bart Preneel},
  title        = {A Composition Theorem for Universal One-Way Hash Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {445--452},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_32},
  doi          = {10.1007/3-540-45539-6\_32},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Shoup00b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/AbbottSZ00,
  author       = {John Abbott and
                  Victor Shoup and
                  Paul Zimmermann},
  editor       = {Carlo Traverso},
  title        = {Factorization in ***[\emph{x}]: the searching phase},
  booktitle    = {Proceedings of the 2000 International Symposium on Symbolic and Algebraic
                  Computation, {ISSAC} 2000, St. Andrews, United Kingdom, August 6-10,
                  2000},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/345542.345560},
  doi          = {10.1145/345542.345560},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issac/AbbottSZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/CachinKS00,
  author       = {Christian Cachin and
                  Klaus Kursawe and
                  Victor Shoup},
  editor       = {Gil Neiger},
  title        = {Random oracles in constantipole: practical asynchronous Byzantine
                  agreement using cryptography (extended abstract)},
  booktitle    = {Proceedings of the Nineteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, July 16-19, 2000, Portland, Oregon, {USA}},
  pages        = {123--132},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/343477.343531},
  doi          = {10.1145/343477.343531},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/CachinKS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchweinbergerS00,
  author       = {Thomas Schweinberger and
                  Victor Shoup},
  title        = {{ACE:} The Advanced Cryptographic Engine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchweinbergerS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinKS00,
  author       = {Christian Cachin and
                  Klaus Kursawe and
                  Victor Shoup},
  title        = {Random Oracles in Constantinople: Practical Asynchronous Byzantine
                  Agreement using Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinKS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup00,
  author       = {Victor Shoup},
  title        = {{OAEP} Reconsidered},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Shoup99,
  author       = {Victor Shoup},
  title        = {On the Security of a Practical Identification Scheme},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {4},
  pages        = {247--260},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900056},
  doi          = {10.1007/S001459900056},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Shoup99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CramerS99,
  author       = {Ronald Cramer and
                  Victor Shoup},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Signature Schemes Based on the Strong {RSA} Assumption},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {46--51},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319716},
  doi          = {10.1145/319709.319716},
  timestamp    = {Tue, 10 Nov 2020 20:00:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CramerS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/Shoup99,
  author       = {Victor Shoup},
  editor       = {Keith O. Geddes and
                  Bruno Salvy and
                  Samuel S. Dooley},
  title        = {Efficient Computation of Minimal Polynomials in Algebraic Extensions
                  of Finite Fields},
  booktitle    = {Proceedings of the 1999 International Symposium on Symbolic and Algebraic
                  Computation, {ISSAC} '99, Vancouver, B.C., Canada, July 29-31, 1999},
  pages        = {53--58},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/309831.309859},
  doi          = {10.1145/309831.309859},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issac/Shoup99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS99,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Signature Schemes Based on the Strong {RSA} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup99,
  author       = {Victor Shoup},
  title        = {Practical Threshold Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup99a,
  author       = {Victor Shoup},
  title        = {On Formal Models for Secure Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup99b,
  author       = {Victor Shoup},
  title        = {A Composition Theorem for Universal One-Way Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/KaltofenS98,
  author       = {Erich L. Kaltofen and
                  Victor Shoup},
  title        = {Subquadratic-time factoring of polynomials over finite fields},
  journal      = {Math. Comput.},
  volume       = {67},
  number       = {223},
  pages        = {1179--1197},
  year         = {1998},
  url          = {https://doi.org/10.1090/S0025-5718-98-00944-2},
  doi          = {10.1090/S0025-5718-98-00944-2},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/moc/KaltofenS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerS98,
  author       = {Ronald Cramer and
                  Victor Shoup},
  editor       = {Hugo Krawczyk},
  title        = {A Practical Public Key Cryptosystem Provably Secure Against Adaptive
