default search action
George Teseleanu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]George Teseleanu:
A Note on the Quasigroup of Lai-Massey Structures. Cryptogr. 8(3): 35 (2024) - [c30]George Teseleanu:
A Lattice Attack Against a Family of RSA-Like Cryptosystems. CSCML 2024: 343-355 - [c29]George Teseleanu:
Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map. ICISSP 2024: 467-473 - [c28]George Teseleanu:
Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps. ICISSP 2024: 745-749 - [e1]Mark Manulis, Diana Maimut, George Teseleanu:
Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14534, Springer 2024, ISBN 978-3-031-52946-7 [contents] - [i47]George Teseleanu:
The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem. IACR Cryptol. ePrint Arch. 2024: 593 (2024) - [i46]George Teseleanu:
A Note on the Quasigroup Lai-Massey Structures. IACR Cryptol. ePrint Arch. 2024: 1247 (2024) - [i45]Paul Cotan, George Teseleanu:
A Security Analysis of Two Classes of RSA-like Cryptosystems. IACR Cryptol. ePrint Arch. 2024: 1263 (2024) - [i44]George Teseleanu:
A Lattice Attack Against a Family of RSA-like Cryptosystems. IACR Cryptol. ePrint Arch. 2024: 1313 (2024) - [i43]George Teseleanu:
Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map. IACR Cryptol. ePrint Arch. 2024: 1334 (2024) - [i42]George Teseleanu:
Another Lattice Attack Against an RSA-like Cryptosystem. IACR Cryptol. ePrint Arch. 2024: 1861 (2024) - [i41]George Teseleanu:
On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms. IACR Cryptol. ePrint Arch. 2024: 1933 (2024) - [i40]Diana Maimut, Alexandru Cristian Matei, George Teseleanu:
(Deep) Learning about Elliptic Curve Cryptography. IACR Cryptol. ePrint Arch. 2024: 2064 (2024) - [i39]George Teseleanu:
Partial Exposure Attacks Against a Family of RSA-like Cryptosystems. IACR Cryptol. ePrint Arch. 2024: 2065 (2024) - 2023
- [j5]Diana Maimut, George Teseleanu:
Inferring Bivariate Polynomials for Homomorphic Encryption Application. Cryptogr. 7(2): 31 (2023) - [j4]George Teseleanu:
Cryptographic symmetric structures based on quasigroups. Cryptologia 47(4): 365-392 (2023) - [c27]George Teseleanu:
Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations. ICISSP 2023: 410-417 - [c26]Paul Cotan, George Teseleanu:
Small Private Key Attack Against a Family of RSA-Like Cryptosystems. NordSec 2023: 57-72 - [c25]Paul Cotan, George Teseleanu:
Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes. SecITC 2023: 26-34 - [c24]George Teseleanu:
Some Results on Related Key-IV Pairs of Espresso. SecITC 2023: 197-216 - [c23]George Teseleanu:
Threshold Cryptosystems Based on 2^k-th Power Residue Symbols. SECRYPT 2023: 295-302 - [c22]George Teseleanu:
A Note on a CBC-Type Mode of Operation. SECRYPT 2023: 353-360 - [i38]George Teseleanu:
A Note on a CBC-Type Mode of Operation. IACR Cryptol. ePrint Arch. 2023: 599 (2023) - [i37]George Teseleanu:
Threshold Cryptosystems Based on 2k-th Power Residue Symbols. IACR Cryptol. ePrint Arch. 2023: 601 (2023) - [i36]Diana Maimut, George Teseleanu:
Inferring Bivariate Polynomials for Homomorphic Encryption Application. IACR Cryptol. ePrint Arch. 2023: 844 (2023) - [i35]George Teseleanu:
Security Analysis of a Color Image Encryption Scheme Based on a Fractionalâ'Order Hyperchaotic System. IACR Cryptol. ePrint Arch. 2023: 1031 (2023) - [i34]George Teseleanu, Paul Cotan:
Small Private Key Attack Against a Family of RSA-like Cryptosystems. IACR Cryptol. ePrint Arch. 2023: 1356 (2023) - [i33]George Teseleanu:
Some Results on Related Key-IV Pairs of Espresso. IACR Cryptol. ePrint Arch. 2023: 1691 (2023) - [i32]George Teseleanu, Paul Cotan:
Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes. IACR Cryptol. ePrint Arch. 2023: 1693 (2023) - [i31]George Teseleanu:
Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map. IACR Cryptol. ePrint Arch. 2023: 1874 (2023) - [i30]George Teseleanu:
Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps. IACR Cryptol. ePrint Arch. 2023: 1877 (2023) - 2022
- [c21]George Teseleanu:
Sherlock Holmes Zero-Knowledge Protocols. ISPEC 2022: 573-588 - [c20]Paul Cotan, George Teseleanu:
Continued Fractions Applied to a Family of RSA-like Cryptosystems. ISPEC 2022: 589-605 - [c19]George Teseleanu:
The Security of Quasigroups Based Substitution Permutation Networks. SecITC 2022: 306-319 - [i29]Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica:
Security of Identity-based Encryption Schemes from Quadratic Residues. IACR Cryptol. ePrint Arch. 2022: 12 (2022) - [i28]George Teseleanu:
The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem. IACR Cryptol. ePrint Arch. 2022: 522 (2022) - [i27]George Teseleanu:
Sherlock Holmes Zero-Knowledge Protocols. IACR Cryptol. ePrint Arch. 2022: 1240 (2022) - [i26]George Teseleanu, Paul Cotan:
Continued Fractions Applied to a Family of RSA-like Cryptosystems. IACR Cryptol. ePrint Arch. 2022: 1241 (2022) - [i25]George Teseleanu:
The Security of Quasigroups Based Substitution Permutation Networks. IACR Cryptol. ePrint Arch. 2022: 1638 (2022) - [i24]George Teseleanu:
Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations. IACR Cryptol. ePrint Arch. 2022: 1694 (2022) - 2021
- [b1]George Teseleanu:
Cryptographic Protocols. (Protocoles cryptographiques). Institute of Mathematics of the Romanian Academy, Romania, 2021 - [j3]George Teseleanu:
Quasigroups and substitution permutation networks: a failed experiment. Cryptologia 45(3): 266-281 (2021) - [c18]George Teseleanu:
Concurrent Signatures from a Variety of Keys. Inscrypt 2021: 3-22 - [c17]George Teseleanu:
Communicating Through Subliminal-Free Signatures. NordSec 2021: 3-15 - [c16]George Teseleanu:
Lightweight Swarm Authentication. SecITC 2021: 248-259 - [c15]Diana Maimut, George Teseleanu:
New Configurations of Grain Ciphers: Security Against Slide Attacks. SecITC 2021: 260-285 - [c14]George Teseleanu:
Signer and Message Ambiguity from a Variety of Keys. SECRYPT 2021: 395-402 - [i23]George Teseleanu:
Signer and Message Ambiguity from a Variety of Keys. IACR Cryptol. ePrint Arch. 2021: 510 (2021) - [i22]Paul Cotan, George Teseleanu:
Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes. IACR Cryptol. ePrint Arch. 2021: 677 (2021) - [i21]George Teseleanu:
Concurrent Signatures from a Variety of Keys. IACR Cryptol. ePrint Arch. 2021: 988 (2021) - [i20]George Teseleanu:
Communicating Through Subliminal-Free Signatures. IACR Cryptol. ePrint Arch. 2021: 1331 (2021) - [i19]George Teseleanu:
Lightweight Swarm Authentication. IACR Cryptol. ePrint Arch. 2021: 1540 (2021) - [i18]George Teseleanu:
Cryptographic Symmetric Structures Based on Quasigroups. IACR Cryptol. ePrint Arch. 2021: 1676 (2021) - 2020
- [j2]Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica:
On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography. Appl. Math. Comput. 372 (2020) - [c13]George Teseleanu:
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics. HistoCrypt 2020: 135-145 - [c12]George Teseleanu:
A Love Affair Between Bias Amplifiers and Broken Noise Sources. ICICS 2020: 386-402 - [c11]Diana Maimut, George Teseleanu:
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2k-Residuosity Assumption. SECITC 2020: 24-40 - [i17]George Teseleanu:
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics. IACR Cryptol. ePrint Arch. 2020: 339 (2020) - [i16]George Teseleanu:
Quasigroups and Substitution Permutation Networks: A Failed Experiment. IACR Cryptol. ePrint Arch. 2020: 357 (2020) - [i15]George Teseleanu:
A Love Affair Between Bias Amplifiers and Broken Noise Sources. IACR Cryptol. ePrint Arch. 2020: 782 (2020) - [i14]Diana Maimut, George Teseleanu:
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2k-Residuosity Assumption. IACR Cryptol. ePrint Arch. 2020: 1399 (2020)
2010 – 2019
- 2019
- [c10]George Teseleanu:
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG. C2SI 2019: 92-104 - [c9]George Teseleanu:
Managing Your Kleptographic Subscription Plan. C2SI 2019: 452-461 - [c8]Mariana Costiuc, Diana Maimut, George Teseleanu:
Physical Cryptography. SECITC 2019: 156-171 - [c7]Diana Maimut, George Teseleanu:
A Generic View on the Unified Zero-Knowledge Protocol and Its Applications. WISTP 2019: 32-46 - [i13]George Teseleanu:
Managing Your Kleptographic Subscription Plan. IACR Cryptol. ePrint Arch. 2019: 67 (2019) - [i12]George Teseleanu:
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG. IACR Cryptol. ePrint Arch. 2019: 86 (2019) - [i11]Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica:
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography. IACR Cryptol. ePrint Arch. 2019: 638 (2019) - [i10]George Teseleanu:
Subliminal Hash Channels. IACR Cryptol. ePrint Arch. 2019: 1112 (2019) - [i9]Mariana Costiuc, Diana Maimut, George Teseleanu:
Physical Cryptography. IACR Cryptol. ePrint Arch. 2019: 1235 (2019) - [i8]Diana Maimut, George Teseleanu:
A Generic View on the Unified Zero-Knowledge Protocol and its Applications. IACR Cryptol. ePrint Arch. 2019: 1432 (2019) - 2018
- [c6]George Teseleanu:
Random Number Generators Can Be Fooled to Behave Badly. ICICS 2018: 124-141 - [c5]George Teseleanu:
Unifying Kleptographic Attacks. NordSec 2018: 73-87 - [c4]Diana Maimut, George Teseleanu:
A Unified Security Perspective on Legally Fair Contract Signing Protocols. SecITC 2018: 477-491 - [i7]Diana Maimut, George Teseleanu:
New Configurations of Grain Ciphers: Security Against Slide Attacks. IACR Cryptol. ePrint Arch. 2018: 692 (2018) - [i6]George Teseleanu:
Random Number Generators Can Be Fooled to Behave Badly. IACR Cryptol. ePrint Arch. 2018: 734 (2018) - [i5]George Teseleanu:
Unifying Kleptographic Attacks. IACR Cryptol. ePrint Arch. 2018: 870 (2018) - [i4]Diana Maimut, George Teseleanu:
A Unified Security Perspective on Legally Fair Contract Signing Protocols. IACR Cryptol. ePrint Arch. 2018: 1027 (2018) - 2017
- [c3]George Teseleanu:
Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures. LATINCRYPT 2017: 401-414 - [c2]Diana Maimut, George Teseleanu:
Secretly Embedding Trapdoors into Contract Signing Protocols. SECITC 2017: 166-186 - [i3]Diana Maimut, George Teseleanu:
Secretly Embedding Trapdoors into Contract Signing Protocols. IACR Cryptol. ePrint Arch. 2017: 446 (2017) - [i2]George Teseleanu:
Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures. IACR Cryptol. ePrint Arch. 2017: 953 (2017) - 2016
- [c1]Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica:
Security of Identity-Based Encryption Schemes from Quadratic Residues. SECITC 2016: 63-77 - [i1]Ferucio Laurentiu Tiplea, George Teseleanu, Sorin Iftene, Anca-Maria Nica:
Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited. IACR Cryptol. ePrint Arch. 2016: 516 (2016) - 2013
- [j1]George Teseleanu:
New Proofs for the p, q-Analogue of Chu-Vandermonde's Identity. Integers 13: A51 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint