George Teseleanu

Orcid: 0000-0003-3953-2744

According to our database1, George Teseleanu authored at least 42 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem.
IACR Cryptol. ePrint Arch., 2024

2023
Cryptographic symmetric structures based on quasigroups.
Cryptologia, July, 2023

Inferring Bivariate Polynomials for Homomorphic Encryption Application.
Cryptogr., June, 2023

Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes.
IACR Cryptol. ePrint Arch., 2023

Small Private Key Attack Against a Family of RSA-like Cryptosystems.
IACR Cryptol. ePrint Arch., 2023

Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps.
IACR Cryptol. ePrint Arch., 2023

Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.
IACR Cryptol. ePrint Arch., 2023

Some Results on Related Key-IV Pairs of Espresso.
IACR Cryptol. ePrint Arch., 2023

Security Analysis of a Color Image Encryption Scheme Based on a Fractionalâ€'Order Hyperchaotic System.
IACR Cryptol. ePrint Arch., 2023

Threshold Cryptosystems Based on 2<sup>k</sup>-th Power Residue Symbols.
IACR Cryptol. ePrint Arch., 2023

A Note on a CBC-Type Mode of Operation.
IACR Cryptol. ePrint Arch., 2023

Threshold Cryptosystems Based on 2^k-th Power Residue Symbols.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2022
Security of Identity-based Encryption Schemes from Quadratic Residues.
IACR Cryptol. ePrint Arch., 2022

Continued Fractions Applied to a Family of RSA-like Cryptosystems.
IACR Cryptol. ePrint Arch., 2022

Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations.
IACR Cryptol. ePrint Arch., 2022

The Security of Quasigroups Based Substitution Permutation Networks.
IACR Cryptol. ePrint Arch., 2022

Sherlock Holmes Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2022

The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem.
IACR Cryptol. ePrint Arch., 2022

2021
Cryptographic Protocols. (Protocoles cryptographiques).
PhD thesis, 2021

Lightweight Swarm Authentication.
IACR Cryptol. ePrint Arch., 2021

Communicating Through Subliminal-Free Signatures.
IACR Cryptol. ePrint Arch., 2021

Concurrent Signatures from a Variety of Keys.
IACR Cryptol. ePrint Arch., 2021

Signer and Message Ambiguity from a Variety of Keys.
IACR Cryptol. ePrint Arch., 2021

Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes.
IACR Cryptol. ePrint Arch., 2021

Quasigroups and substitution permutation networks: a failed experiment.
Cryptologia, 2021

2020
A Love Affair Between Bias Amplifiers and Broken Noise Sources.
IACR Cryptol. ePrint Arch., 2020

Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics.
IACR Cryptol. ePrint Arch., 2020

A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2<sup>k</sup>-Residuosity Assumption.
IACR Cryptol. ePrint Arch., 2020

On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography.
Appl. Math. Comput., 2020

2019
Subliminal Hash Channels.
IACR Cryptol. ePrint Arch., 2019

Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG.
IACR Cryptol. ePrint Arch., 2019

Managing Your Kleptographic Subscription Plan.
IACR Cryptol. ePrint Arch., 2019

A Generic View on the Unified Zero-Knowledge Protocol and its Applications.
IACR Cryptol. ePrint Arch., 2019

Physical Cryptography.
IACR Cryptol. ePrint Arch., 2019

2018
Unifying Kleptographic Attacks.
IACR Cryptol. ePrint Arch., 2018

Random Number Generators Can Be Fooled to Behave Badly.
IACR Cryptol. ePrint Arch., 2018

A Unified Security Perspective on Legally Fair Contract Signing Protocols.
IACR Cryptol. ePrint Arch., 2018

New Configurations of Grain Ciphers: Security Against Slide Attacks.
IACR Cryptol. ePrint Arch., 2018

2017
Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures.
IACR Cryptol. ePrint Arch., 2017

Secretly Embedding Trapdoors into Contract Signing Protocols.
IACR Cryptol. ePrint Arch., 2017

2016
Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited.
IACR Cryptol. ePrint Arch., 2016

2013
New Proofs for the p, q-Analogue of Chu-Vandermonde's Identity.
Integers, 2013


  Loading...