throbber
Victor Shoup
`Curriculum Vitae December 9, 2019
`
`Department of Computer Science
`Courant Institute of Mathematical Sciences
`New York University
`251 Mercer Street
`New York, NY 10012
`Tel: (646) 403-7853; email: victor@shoup.net
`URL: http://www.shoup.net
`
`Employment History
`
`Visiting Reseach Scientist, Cryptography Research Group, IBM T. J. Watson Research Lab,
`Yorktown Heights, New York, April 2012–present.
`
`Professor, Computer Science Dept., Courant Institute of Mathematical Sciences, New York
`University, Jan. 2007–present.
`
`Associate Professor, Computer Science Dept., Courant Institute of Mathematical Sciences,
`New York University, Sept. 2002–Jan. 2007.
`
`Research Scientist, Network Security Group, IBM Zurich Research Lab, Feb. 1997–
`Aug. 2002.
`
`Research Scientist, Security Research Group, Bellcore, Morristown, N. J., June 1995–
`Jan. 1997.
`
`Alexander von Humboldt research fellow, Universit¨at des Saarlandes, Germany, Sept. 1993–
`June 1995.
`
`fellow, Univ. of Toronto, Computer Science Department, Sept. 1990–
`Postdoctoral
`Aug. 1993.
`
`Postdoctoral fellow, AT&T Bell Laboratories, Murray Hill, N. J., Sept. 1989–Sept. 1990.
`
`Education
`
`Ph. D., Computer Science, Univ. of Wisconsin–Madison, 1989; advisor: Eric Bach; the-
`sis title: Removing randomness from computational number theory; areas of study:
`programming languages, compilers, operating systems, theory of computing, algebra.
`
`M. S., Computer Science, Univ. of Wisconsin–Madison, 1985.
`
`B. S., Mathematics, Computer Science, Univ. of Wisconsin–Eau Claire, 1983.
`
`1
`
`IPR2020-00202
`Apple Inc. EX1007 Page 1
`
`

`

`Awards and Honors
`
`1. 2016: IACR Fellow — “For fundamental contributions to public-key cryptography
`and cryptographic security proofs, and for educational leadership.” (http://www.
`iacr.org/fellows/2016/)
`
`2. 2015: Richard D. Jenks Memorial Prize for Excellence in Software Engineering
`Applied to Computer Algebra — “For NTL: A library for doing number theory.”
`(http://www.sigsam.org/awards/jenks/awardees/2015/)
`
`3. 2013: ESORICS best student paper award — Practical and Employable Protocols for
`UC-Secure Circuit Evaluation over Zn, with Jan Camenisch and Robert Enderlein.
`
`4. 2011: AsiaCrypt best paper award, and IBM Pat Goldberg best paper award — A
`Framework for Practical Universally Composable Zero-Knowledge Protocols, with Jan
`Camenisch and Stephan Krenn.
`
`5. 2009: GI (German Computer Science Association) Innovation Award — Anonymous
`Credentials on a JavaCard, with Jan Camenisch and Thomas Gross.
`
`Invited Lectures
`
`1. Coxeter Lecture Series, The Fields Institute for Research in Mathematical Sciences,
`Toronto, Canada, October 2015.
`
`2. Historical Papers in Cryptography Seminar Series, Summer 2015 program on Cryp-
`tography, Simons Institute, Berkeley, California, August 2015.
`(http://simons.
`berkeley.edu/crypto2015/historical-papers-seminar-series).
`
`3. The Sixth International Conference on Provable Security, Chengdu, China, September
`2012.
`
`4. 5th Workshop on Hot Topics in Privacy Enhancing Technologies, Vigo, Spain, July
`2012.
`
`5. Applied Cryptography and Network Security, New York, June 2005.
`
`6. Crypto 2004, Santa Barbara, August 2004.
`
`7. Workshop on the Elliptic Curve Discrete Logarithm Problem, Waterloo, Canada,
`August 2003.
`
`8. RSA Conference 2002, Cryptographer’s Track, February 2002.
`
`9. Workshop on the Elliptic Curve Discrete Logarithm Problem, Waterloo, Canada,
`September 2001.
`
`10. International Symposium on Symbolic and Algebraic Computation, London, Canada,
`July 2001.
`
`2
`
`IPR2020-00202
`Apple Inc. EX1007 Page 2
`
`

