Je Sen Teh

Work

Deakin University
|

Lecturer

Australia

Universiti Sains Malaysia
|

Senior Lecturer

Malaysia

University of Luxembourg
|

Research Associate

Luxembourg

Inti International College Penang
|

Lecturer

Malaysia

Education

Universiti Sains Malaysia
Malaysia

PhD

Publications

Revisiting boomerang attacks on lightweight ARX and AND-RX ciphers with applications to KATAN, SIMON and CHAM

Published by

Journal of Information Security and Applications

Summary

journal-article

Towards Analyzable Design Paradigms for Chaos-Based Cryptographic Primitives

Published by

Journal of Cybersecurity and Privacy

Summary

journal-article

Towards Analyzable Design Paradigms for Chaos-Based Cryptographic Primitives

Published by

Journal of Cybersecurity and Privacy

Summary

journal-article

EMCPF: Efficient Multi-party Conditional Payment Flow Payment Protocol on Lightning Payment Channel Network

Published by

Blockchain: Research and Applications

Summary

journal-article

Boomerang cryptanalysis of SAND

Published by

Journal of Information Security and Applications

Summary

journal-article

Proof of Collaborative Contribution — A consensus protocol that incentivizes contribution with applications to distributed solar energy generation

Published by

Sustainable Energy, Grids and Networks

Summary

journal-article

DiffGen: a data-driven framework for generating truncated differentials

Published by

Applied Intelligence

Summary

journal-article

Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps

Published by

Journal of Informatics and Web Engineering

Summary

journal-article

Towards accurate keyspace analysis of chaos-based image ciphers

Published by

Multimedia Tools and Applications

Summary

journal-article

A New Image Encryption Algorithm Based on DNA State Machine for UAV Data Encryption

Published by

Drones

Summary

journal-article

On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM

Published by

Journal of Information Security and Applications

Summary

journal-article

On the resistance of new lightweight block ciphers against differential cryptanalysis

Published by

Heliyon

Summary

journal-article

SIM-P—A Simplified Consensus Protocol Simulator: Applications to Proof of Reputation-X and Proof of Contribution

Published by

IEEE Internet of Things Journal

Summary

journal-article

A New Image Encryption Algorithm Based on DNA State Machine for UAV Data Encryption

Published by

Drones

Summary

journal-article

Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework

Published by

Journal of Information Security and Applications

Summary

journal-article

Differential cryptanalysis of WARP

Published by

Journal of Information Security and Applications

Summary

journal-article

BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning

Published by

Security and Communication Networks

Summary

journal-article

An enhanced color visual cryptography scheme based on the binary dragonfly algorithm

Published by

International Journal of Computers and Applications

Summary

journal-article

New differential cryptanalysis results for the lightweight block cipher BORON

Published by

Journal of Information Security and Applications

Summary

journal-article

Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB

Summary

book-chapter

Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes

Published by

IEEE Access

Summary

journal-article

An overview of visual cryptography techniques

Published by

Multimedia Tools and Applications

Summary

journal-article

Blockchain Consensus: An Overview of Alternative Protocols

Published by

Symmetry

Summary

journal-article

Blockchain Consensus: An Overview of Alternative Protocols

Published by

Symmetry

Summary

journal-article

Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization

Published by

Information Security Journal: A Global Perspective

Summary

journal-article

A Deep Learning Approach for Active S-Box Prediction of Lightweight Generalized Feistel Block Ciphers

Published by

IEEE Access

Summary

journal-article

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

Published by

IEEE Access

Summary

journal-article

An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain

Published by

IEEE Access

Summary

journal-article

Hybrid SVD-Based Image Watermarking Schemes: A Review

Published by

IEEE Access

Summary

journal-article

Improved Facial Recognition Algorithms Based on Dragonfly and Grasshopper Optimization

Summary

book-chapter

Generating True Random Numbers Based on Multicore CPU Using Race Conditions and Chaotic Maps

Published by

Arabian Journal for Science and Engineering

Summary

journal-article

Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic

Published by

Nonlinear Dynamics

Summary

journal-article

Enhanced digital chaotic maps based on bit reversal with applications in random bit generators

Published by

Information Sciences

Summary

journal-article

Implementation and practical problems of chaos-based cryptography revisited

Published by

Journal of Information Security and Applications

Summary

journal-article

A New Chaotic Image Watermarking Scheme Based on SVD and IWT

Published by

IEEE Access

Summary

journal-article

µ<sup>2</sup>: A Lightweight Block Cipher

Published by

Lecture Notes in Electrical Engineering

Summary

book

Network traffic identification of several open source secure proxy protocols

Published by

International Journal of Network Management

Summary

journal-article

Deterministic chaotic finite-state automata

Published by

Nonlinear Dynamics

Summary

journal-article

An image encryption scheme based on hybridizing digital chaos and finite state machine

Published by

Signal Processing

Summary

journal-article

An image encryption scheme based on hybridizing digital chaos and finite state machine

Published by

Signal Processing

Summary

journal-article

A new hybrid digital chaotic system with applications in image encryption

Published by

Signal Processing

Summary

journal-article

A new hybrid digital chaotic system with applications in image encryption

Published by

Signal Processing

Summary

journal-article

A chaos-based keyed hash function based on fixed point representation

Published by

Cluster Computing

Summary

journal-article

A chaos-based keyed hash function based on fixed point representation

Published by

Cluster Computing

Summary

journal-article

A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform

Published by

Multimedia Tools and Applications

Summary

journal-article

A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform

Published by

Multimedia Tools and Applications

Summary

journal-article

Enhancing unimodal digital chaotic maps through hybridisation

Published by

Nonlinear Dynamics

Summary

journal-article

Authentication for ID cards based on colour visual cryptography and facial recognition

Published by

Proceedings of the 3rd International Conference on Cryptography, Security and Privacy - ICCSP '19

Summary

conference-paper

Authentication for ID cards based on colour visual cryptography and facial recognition

Published by

ACM International Conference Proceeding Series

Summary

conference-paper

Digital Cosine Chaotic Map for Cryptographic Applications

Published by

IEEE Access

Summary

journal-article

Enhancing unimodal digital chaotic maps through hybridisation

Published by

Nonlinear Dynamics

Summary

journal-article

A Chaos-Based Authenticated Cipher with Associated Data

Published by

Security and Communication Networks

Summary

journal-article

A chaos-based authenticated cipher with associated data

Published by

Security and Communication Networks

Summary

journal-article

A Stream Cipher based on Spatiotemporal Chaos and True Random Synchronization

Published by

IETE Journal of Research

Summary

journal-article

Towards accurate statistical analysis of security margins: New searching strategies for differential attacks

Published by

IEEE Transactions on Computers

Summary

journal-article

A true random number generator based on hyperchaos and digital sound

Published by

2016 3rd International Conference on Computer and Information Sciences, ICCOINS 2016 - Proceedings

Summary

conference-paper

Accurate estimation of the full differential distribution for general Feistel structures

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Improved Differential Characteristic Searching Methods

Published by

Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015

Summary

conference-paper

GPUs and chaos: a new true random number generator

Published by

Nonlinear Dynamics

Summary

journal-article

Parallel chaotic hash function based on the shuffle-exchange network

Published by

Nonlinear Dynamics

Summary

journal-article