Biography
My main area of interest is cryptography, specifically the design and cryptanalysis of symmetric-key algorithms. I have also conducted research on topics such as blockchain consensus, malware detection, and authentication.
Read more on Je Sen's profileResearch interests
Cryptography, blockchain, cyber security
Teaching interests
Algorithms, programming, cryptography, cyber security
Units taught
SIT284/SIT763 - Cyber Security Management
Knowledge areas
Computer Science, Cryptography, Cyber Security
Conferences
SAC, ACNS
Publications
Towards accurate keyspace analysis of chaos-based image ciphers
Abubakar Abba, Je Teh, Moatsum Alawida
(2024), pp. 1-20, Multimedia Tools and Applications, Berlin, Germany, C1
A New Image Encryption Algorithm Based on DNA State Machine for UAV Data Encryption
M Alawida, J Teh, W Alshoura
(2023), Vol. 7, pp. 1-24, Drones, Basel, Switzerland, C1-1
W Teng, J Teh, N Jamil
(2023), Vol. 76, pp. 1-11, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1
On the resistance of new lightweight block ciphers against differential cryptanalysis
Yen Chan, Cher-Yin Khor, Boo Khoo, Je Teh, Wei Teng, Norziana Jamil
(2023), Vol. 9, pp. 1-12, Heliyon, Amsterdam, The Netherlands, C1-1
D Oyinloye, J Teh, N Jamil, J Teh
(2023), Vol. 10, pp. 5083-5094, IEEE Internet of Things Journal, Piscataway, N.J., C1-1
Meet-in-the-Filter and Dynamic Counting with Applications to Speck
A Biryukov, L Cardoso dos Santos, J Teh, A Udovenko, V Velichkov
(2023), Vol. 13905, pp. 149-177, ACNS 2023 : Proceedings of the 21st International Conference on Applied Cryptography and Network Security, Kyoto, Japan, E1-1
BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning
C Chimeleze, N Jamil, R Ismail, K Lam, J Teh, J Samual, C Akachukwu Okeke
(2022), Vol. 2022, pp. 1-24, Security and Communication Networks, London, Eng., C1-1
New differential cryptanalysis results for the lightweight block cipher BORON
J Teh, L Tham, N Jamil, W Yap
(2022), Vol. 66, pp. 1-9, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1
Differential cryptanalysis of WARP
J Teh, A Biryukov
(2022), Vol. 70, pp. 1-10, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1
An enhanced color visual cryptography scheme based on the binary dragonfly algorithm
D Ibrahim, R Abdullah, J Teh
(2022), Vol. 44, pp. 623-632, International Journal of Computers and Applications, London, Eng., C1-1
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework
W Yeoh, J Teh, J Chen
(2022), Vol. 65, pp. 1-15, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1
M Alawida, J Teh, A Mehmood, A Shoufan, W Alshoura
(2022), Vol. 34, pp. 8136-8151, Journal of King Saud University - Computer and Information Sciences, Amsterdam, The Netherlands, C1-1
An FPP-resistant SVD-based image watermarking scheme based on chaotic control
W Alshoura, Z Zainol, J Teh, M Alawida
(2022), Vol. 61, pp. 5713-5734, Alexandria Engineering Journal, Amsterdam, The Netherlands, C1-1
Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB
Y Chan, C Khor, J Teh, W Teng, N Jamil
(2022), Vol. 1641, pp. 55-67, EISA 2022 : Proceedings of the Third International Conference on Emerging Information Security and Applications, Wuhan, China, E1-1
M Idris, J Teh, J Yan, W Yeoh
(2021), Vol. 9, pp. 104205-104216, IEEE Access, Piscataway, N.J., C1-1
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
M Alawida, A Samsudin, N Alajarmeh, J Teh, M Ahmad, W Alshoura
(2021), Vol. 9, pp. 17882-17897, IEEE Access, Piscataway, N.J., C1-1
Hybrid SVD-Based Image Watermarking Schemes: A Review
W Alshoura, Z Zainol, J Teh, M Alawida, A Alabdulatif
(2021), Vol. 9, pp. 32931-32968, IEEE Access, Piscataway, N.J., C1-1
An overview of visual cryptography techniques
D Ibrahim, J Teh, R Abdullah
(2021), Vol. 80, pp. 31927-31952, Multimedia Tools and Applications, Berlin, Germany, C1-1
T Lee, J Teh, N Jamil, J Yan, J Chen
(2021), Vol. 9, pp. 134052-134064, IEEE Access, Piscataway, N.J., C1-1
D Ibrahim, J Teh, R Abdullah
(2021), Vol. 30, pp. 149-159, Information Security Journal, London, Eng., C1-1
Blockchain Consensus: An Overview of Alternative Protocols
Damilare Oyinloye, Je Teh, Norziana Jamil, Moatsum Alawida
(2021), Vol. 13, pp. 1-35, Symmetry, Basel, Switzerland, C1-1
Network traffic identification of several open source secure proxy protocols
Y Zhang, J Chen, K Chen, R Xu, J Teh, S Zhang
(2021), Vol. 31, pp. 1-17, International Journal of Network Management, London, Eng., C1-1
An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain
R Awadallah, A Samsudin, J Teh, M Almazrooie
(2021), Vol. 9, pp. 69513-69526, IEEE Access, Piscataway, N.J., C1-1
Improved Facial Recognition Algorithms Based on Dragonfly and Grasshopper Optimization
D Ibrahim, J Teh, R Abdullah
(2021), Vol. 724, pp. 101-116, ICCST 2020 : Proceedings of the Seventh International Conference on Computational Science and Technology, Pattaya, Thailand, E1-1
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators
M Alawida, A Samsudin, J Teh
(2020), Vol. 512, pp. 1155-1169, Information Sciences, Amsterdam, The Netherlands, C1-1
Generating True Random Numbers Based on Multicore CPU Using Race Conditions and Chaotic Maps
J Teh, M Alawida, A Samsudin
(2020), Vol. 45, pp. 10019-10032, Arabian Journal for Science and Engineering, Berlin, Germany, C1-1
Implementation and practical problems of chaos-based cryptography revisited
J Teh, M Alawida, Y Sii
(2020), Vol. 50, pp. 1-10, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
J Teh, M Alawida, J Ho
(2020), Vol. 100, pp. 713-729, Nonlinear Dynamics, Berlin, Germany, C1-1
A New Chaotic Image Watermarking Scheme Based on SVD and IWT
W Alshoura, Z Zainol, J Teh, M Alawida
(2020), Vol. 8, pp. 43391-43406, IEEE Access, Piscataway, N.J., C1-1
Z Chen, J Chen, W Meng, J Teh, P Li, B Ren
(2020), Vol. 55, pp. 1-10, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata
M Alawida, J Teh, D Oyinloye, W Alshoura, M Ahmad, R Alkhawaldeh
(2020), Vol. 8, pp. 113163-113174, IEEE Access, Piscataway, N.J., C1-1
J Teh, W Teng, A Samsudin, J Chen
(2020), Vol. 14, pp. 1-11, Frontiers of Computer Science, Berlin, Germany, C1-1
µ2: A Lightweight Block Cipher
W Yeoh, J Teh, M Sazali
(2020), Vol. 603, pp. 281-290, ICCST 2019 : Proceedings of the 6th International Conference on Computational Science and Technology, Kota Kinabalu, Malaysia,, E1-1
A machine learning approach to predicting block cipher security
T Lee, J Teh, J Yan, N Jamil, W Yeoh
(2020), pp. 122-132, CRYPTOLOGY 2020 : Proceedings of the 7th International Cryptology and Information Security Conference, [Virtual], E1-1
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm
W Yeoh, J Teh, J Chen
(2020), Vol. 12248, pp. 160-179, ACISP 2020 : Proceedings of the 25th Australasian Conference on Information Security and Privacy, Perth, Western Australia, E1-1
An image encryption scheme based on hybridizing digital chaos and finite state machine
M Alawida, J Teh, A Samsudin, W Alshoura
(2019), Vol. 164, pp. 249-266, Signal Processing, Amsterdam, The Netherlands, C1-1
A new hybrid digital chaotic system with applications in image encryption
M Alawida, A Samsudin, J Teh, R Alkhawaldeh
(2019), Vol. 160, pp. 45-58, Signal Processing, Amsterdam, The Netherlands, C1-1
Enhancing unimodal digital chaotic maps through hybridisation
M Alawida, A Samsudin, J Teh
(2019), Vol. 96, pp. 601-613, Nonlinear Dynamics, Berlin, Germany, C1-1
A chaos-based keyed hash function based on fixed point representation
J Teh, K Tan, M Alawida
(2019), Vol. 22, pp. 649-660, Cluster Computing, Berlin, Germany, C1-1
Deterministic chaotic finite-state automata
M Alawida, A Samsudin, J Teh, W Alshoura
(2019), Vol. 98, pp. 2403-2421, Nonlinear Dynamics, Berlin, Germany, C1-1
Digital Cosine Chaotic Map for Cryptographic Applications
M Alawida, A Samsudin, J Teh, W Alshoura
(2019), Vol. 7, pp. 150609-150622, IEEE Access, Piscataway, N.J., C1-1
Authentication for ID cards based on colour visual cryptography and facial recognition
D Ibrahim, R Abdullah, J Teh, B Alsalibi
(2019), pp. 164-167, ICCSP 2019 : Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, Kuala Lumpur, Malaysia, E1-1
W Yeoh, J Teh, H Chern
(2018), Vol. 78, pp. 1-21, Multimedia Tools and Applications, Berlin, Germany, C1-1
J Chen, J Teh, Z Liu, C Su, A Samsudin, Y Xiang
(2017), Vol. 66, pp. 1763-1777, IEEE transactions on computers, Piscataway, N.J., C1-1
A chaos-based authenticated cipher with associated data
J Teh, A Samsudin
(2017), Vol. 2017, pp. 1-15, Security and Communication Networks, London, Eng., C1-1
A Stream Cipher based on Spatiotemporal Chaos and True Random Synchronization
J Teh, A Samsudin
(2017), Vol. 63, pp. 346-357, IETE Journal of Research, London, Eng., C1-1
A true random number generator based on hyperchaos and digital sound
J Teh, W Teng, A Samsudin
(2016), pp. 264-269, ICCOINS 2016 : Proceedings of the 3rd International Conference on Computer and Information Sciences, Kuala Lumpur, Malaysia, E1-1
J Chen, J Teh, C Su, A Samsudin, J Fang
(2016), Vol. 9723, pp. 333-346, ACISP 2016 : Proceedings of the 21st Australasian Conference on Information Security and Privacy, Melbourne, Vic., E1-1
Accurate estimation of the full differential distribution for general Feistel structures
J Chen, A Miyaji, C Su, J Teh
(2016), Vol. 9589, pp. 108-124, Inscrypt 2015 : Proceedings of the 11th International Conference on Information Security and Cryptology, Beijing, China, E1-1
Improved Differential Characteristic Searching Methods
J Chen, A Miyaji, C Su, J Teh
(2016), pp. 500-508, CSCloud 2015 : Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, New York, NY., E1-1
GPUs and chaos: a new true random number generator
J Teh, A Samsudin, M Al-Mazrooie, A Akhavan
(2015), Vol. 82, pp. 1913-1922, Nonlinear Dynamics, C1-1
Parallel chaotic hash function based on the shuffle-exchange network
J Teh, A Samsudin, A Akhavan
(2015), Vol. 81, pp. 1067-1079, Nonlinear Dynamics, C1-1
Funded Projects at Deakin
No Funded Projects at Deakin found
Supervisions
No completed student supervisions to report