`

`11. LMS Durham Symposium on Computational Number Theory, Durham, England,
`August 2000.
`
`12. Conference on The Mathematics of Public-Key Cryptography, Toronto, Canada, June
`1999.
`
`13. Workshop on the Elliptic Curve Discrete Logarithm Problem, Waterloo, Canada,
`November 1997.
`
`14. Fourth Annual Conference on Finite Fields and Applications, Waterloo, Ontario, Au-
`gust 1997.
`
`15. IMACS Symposium on Symbolic Computation, Lille, France, June 1993.
`
`16. Workshop on Number Theory and Algorithms, MSRI, Berkeley, CA, March 1990.
`
`17. Summer Meeting of the AMS—Special Session on Cryptography and Number Theory,
`Boulder, CO, August 1989.
`
`Books (author)
`
`1. A Computational Introduction to Number Theory and Algebra, Cambridge University
`Press, 517 pages, June 2005. Revised second edition, 2008. The electronic version of
`the book is (and will remain) freely available at http://www.shoup.net/ntb.
`
`Books (editor)
`
`1. Advances in Cryptology – CRYPTO 2005 (LNCS 3621), Springer, 568 pages, August
`2005.
`
`Patents
`
`1. Method for reducing a value modulo a shared secret, with J. Algesheimer, J. Ca-
`menisch. US Patent Number 7194089, March 20, 2007.
`
`2. Piggy-backed key exchange protocol for providing secure, low-overhead browser con-
`nections when a client requests a server to propose a message encoding scheme, with
`C. Binding, S. Hild, Y. M. Huang, Y-M., L. O’Connor, S. K. Singhal, M. Steiner. US
`Patent Number 7039946, May 2, 2006.
`
`3. Agreement and atomic broadcast in asynchronous networks, with C. Cachin, K. Kur-
`sawe, F. Petzold. US Patent Number 6931431, August 16, 2005.
`
`4. Method of achieving multiple processor agreement in potentially asynchronous net-
`works, with C. Cachin, K. Kursawe. US Patent Number 6957332, Oct 18, 2005.
`
`3
`
`IPR2020-00202
`Apple Inc. EX1007 Page 3
`
`

`

`5. Piggy-backed key exchange protocol for providing secure low-overhead browser con-
`nections from a client to a server using a trusted third party, with C. Binding, S. Hild,
`Y. M. Huang, Y-M., L. O’Connor, S. K. Singhal, M. Steiner. US Patent Number
`6775772, August 10, 2004.
`
`6. Method of achieving optimistic multiple processor agreement in potentially asyn-
`chronous networks, with K. Kursawe. US Patent Number 6754845, June 22, 2004.
`
`7. Piggy-backed key exchange protocol for providing secure, low-overhead browser con-
`nections to a server with which a client shares a message encoding scheme, with C.
`Binding, S. Hild, Y. M. Huang, Y-M., L. O’Connor, S. K. Singhal, M. Steiner. US
`Patent Number 6751731, June 15, 2004.
`
`8. Practical non-malleable public-key cryptosystem, with R. Cramer. US Patent Number
`6697488, February 24, 2004.
`
`9. Piggy-backed key exchange protocol for providing secure, low-overhead browser con-
`nections when a server will not use a message encoding scheme proposed by a client,
`with C. Binding, S. Hild, Y. M. Huang, Y-M., L. O’Connor, S. K. Singhal, M. Steiner.
`US Patent Number 6694431, February 17, 2004.
`
`10. Session key distribution using smart cards, with A. Rubin. US Patent Number
`5809140, September 15, 1998.
`
`Standards
`
`1. Editor, ISO/IEC Standard on Encryption Algorithms (18033, Part 2: Asymmetric
`Encryption).
`
`Software
`
`1. Author and maintainer of NTL, a free, high-performance, C++ library for number
`theoretic computations. NTL consists of approximately 140,000 lines of source code,
`and has been used and cited in numerous research articles, and in a number of uni-
`versity courses around the world (the software has averaged well over 500 downloads
`a month for many years, and a quick Google Scholar search reveals several hundred
`research citations). For more information, visit http://www.shoup.net/ntl.
`
`2. Co-author of HElib, a library that implements the Brakerski-Gentry-Vaikuntanathan
`homomorphic encryption scheme. For more information, visit https://github.com/
`homenc/HElib.
`
`4
`
`IPR2020-00202
`Apple Inc. EX1007 Page 4
`
`

`

`Other Professional Activities
`
`1. Program Chair, Crypto 2005.
`
`2. Program committee member:
`• CT-RSA 2020,
`• Crypto 2000, 2003,
`• RSA 2001,
`• Eurocrypt 1999,
`• International Symposium on Symbolic and Algebraic Computation (ISSAC)
`1999,
`• Foundations of Computer Science (FOCS) 1994.
`
`Research Articles
`These are my research articles that have appeared in journals and/or refereed con-
`ferences. They are all available on-line at http://www.shoup.net/papers. Authors on
`multi-author papers are in alphabetical order, except for papers [41] and [47], where all
`authors are in the order indicated.
`
`1. An improved RNS variant of the BFV homomorphic encryption scheme, with Shai
`Halevi and Yuriy Polyakov, Topics in Cryptology — CT-RSA 2019.
`
`2. Doing real work with FHE: the case of logistic regression, with Jack L. H. Craw-
`ford, Craig Gentry, Shai Halevi and Daniel Platt, WAHC ’18 Proceedings of the 6th
`Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2019.
`
`3. Faster Homomorphic Linear Transformations in HElib, with Shai Halevi, CRYPTO
`2018.
`
`4. Implementing BP-Obfuscation Using Graph-Induced Encoding, with Shai Halevi, Tzi-
`pora Halevi, and Noah Stephens-Davidowitz, ACM CCS 2017.
`
`5. Bootstrapping for HElib, with Shai Halevi, Eurocrypt 2015.
`
`6. Algorithms in HElib, with Shai Halevi, Eurocrypt 2014.
`
`7. Practical and employable protocols for UC-Secure circuit evaluation over Zn, with J.
`Camenisch and R. Enderlein. ESORICS 2013.
`
`8. GNUC: A New Universal Composability Framework, with D. Hofheinz. J. Cryptology,
`2013.
`
`9. Practical chosen ciphertext secure encryption from factoring, with D. Hofheinz and
`E. Kilz. J. Cryptology 26(1):102–118, 2012.
`
`5
`
`IPR2020-00202
`Apple Inc. EX1007 Page 5
`
`

`

`10. A Framework for Practical Universally Composable Zero-Knowledge Protocols, with
`J. Camensisch and S. Krenn. Asiacrypt 2011.
`
`11. Anonymous Credentials on Java Card, with P. Bichsel, J. Camenisch, and T. Gross.
`21st Fraunhofer SIT-Smartcard Workshop, 2011.
`
`12. Credential authenticated identification and key exchange, with J. Camenisch, N.
`Casati, and T. Gross. CRYPTO 2010.
`
`13. Simple and efficient public-key encryption from computational Diffie-Hellman in the
`standard model, with K. Haralambiev, T. Jager, and E. Kiltz. PKC 2010.
`
`14. Anonymous credentials on a standard Java Card, with P. Bichsel, J. Camenisch, and
`T. Gross. ACM CCS 2009.
`
`15. A new and improved paradigm for hybrid encryption secure against chosen-ciphertext
`attack, with Y. Desmedt, R. Gennaro, and K. Kurosawa. J. Cryptology 23(1):91-120,
`2010
`
`16. A public key encryption scheme secure against key dependent chosen plaintext and
`adaptive chosen ciphertext attacks, with J. Camenisch and N. Chandran. Eurocrypt
`2009.
`
`17. Efficient constructions of composable commitments and zero-knowledge proofs, with
`Y. Dodis and S. Walfish. CRYPTO 2008.
`
`18. The Twin Diffie-Hellman problem and applications, with D. Cash and E. Kiltz. Eu-
`rocrypt 2008.
`
`19. Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation,
`with M. Bellare and T. Kohno. In Proc. 13th ACM Conf. on Computer and Commu-
`nications Security, 2006.
`
`20. Optimistic asynchronous atomic broadcast, with K. Kursawe, in Proc. ICALP 2005.
`
`21. Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of
`Kurosawa-Desmedt KEM, with M. Abe, R. Gennaro, K. Kurosawa, in Proc. Eu-
`rocrypt 2005.
`
`22. Anonymous identification in ad hoc groups, with Y. Dodis, A. Nicolosi, and A. Kiayias,
`in Proc. Eurocrypt 2004.
`
`23. Design and analysis of practical public-key encryption schemes secure against adaptive
`chosen ciphertext attack, with R. Cramer, SIAM Journal on Computing 33:167–226,
`2003.
`
`24. Practical verifiable encryption of and decryption of discrete logarithms, with J. Ca-
`menisch, in Proc. Crypto 2003.
`
`25. A secure signature scheme from bilinear maps, with D. Boneh and I. Mironov, in Proc.
`RSA CT-2003.
`
`6
`
`IPR2020-00202
`Apple Inc. EX1007 Page 6
`
`

