Back to Results
First PageMeta Content



Victor Shoup Curriculum Vitae April 5, 2016 Department of Computer Science Courant Institute of Mathematical Sciences New York University 251 Mercer Street
Add to Reading List

Document Date: 2016-04-05 14:38:26


Open Document

File Size: 164,59 KB

Share Result on Facebook

City

Santa Barbara / New York / Morristown / Chengdu / Saarlandes / Toronto / Vigo / London / Lille / Waterloo / Durham / /

Company

IBM / Cambridge University Press / Keltie LLP / Ericsson / Google / AT&T Bell Laboratories / SIAM Journal / NTL / IEEE Journal / Blackberry Inc. / /

Country

Germany / France / Canada / United Kingdom / China / Spain / /

/

Facility

C++ library / Courant Institute of Mathematical Sciences / New York University / Computer Science Courant Institute of Mathematical Sciences New York University / /

IndustryTerm

zero-knowledge proof systems / asynchronous networks / polynomial factorization algorithm / employable protocols / deterministic algorithm / Secure and efficient asynchronous broadcast protocols / computing / shared safe-prime products / /

Organization

Univ. of Wisconsin / Cambridge University / New York University / Department of Computer Science Courant Institute / Program committee / Computer Science Department / Thesis committee / IBM Zurich Research Lab / Univ. of Toronto / Courant Institute of Mathematical Sciences / /

Person

Eric Bach / Mark Giesbrecht / Murray Hill / Pat Goldberg / Stephan Krenn / Jan Camenisch / Alexander von Humboldt / Klaus Kursawe / Crypto / Victor Shoup Curriculum Vitae / /

/

Position

advisor / editor / Program Chair / member for Mark Giesbrecht / Research Scientist / Network Security Group / Associate Professor / Computer Science Dept. / Co-author / author / Research Scientist / Security Research Group / Supervisor for Klaus Kursawe / Professor / Computer Science Dept. / /

ProgrammingLanguage

C++ / /

ProvinceOrState

New Jersey / Wisconsin / New York / Ontario / /

PublishedMedium

SIAM Journal on Computing / Mathematics of Computation / Journal of Symbolic Computation / Journal of Cryptology / Theory of Computing / /

Technology

Encryption Algorithms / secure public key encryption / key exchange protocols / Composable Zero-Knowledge Protocols / operating systems / mobile devices / polynomial factorization algorithm / encryption / cryptography / public key / Java / public-key encryption / chosen ciphertext secure encryption / Piggy-backed key exchange protocol / digital signature / asynchronous broadcast protocols / /

URL

http /

SocialTag