{"id":5566,"date":"2023-05-03T00:41:14","date_gmt":"2023-05-02T21:41:14","guid":{"rendered":"https:\/\/www.uol.ac.cy\/?post_type=team&#038;p=5566"},"modified":"2025-07-24T18:24:49","modified_gmt":"2025-07-24T15:24:49","slug":"theodosis-mourouzis","status":"publish","type":"team","link":"https:\/\/www.uol.ac.cy\/el\/team\/theodosis-mourouzis\/","title":{"rendered":"\u0394\u03c1 \u0398\u03b5\u03bf\u03b4\u03cc\u03c3\u03b7\u03c2 \u039c\u03bf\u03c5\u03c1\u03bf\u03cd\u03b6\u03b7\u03c2"},"content":{"rendered":"","protected":false},"featured_media":56381,"template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"class_list":["post-5566","team","type-team","status-publish","has-post-thumbnail","hentry"],"acf":[],"spectra_custom_meta":{"_last_editor_used_jetpack":["classic-editor"],"_edit_last":["17"],"position":["Assistant Professor"],"_position":["field_644b87311de79"],"expertise_info":["<p class=\"contentpasted6\" style=\"margin-bottom: 14.4pt; background: white;\"><span lang=\"EN-US\" style=\"font-family: 'Arial',sans-serif; color: black;\">My research expertise is in information security and in particular cryptography and Blockchain. I research cryptanalytics techniques in symmetric and symmetric crypto design as well as the more efficient design of Blockchain Ecosystems.<\/span><\/p>"],"_expertise_info":["field_644b87461de7a"],"short_bio_info":["<p class=\"contentpasted6\" style=\"margin-bottom: 14.4pt; background: white;\"><span lang=\"EN-US\" style=\"font-family: 'Arial',sans-serif; color: black;\">I am an Assistant Professor of Information Management at UoL and the Director of the MSc in Business Intelligence and Data Analytics. I hold a PhD in Information Security and Cryptography from the University College London (UCL), an MSc in Advanced Studies in Mathematics from the University of Cambridge and BA\/MA in Mathematics from the University of Cambridge.<\/span><\/p>"],"_short_bio_info":["field_644b87531de7b"],"publications_info":["<ul>\r\n \t<li><strong>2021<\/strong><\/li>\r\n<\/ul>\r\n<em><a href=\"https:\/\/dblp.org\/pid\/119\/7828.html\">Sofia-Maria Dima<\/a>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/219\/9984.html\">Alexandros Hasikos<\/a>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/51\/11342.html\">Stylianos Kampakis<\/a>,\u00a0Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/298\/1128.html\">Andreas Papageorgiou<\/a>:\r\n<strong>Hygiea: A secure, smart, privacy-preserving and interoperable Blockchain solution for the Covid-19 pandemic.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/journals\/corr\/corr2107.html#abs-2107-09926\">CoRR\u00a0abs\/2107.09926<\/a>\u00a0(2021)<\/em>\r\n\r\n<em>Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/298\/2615.html\">Andreas Avgousti<\/a>:\r\n<strong>Intrusion Detection with Machine Learning Using Open-Sourced Datasets.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/journals\/corr\/corr2107.html#abs-2107-12621\">CoRR\u00a0abs\/2107.12621<\/a>\u00a0(2021)<\/em>\r\n<ul>\r\n \t<li><strong>2019<\/strong><\/li>\r\n<\/ul>\r\n<em>Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/237\/9980.html\">Jayant Tandon<\/a>:\r\n<strong>Introduction to Decentralization and Smart Contracts.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/journals\/corr\/corr1903.html#abs-1903-04806\">CoRR\u00a0abs\/1903.04806<\/a>\u00a0(2019)<\/em>\r\n<ul>\r\n \t<li><strong>2018<\/strong><\/li>\r\n<\/ul>\r\n<em>Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/72\/2214.html\">Kyriacos E. Pavlou<\/a>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/51\/11342.html\">Stylianos Kampakis<\/a>:\r\n<strong>The Evolution of User-Selected Passwords: A Quantitative Analysis of Publicly Available Datasets.