`

`26. Efficient computation modulo a shared secret with application to the generation of
`shared safe-prime products, with J. Algesheimer and J. Camenisch, in Proc. Crypto
`2002.
`
`27. Universal hash proofs and a paradigm for chosen ciphertext secure public key encryp-
`tion, with R. Cramer, in Proc. Eurocrypt 2002.
`
`28. OAEP reconsidered, Journal of Cryptology 15(4):223–249, 2002. Extended abstract
`in Proc. Crypto 2001.
`
`29. Secure and efficient asynchronous broadcast protocols, with C. Cachin, K. Kursawe,
`and F. Petzold, in Proc. Crypto 2001.
`
`30. Factorization in Z[x]: the searching phase, with J. Abbott and P. Zimmermann, in
`Proc. 2000 International Symposium on Symbolic and Algebraic Computation.
`
`31. Random oracles in Constantinople: practical asynchronous Byzantine agreement using
`cryptography, with C. Cachin and K. Kursawe, in Proc. 2000 Principles of Distributed
`Computing. To appear, Journal of Cryptology.
`
`32. Algorithms for exponentiation in finite fields, with S. Gao, J. von zur Gathen, and D.
`Panario, Journal of Symbolic Computation 29:879–889, 2000.
`
`33. A composition theorem for universal one-way hash functions, in Proc. Eurocrypt 2000.
`
`34. Using hash functions as a hedge against chosen ciphertext attack, in Proc. Eurocrypt
`2000.
`
`35. Practical threshold signatures, in Proc. Eurocrypt 2000.
`
`36. Signature schemes based on the Strong RSA Assumption, with R. Cramer, ACM
`Transactions on Information and System Security (ACM TISSEC) 3(3):161–185,
`2000. Extended abstract in Proc. 6th ACM Conf. on Computer and Communica-
`tions Security, 1999.
`
`37. Efficient computation of minimal polynomials in algebraic extension of finite fields, in
`Proc. 1999 International Symposium on Symbolic and Algebraic Computation.
`
`38. A practical public key cryptosystem provably secure against adaptive chosen cipher-
`text attack, with R. Cramer, in Proc. Crypto ’98.
`
`39. Optimistic fair exchange of digital signatures, with N. Asokan and M. Waidner, IEEE
`Journal on Selected Areas in Communications 18(4):593–610, 2000. Extended abstract
`in Proc. Eurocrypt ’98.
`
`40. Asynchronous protocols for optimistic fair exchange, with N. Asokan and M. Waidner,
`in Proc. of the IEEE Symp. on Research in Security and Privacy, 1998.
`
`41. Securing threshold cryptosystems against chosen ciphertext attack, by V. Shoup and
`R. Gennaro, Journal of Cryptology 15(2):75–96, 2002. Extended abstract in Proc.
`Eurocrypt ’98.
`
`7
`
`IPR2020-00202
`Apple Inc. EX1007 Page 7
`
`

`

`42. Fast polynomial factorization over high algebraic extensions of finite fields, with E.
`Kaltofen, in Proc. 1997 International Symposium on Symbolic and Algebraic Compu-
`tation.
`
`43. Private information storage, with R. Ostrovsky, in Proc. 29th ACM Symposium on
`Theory of Computation, 1997.
`
`44. Lower bounds for discrete logarithms and related problems, in Proc. Eurocrypt ’97.
`
`45. On fast and provably secure message authentication based on universal hashing, in
`Proc. Crypto ’96.
`
`46. On the security of a practical identification scheme, Journal of Cryptology 12(4):247–
`260, 1999. Extended abstract in Proc. Eurocrypt ’96.
`
`47. Session-key distribution using smart cards, by V. Shoup and A. Rubin, in Proc. Eu-
`rocrypt ’96.
`
`48. Subquadratic-time factorization of polynomials over finite fields, with E. Kaltofen,
`Mathematics of Computation 67(223):1179–1197, 1998. Extended abstract in Proc.
`27th ACM Symposium on Theory of Computation, 1995.
`
`49. A new polynomial factorization algorithm and its implementation, Journal of Symbolic
`Computation 20:363-397, 1995.
`
`50. Counting the number of points on elliptic curves of characteristic greater than three,
`with F. Lehmann, M. Mauerer, and V. Mueller, in Proc. First Algorithmic Number
`Theory Symposium, 1994.
`
`51. Primality testing with fewer random bits, with R. Peralta, Computational Complexity
`3:355–367, 1993.
`
`52. Factoring polynomials over finite fields: asymptotic complexity vs. reality, in Proc.
`IMACS Symposium, Lille, France, 1993.
`
`53. Fast construction of irreducible polynomials over finite fields, Journal of Symbolic
`Computation 17:371–391, 1994. Extended abstract in Proc. 4th Annual Symposium
`on Discrete Algorithms, 1993.
`
`54. Computing Frobenius maps and factoring polynomials, with J. von zur Gathen, Com-
`putational Complexity 2:187–224, 1992. Extended abstract in Proc. 24th ACM Sym-
`posium on Theory of Computing, 1992.
`
`55. Smoothness and factoring polynomials over finite fields, Information Processing Let-
`ters 39:39–42, 1991.
`
`56. A fast deterministic algorithm for factoring polynomials over finite fields of small char-
`acteristic, in Proc. 1991 International Symposium on Symbolic and Algebraic Compu-
`tation.
`
`8
`
`IPR2020-00202
`Apple Inc. EX1007 Page 8
`
`

`

`57. Lower bounds for polynomial evaluation and interpolation problems, with R. Smolen-
`sky, Computational Complexity 6:301–311, 1997. Extended abstract in Proc. 31st
`Annual Symposium on Foundations of Computer Science, 1991.
`
`58. Constructing nonresidues in finite fields and the Extended Riemann Hypothesis, with
`J. Buchmann, Mathematics of Computation 65(215):1311–1326, 1996. Extended ab-
`stract in Proc. 23rd ACM Symposium on Theory of Computation, 1991.
`
`59. On the deterministic complexity of factoring polynomials over finite fields, Information
`Processing Letters 33:261–267, 1990.
`
`60. Hiding instances in zero-knowledge proof systems, with D. Beaver and J. Feigenbaum,
`in Proc. Crypto ’90.
`
`61. Factoring polynomials using fewer random bits, with E. Bach, Journal of Symbolic
`Computation 9:229–239, 1990.
`
`62. Searching for primitive roots in finite fields, Mathematics of Computation 58:369-380,
`1992. Extended abstract in Proc. 22nd ACM Symposium on Theory of Computation,
`1990.
`
`63. New algorithms for finding irreducible polynomials over finite fields, Mathematics of
`Computation 54:435–447, 1990. Extended abstract in Proc. 29th Annual Symposium
`on Foundations of Computer Science, 1988.
`
`9
`
`IPR2020-00202
`Apple Inc. EX1007 Page 9
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket