George Teseleanu

Orcid: 0000-0003-3953-2744

According to our database1, George Teseleanu authored at least 54 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Attacking an RSA-like Cryptosystem Using Continued Fractions and Lattices.
IACR Cryptol. ePrint Arch., 2025

A Generalized Wiener-type Attack Against a Family RSA-like Cryptosystem.
IACR Cryptol. ePrint Arch., 2025

Security Analysis of a Color Image Encryption Scheme Based on a Fractional-Order Hyperchaotic System.
Proceedings of the 11th International Conference on Information Systems Security and Privacy, 2025

(Deep) Learning About Elliptic Curve Cryptography.
Proceedings of the 11th International Conference on Information Systems Security and Privacy, 2025

2024
A Note on the Quasigroup of Lai-Massey Structures.
Cryptogr., September, 2024

Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.
IACR Cryptol. ePrint Arch., 2024

A Security Analysis of Two Classes of RSA-like Cryptosystems.
IACR Cryptol. ePrint Arch., 2024

Partial Exposure Attacks Against a Family of RSA-like Cryptosystems.
Cryptogr., 2024

Another Lattice Attack Against an RSA-Like Cryptosystem.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2024

The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem.
Proceedings of the Number-Theoretic Methods in Cryptology - 4th International Conference, 2024

Small Private Exponent Attacks on Takagi Family Schemes.
Proceedings of the Secure IT Systems, 2024

Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

A Lattice Attack Against a Family of RSA-Like Cryptosystems.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2024

On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024

2023
Cryptographic symmetric structures based on quasigroups.
Cryptologia, July, 2023

Inferring Bivariate Polynomials for Homomorphic Encryption Application.
Cryptogr., June, 2023

Security Analysis of a Color Image Encryption Scheme Based on a Fractionalâ€'Order Hyperchaotic System.
IACR Cryptol. ePrint Arch., 2023

Threshold Cryptosystems Based on 2<sup>k</sup>-th Power Residue Symbols.
IACR Cryptol. ePrint Arch., 2023

A Note on a CBC-Type Mode of Operation.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Threshold Cryptosystems Based on 2^k-th Power Residue Symbols.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Some Results on Related Key-IV Pairs of Espresso.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2023

Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2023

Small Private Key Attack Against a Family of RSA-Like Cryptosystems.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem.
IACR Cryptol. ePrint Arch., 2022

The Security of Quasigroups Based Substitution Permutation Networks.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

Sherlock Holmes Zero-Knowledge Protocols.
Proceedings of the Information Security Practice and Experience, 2022

Continued Fractions Applied to a Family of RSA-like Cryptosystems.
Proceedings of the Information Security Practice and Experience, 2022

2021
Cryptographic Protocols. (Protocoles cryptographiques).
PhD thesis, 2021

Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes.
IACR Cryptol. ePrint Arch., 2021

Quasigroups and substitution permutation networks: a failed experiment.
Cryptologia, 2021

Signer and Message Ambiguity from a Variety of Keys.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Lightweight Swarm Authentication.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

New Configurations of Grain Ciphers: Security Against Slide Attacks.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

Communicating Through Subliminal-Free Signatures.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

Concurrent Signatures from a Variety of Keys.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2<sup>k</sup>-Residuosity Assumption.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

A Love Affair Between Bias Amplifiers and Broken Noise Sources.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics.
Proceedings of the 3rd International Conference on Historical Cryptology, 2020

2019
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography.
IACR Cryptol. ePrint Arch., 2019

Subliminal Hash Channels.
IACR Cryptol. ePrint Arch., 2019

A Generic View on the Unified Zero-Knowledge Protocol and Its Applications.
Proceedings of the Information Security Theory and Practice, 2019

Physical Cryptography.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Managing Your Kleptographic Subscription Plan.
Proceedings of the Codes, Cryptology and Information Security, 2019

Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
A Unified Security Perspective on Legally Fair Contract Signing Protocols.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Unifying Kleptographic Attacks.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Random Number Generators Can Be Fooled to Behave Badly.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Secretly Embedding Trapdoors into Contract Signing Protocols.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

2016
Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited.
IACR Cryptol. ePrint Arch., 2016

Security of Identity-Based Encryption Schemes from Quadratic Residues.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016

2013
New Proofs for the p, q-Analogue of Chu-Vandermonde's Identity.
Integers, 2013


  Loading...