A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack R Cramer, V Shoup Annual International Cryptology Conference, 13-25, 1998 | 1714 | 1998 |
Lower bounds for discrete logarithms and related problems V Shoup International Conference on the Theory and Applications of Cryptographic …, 1997 | 1238 | 1997 |
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack R Cramer, V Shoup SIAM Journal on Computing 33 (1), 167-226, 2003 | 1050 | 2003 |
Practical threshold signatures V Shoup International Conference on the Theory and Applications of Cryptographic …, 2000 | 968 | 2000 |
A computational introduction to number theory and algebra V Shoup Cambridge university press, 2009 | 864 | 2009 |
Sequences of games: a tool for taming complexity in security proofs. V Shoup IACR Cryptol. ePrint Arch. 2004, 332, 2004 | 829 | 2004 |
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption R Cramer, V Shoup International Conference on the Theory and Applications of Cryptographic …, 2002 | 825 | 2002 |
NTL: A library for doing number theory V Shoup | 683 | 2001 |
OAEP reconsidered V Shoup Journal of Cryptology 15 (4), 223-249, 2002 | 660 | 2002 |
Signature schemes based on the strong RSA assumption R Cramer, V Shoup ACM Transactions on Information and System Security (TISSEC) 3 (3), 161-185, 2000 | 603 | 2000 |
Practical verifiable encryption and decryption of discrete logarithms J Camenisch, V Shoup Annual International Cryptology Conference, 126-144, 2003 | 585 | 2003 |
Optimistic fair exchange of digital signatures N Asokan, V Shoup, M Waidner IEEE Journal on Selected Areas in communications 18 (4), 593-610, 2000 | 541 | 2000 |
Optimistic fair exchange of digital signatures N Asokan, V Shoup, M Waidner International Conference on the Theory and Applications of Cryptographic …, 1998 | 518 | 1998 |
Asynchronous protocols for optimistic fair exchange N Asokan, V Shoup, M Waidner Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998 | 472 | 1998 |
Algorithms in helib S Halevi, V Shoup Annual Cryptology Conference, 554-571, 2014 | 449 | 2014 |
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography C Cachin, K Kursawe, V Shoup Journal of Cryptology 18 (3), 219-246, 2005 | 424 | 2005 |
On formal models for secure key exchange V Shoup IBM, 1999 | 349 | 1999 |
A proposal for an ISO standard for public key encryption (version 2.1) V Shoup IACR e-Print Archive 112, 2001 | 312 | 2001 |
Secure and efficient asynchronous broadcast protocols C Cachin, K Kursawe, F Petzold, V Shoup Annual International Cryptology Conference, 524-541, 2001 | 291 | 2001 |
Anonymous Identification in Ad Hoc Groups Y Dodis, A Kiayias, A Nicolosi, V Shoup International Conference on the Theory and Applications of Cryptographic …, 2004 | 279 | 2004 |