                  Chosen Ciphertext Attack},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {13--25},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055717},
  doi          = {10.1007/BFB0055717},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ShoupG98,
  author       = {Victor Shoup and
                  Rosario Gennaro},
  editor       = {Kaisa Nyberg},
  title        = {Securing Threshold Cryptosystems against Chosen Ciphertext Attack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054113},
  doi          = {10.1007/BFB0054113},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ShoupG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AsokanSW98,
  author       = {N. Asokan and
                  Victor Shoup and
                  Michael Waidner},
  editor       = {Kaisa Nyberg},
  title        = {Optimistic Fair Exchange of Digital Signatures (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {591--606},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054156},
  doi          = {10.1007/BFB0054156},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AsokanSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AsokanSW98,
  author       = {N. Asokan and
                  Victor Shoup and
                  Michael Waidner},
  title        = {Asynchronous Protocols for Optimistic Fair Exchange},
  booktitle    = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy,
                  Oakland, CA, USA, May 3-6, 1998, Proceedings},
  pages        = {86--99},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/SECPRI.1998.674826},
  doi          = {10.1109/SECPRI.1998.674826},
  timestamp    = {Thu, 21 Sep 2023 15:57:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AsokanSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS98,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {A Practical Public Key Cryptosystem Provably Secure against Adaptive
                  Chosen Ciphertext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/ShoupS97,
  author       = {Victor Shoup and
                  Roman Smolensky},
  title        = {Lower Bounds for Polynomial Evaluation and Interpolation Problems},
  journal      = {Comput. Complex.},
  volume       = {6},
  number       = {4},
  pages        = {301--311},
  year         = {1997},
  url          = {https://doi.org/10.1007/BF01270384},
  doi          = {10.1007/BF01270384},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/ShoupS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Shoup97,
  author       = {Victor Shoup},
  editor       = {Walter Fumy},
  title        = {Lower Bounds for Discrete Logarithms and Related Problems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {256--266},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_18},
  doi          = {10.1007/3-540-69053-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Shoup97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/KaltofenS97,
  author       = {Erich L. Kaltofen and
                  Victor Shoup},
  editor       = {Bruce W. Char and
                  Paul S. Wang and
                  Wolfgang K{\"{u}}chlin},
  title        = {Fast Polynomial Factorization Over High Algebraic Extensions of Finite
                  Fields},
  booktitle    = {Proceedings of the 1997 International Symposium on Symbolic and Algebraic
                  Computation, {ISSAC} 1997, Maui, Hawaii, USA, July 21-23, 1997},
  pages        = {184--188},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/258726.258777},
  doi          = {10.1145/258726.258777},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issac/KaltofenS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/OstrovskyS97,
  author       = {Rafail Ostrovsky and
                  Victor Shoup},
  editor       = {Frank Thomson Leighton and
                  Peter W. Shor},
  title        = {Private Information Storage (Extended Abstract)},
  booktitle    = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory
                  of Computing, El Paso, Texas, USA, May 4-6, 1997},
  pages        = {294--303},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/258533.258606},
  doi          = {10.1145/258533.258606},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/OstrovskyS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsokanSW97,
  author       = {N. Asokan and
                  Victor Shoup and
                  Michael Waidner},
  title        = {Optimistic fair Exchange of Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {1997},
  url          = {http://eprint.iacr.org/1997/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsokanSW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/BuchmannS96,
  author       = {Johannes Buchmann and
                  Victor Shoup},
  title        = {Constructing nonresidues in finite fields and the extended Riemann
                  hypothesis},
  journal      = {Math. Comput.},
  volume       = {65},
  number       = {215},
  pages        = {1311--1326},
  year         = {1996},
  url          = {https://doi.org/10.1090/S0025-5718-96-00751-X},
  doi          = {10.1090/S0025-5718-96-00751-X},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/BuchmannS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shoup96,
  author       = {Victor Shoup},
  editor       = {Neal Koblitz},
  title        = {On Fast and Provably Secure Message Authentication Based on Universal
                  Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {313--328},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_24},
  doi          = {10.1007/3-540-68697-5\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Shoup96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ShoupR96,
  author       = {Victor Shoup and
                  Aviel D. Rubin},
  editor       = {Ueli M. Maurer},
  title        = {Session Key Distribution Using Smart Cards},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {321--331},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_28},
  doi          = {10.1007/3-540-68339-9\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ShoupR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Shoup96,
  author       = {Victor Shoup},
  editor       = {Ueli M. Maurer},
  title        = {On the Security of a Practical Identification Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {344--353},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_30},
  doi          = {10.1007/3-540-68339-9\_30},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Shoup96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyS96,
  author       = {Rafail Ostrovsky and
                  Victor Shoup},
  title        = {Private Information Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/Shoup95,
  author       = {Victor Shoup},
  title        = {A New Polynomial Factorization Algorithm and its Implementation},
  journal      = {J. Symb. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {363--397},
  year         = {1995},
  url          = {https://doi.org/10.1006/jsco.1995.1055},
  doi          = {10.1006/JSCO.1995.1055},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/Shoup95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KaltofenS95,
  author       = {Erich L. Kaltofen and
                  Victor Shoup},
  editor       = {Frank Thomson Leighton and
                  Allan Borodin},
  title        = {Subquadratic-time factoring of polynomials over finite fields},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory
                  of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}},
  pages        = {398--406},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/225058.225166},
  doi          = {10.1145/225058.225166},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/KaltofenS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/Shoup94,
  author       = {Victor Shoup},
  title        = {Fast Construction of Irreducible Polynomials over Finite Fields},
  journal      = {J. Symb. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {371--391},
  year         = {1994},
  url          = {https://doi.org/10.1006/jsco.1994.1025},
  doi          = {10.1006/JSCO.1994.1025},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/Shoup94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/LehmannMMS94,
  author       = {Frank Lehmann and
                  Markus Maurer and
                  Volker M{\"{u}}ller and
                  Victor Shoup},
  editor       = {Leonard M. Adleman and
                  Ming{-}Deh A. Huang},
  title        = {Counting the number of points on elliptic curves over finite fields
                  of characteristic greater than three},
  booktitle    = {Algorithmic Number Theory, First International Symposium, ANTS-I,
                  Ithaca, NY, USA, May 6-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {877},
  pages        = {60--70},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58691-1\_44},
  doi          = {10.1007/3-540-58691-1\_44},
  timestamp    = {Fri, 17 Jul 2020 16:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/LehmannMMS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/PeraltaS93,
  author       = {Ren{\'{e}} Peralta and
                  Victor Shoup},
  title        = {Primality Testing with Fewer Random Bits},
  journal      = {Comput. Complex.},
  volume       = {3},
  pages        = {355--367},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01275488},
  doi          = {10.1007/BF01275488},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/PeraltaS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/Shoup93,
  author       = {Victor Shoup},
  editor       = {Vijaya Ramachandran},
  title        = {Fast Construction of Irreducible Polynomials over Finite Fields},
  booktitle    = {Proceedings of the Fourth Annual {ACM/SIGACT-SIAM} Symposium on Discrete
                  Algorithms, 25-27 January 1993, Austin, Texas, {USA}},
  pages        = {484--492},
  publisher    = {{ACM/SIAM}},
  year         = {1993},
  url          = {http://dl.acm.org/citation.cfm?id=313559.313865},
  timestamp    = {Thu, 05 Jul 2018 07:29:11 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/Shoup93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/GathenS92,
  author       = {Joachim von zur Gathen and
                  Victor Shoup},
  title        = {Computing Frobenius Maps and Factoring Polynomials},
  journal      = {Comput. Complex.},
  volume       = {2},
  pages        = {187--224},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF01272074},
  doi          = {10.1007/BF01272074},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/GathenS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GathenS92,
  author       = {Joachim von zur Gathen and
                  Victor Shoup},
  editor       = {S. Rao Kosaraju and
                  Mike Fellows and
                  Avi Wigderson and
                  John A. Ellis},
  title        = {Computing Frobenius Maps and Factoring Polynomials (Extended Abstract)},
  booktitle    = {Proceedings of the 24th Annual {ACM} Symposium on Theory of Computing,
                  May 4-6, 1992, Victoria, British Columbia, Canada},
  pages        = {97--105},
  publisher    = {{ACM}},
  year         = {1992},
  url          = {https://doi.org/10.1145/129712.129722},
  doi          = {10.1145/129712.129722},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GathenS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Shoup91,
  author       = {Victor Shoup},
  title        = {Smoothness and Factoring Polynomials Over Finite Fields},
  journal      = {Inf. Process. Lett.},
  volume       = {38},
  number       = {1},
  pages        = {39--42},
  year         = {1991},
  url          = {https://doi.org/10.1016/0020-0190(91)90212-Z},
  doi          = {10.1016/0020-0190(91)90212-Z},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Shoup91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/ShoupS91,
  author       = {Victor Shoup and
                  Roman Smolensky},
  title        = {Lower Bounds for Polynomial Evaluation and Interpolation Problems},
  booktitle    = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
                  Puerto Rico, 1-4 October 1991},
  pages        = {378--383},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SFCS.1991.185394},
  doi          = {10.1109/SFCS.1991.185394},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/ShoupS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/Shoup91,
  author       = {Victor Shoup},
  editor       = {Stephen M. Watt},
  title        = {A Fast Deterministic Algorithm for Factoring Polynomials over Finite
                  Fields of Small Characteristic},
  booktitle    = {Proceedings of the 1991 International Symposium on Symbolic and Algebraic
                  Computation, {ISSAC} '91, Bonn, Germany, July 15-17, 1991},
  pages        = {14--21},
  publisher    = {{ACM}},
  year         = {1991},
  url          = {https://doi.org/10.1145/120694.120697},
  doi          = {10.1145/120694.120697},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issac/Shoup91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BuchmannS91,
  author       = {Johannes A. Buchmann and
                  Victor Shoup},
  editor       = {Cris Koutsougeras and
                  Jeffrey Scott Vitter},
  title        = {Constructing Nonresidues in Finite Fields and the Extended Riemann
                  Hypothesis},
  booktitle    = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing,
                  May 5-8, 1991, New Orleans, Louisiana, {USA}},
  pages        = {72--79},
  publisher    = {{ACM}},
  year         = {1991},
  url          = {https://doi.org/10.1145/103418.103433},
  doi          = {10.1145/103418.103433},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BuchmannS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Shoup90,
  author       = {Victor Shoup},
  title        = {On the Deterministic Complexity of Factoring Polynomials over Finite
                  Fields},
  journal      = {Inf. Process. Lett.},
  volume       = {33},
  number       = {5},
  pages        = {261--267},
  year         = {1990},
  url          = {https://doi.org/10.1016/0020-0190(90)90195-4},
  doi          = {10.1016/0020-0190(90)90195-4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Shoup90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/BachS90,
  author       = {Eric Bach and
                  Victor Shoup},
  title        = {Factoring Polynomials Using Fewer Random Bits},
  journal      = {J. Symb. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {229--239},
  year         = {1990},
  url          = {https://doi.org/10.1016/S0747-7171(08)80011-9},
  doi          = {10.1016/S0747-7171(08)80011-9},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/BachS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeaverFS90,
  author       = {Donald Beaver and
                  Joan Feigenbaum and
                  Victor Shoup},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {326--338},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_24},
  doi          = {10.1007/3-540-38424-3\_24},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeaverFS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Shoup90,
  author       = {Victor Shoup},
  editor       = {Harriet Ortiz},
  title        = {Searching for Primitive Roots in Finite Fields},
  booktitle    = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing,
                  May 13-17, 1990, Baltimore, Maryland, {USA}},
  pages        = {546--554},
  publisher    = {{ACM}},
  year         = {1990},
  url          = {https://doi.org/10.1145/100216.100293},
  doi          = {10.1145/100216.100293},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Shoup90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Shoup88,
  author       = {Victor Shoup},
  title        = {New Algorithms for Finding Irreducible Polynomials over Finite Fields},
  booktitle    = {29th Annual Symposium on Foundations of Computer Science, White Plains,
                  New York, USA, 24-26 October 1988},
  pages        = {283--290},
  publisher    = {{IEEE} Computer Society},
  year         = {1988},
  url          = {https://doi.org/10.1109/SFCS.1988.21944},
  doi          = {10.1109/SFCS.1988.21944},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Shoup88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}