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/journals\/corr\/corr1804.html#abs-1804-03946\">CoRR\u00a0abs\/1804.03946<\/a>\u00a0(2018)<\/em>\r\n<ul>\r\n \t<li><strong>2017<\/strong><\/li>\r\n<\/ul>\r\n<em>Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/58\/9687.html\">Marcin W\u00f3jcik<\/a>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/66\/6736.html\">Nikos Komninos<\/a><\/em><em>:\r\n<strong>On The Security Evaluation of Partial Password Implementations.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/journals\/corr\/corr1701.html#MourouzisWK17\">CoRR\u00a0abs\/1701.00104<\/a>\u00a0(2017)<\/em>\r\n\r\n<em>Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/211\/7018.html\">Chrysostomos Filipou<\/a>:\r\n<strong>The Blockchain Revolution: Insights from Top-Management.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/journals\/corr\/corr1712.html#abs-1712-04649\">CoRR\u00a0abs\/1712.04649<\/a>\u00a0(2017)<\/em>\r\n<ul>\r\n \t<li><strong>2015<\/strong><\/li>\r\n<\/ul>\r\n<em>Theodosis Mourouzis:\r\n<strong>Optimizations in algebraic and differential cryptanalysis.<\/strong>\u00a0University College London, UK,\u00a02015<\/em>\r\n\r\n<em><a href=\"https:\/\/dblp.org\/pid\/89\/381.html\">Nicolas T. Courtois<\/a>,\u00a0Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/85\/91.html\">Michal Misztal<\/a><\/em><em>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/q\/JJQuisquater.html\">Jean-Jacques Quisquater<\/a>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/151\/7159.html\">Guangyan Song<\/a>:\r\n<strong>Can GOST Be Made Secure Against Differential Cryptanalysis?<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/journals\/cryptologia\/cryptologia39.html#CourtoisMMQS15\">Cryptologia\u00a039(2)<\/a>:\u00a0145-156\u00a0(2015)<\/em>\r\n\r\n<em>Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/151\/7159.html\">Guangyan Song<\/a>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/89\/381.html\">Nicolas T. Courtois<\/a>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/162\/8960.html\">Michalis Christofi<\/a>:\r\n<strong>Advanced Differential Cryptanalysis of Reduced-Round SIMON64\/128 Using Large-Round Statistical Distinguishers.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/journals\/iacr\/iacr2015.html#MourouzisSCC15\">IACR Cryptol. ePrint Arch.\u00a02015<\/a>:\u00a0481\u00a0(2015)<\/em>\r\n<ul>\r\n \t<li><strong>2014<\/strong><\/li>\r\n<\/ul>\r\n<em><a href=\"https:\/\/dblp.org\/pid\/89\/381.html\">Nicolas T. Courtois<\/a>,\u00a0Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/151\/7159.html\">Guangyan Song<\/a>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/66\/7169.html\">Pouyan Sepehrdad<\/a>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/31\/8341.html\">Petr Susil<\/a>:\r\n<strong>Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/conf\/secrypt\/secrypt2014.html#CourtoisMSSS14\">SECRYPT\u00a02014<\/a>:\u00a0399-404<\/em>\r\n<ul>\r\n \t<li><strong>2013<\/strong><\/li>\r\n<\/ul>\r\n<em><a href=\"https:\/\/dblp.org\/pid\/89\/381.html\">Nicolas T. Courtois<\/a>,\u00a0Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/85\/91.html\">Michal Misztal<\/a>:\r\n<strong>Enhanced Truncated Differential Cryptanalysis of GOST.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/conf\/secrypt\/secrypt2013.html#CourtoisMM13\">SECRYPT\u00a02013<\/a>:\u00a0411-418<\/em>\r\n<ul>\r\n \t<li><strong>2012<\/strong><\/li>\r\n<\/ul>\r\n<em><a href=\"https:\/\/dblp.org\/pid\/89\/381.html\">Nicolas T. Courtois<\/a>,\u00a0Theodosis Mourouzis,\u00a0<a href=\"https:\/\/dblp.org\/pid\/118\/1191.html\">Pho V. Le<\/a>:\r\n<strong>Extension of de Weger's Attack on RSA with Large Public Keys.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/conf\/secrypt\/secrypt2012.html#CourtoisML12\">SECRYPT\u00a02012<\/a>:\u00a0145-153<\/em>\r\n<ul>\r\n \t<li><strong>2011<\/strong><\/li>\r\n<\/ul>\r\n<em><a href=\"https:\/\/dblp.org\/pid\/89\/381.html\">Nicolas T. Courtois<\/a>,\u00a0Theodosis Mourouzis:\r\n<strong>Black-box Collision Attacks on the Compression Function of the GOST Hash Function.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/conf\/secrypt\/secrypt2011.html#CourtoisM11\">SECRYPT\u00a02011<\/a>:\u00a0325-332<\/em>\r\n\r\n<em><a href=\"https:\/\/dblp.org\/pid\/89\/381.html\">Nicolas T. Courtois<\/a>,\u00a0<a href=\"https:\/\/dblp.org\/pid\/78\/4179.html\">Daniel Hulme<\/a>,\u00a0Theodosis Mourouzis:\r\n<strong>Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis.<\/strong>\u00a0<a href=\"https:\/\/dblp.org\/db\/journals\/iacr\/iacr2011.html#CourtoisHM11\">IACR Cryptol. ePrint Arch.\u00a02011<\/a>:\u00a0475\u00a0(2011)<\/em>"],"_publications_info":["field_644b875d1de7c"],"email":["<a href=\"mailto:theodosis@uol.ac.cy\">theodosis@uol.ac.cy <\/a>"],"_email":["field_644b876d1de7d"],"address":["Limassol Campus 2: 3-5 Chaidariou Street, 3020 Limassol, Cyprus"],"_address":["field_644b87741de7e"],"phone":["<a href=\"tel:0035725261162\">+357 25261162<\/a>"],"_phone":["field_644b877e1de7f"],"personal_website":["<a href=\"https:\/\/t.mourouzis.facultyresume.com\/\" target=\"_blank\">t.mourouzis.facultyresume.com<\/a>"],"_personal_website":["field_644b87861de80"],"_seopress_redirections_type":["301"],"_seopress_redirections_logged_status":["both"],"site-sidebar-layout":["default"],"site-content-layout":["default"],"theme-transparent-header-meta":["default"],"_edit_lock":["1762333560:17"],"_seopress_analysis_target_kw":[""],"_wpml_media_featured":["1"],"projects":[""],"_projects":["field_6486c1332583a"],"ast-site-content-layout":["default"],"site-content-style":["default"],"site-sidebar-style":["default"],"_eael_post_view_count":["3220"],"classic-editor-remember":["classic-editor"],"_wp_page_template":["default"],"stick-header-meta":["default"],"google_scholar":["<a href=\"https:\/\/scholar.google.com\/citations?hl=en&user=V-AhVfsAAAAJ\" target=\"_blank\">Dr Theodosis Mourouzis<\/a>"],"_google_scholar":["field_674de3257f07b"],"_thumbnail_id":["56381"],"position_en":["Assistant Professor"],"_position_en":["field_644b87311de79"],"gender":["male"],"_gender":["field_682c701939e3b"],"school_position":["Director MSc BIDA"],"_school_position":["field_6880279ed0146"],"school_department":["a:1:{i:0;s:38:\"Department of Information Technologies\";}"],"_school_department":["field_688027ddd0147"],"orcid":[""],"_orcid":["field_687e59feb81c8"],"_uag_css_file_name":["uag-css-5566.css"]},"uagb_featured_image_src":{"full":["https:\/\/www.uol.ac.cy\/wp-content\/uploads\/2025\/04\/16.png",512,512,false],"thumbnail":["https:\/\/www.uol.ac.cy\/wp-content\/uploads\/2025\/04\/16-150x150.png",150,150,true],"medium":["https:\/\/www.uol.ac.cy\/wp-content\/uploads\/2025\/04\/16-300x300.png",300,300,true],"medium_large":["https:\/\/www.uol.ac.cy\/wp-content\/uploads\/2025\/04\/16.png",512,512,false],"large":["https:\/\/www.uol.ac.cy\/wp-content\/uploads\/2025\/04\/16.png",512,512,false],"1536x1536":["https:\/\/www.uol.ac.cy\/wp-content\/uploads\/2025\/04\/16.png",512,512,false],"2048x2048":["https:\/\/www.uol.ac.cy\/wp-content\/uploads\/2025\/04\/16.png",512,512,false],"trp-custom-language-flag":["https:\/\/www.uol.ac.cy\/wp-content\/uploads\/2025\/04\/16-12x12.png",12,12,true]},"uagb_author_info":{"display_name":"Christos","author_link":"https:\/\/www.uol.ac.cy\/el\/author\/"},"uagb_comment_info":0,"uagb_excerpt":null,"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/team\/5566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/team"}],"about":[{"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/types\/team"}],"version-history":[{"count":0,"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/team\/5566\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/media\/56381"}],"wp:attachment":[{"href":"https:\/\/www.uol.ac.cy\/el\/wp-json\/wp\/v2\/media?parent=5566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}