Profile image of Je Sen Teh

Dr Je Sen Teh

STAFF PROFILE

Position

Lecturer, Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Geelong Waurn Ponds Campus

Qualifications

Doctor of Philosophy, Universiti Sains Malaysia, 2017

Contact

Biography

My main area of interest is cryptography, specifically the design and cryptanalysis of symmetric-key algorithms. I have also conducted research on topics such as blockchain consensus, malware detection, and authentication.

Read more on Je Sen's profile

Research interests

Cryptography, blockchain, cyber security

Teaching interests

Algorithms, programming, cryptography, cyber security

Units taught

SIT284/SIT763 - Cyber Security Management

Knowledge areas

Computer Science, Cryptography, Cyber Security

Conferences

SAC, ACNS

Publications

Filter by

2024

Towards accurate keyspace analysis of chaos-based image ciphers

Abubakar Abba, Je Teh, Moatsum Alawida

(2024), pp. 1-20, Multimedia Tools and Applications, Berlin, Germany, C1

journal article
2023

A New Image Encryption Algorithm Based on DNA State Machine for UAV Data Encryption

M Alawida, J Teh, W Alshoura

(2023), Vol. 7, pp. 1-24, Drones, Basel, Switzerland, C1-1

journal article

On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM

W Teng, J Teh, N Jamil

(2023), Vol. 76, pp. 1-11, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1

journal article

On the resistance of new lightweight block ciphers against differential cryptanalysis

Yen Chan, Cher-Yin Khor, Boo Khoo, Je Teh, Wei Teng, Norziana Jamil

(2023), Vol. 9, pp. 1-12, Heliyon, Amsterdam, The Netherlands, C1-1

journal article

SIM-P - A Simplified Consensus Protocol Simulator: Applications to Proof of Reputation-X and Proof of Contribution

D Oyinloye, J Teh, N Jamil, J Teh

(2023), Vol. 10, pp. 5083-5094, IEEE Internet of Things Journal, Piscataway, N.J., C1-1

journal article

Meet-in-the-Filter and Dynamic Counting with Applications to Speck

A Biryukov, L Cardoso dos Santos, J Teh, A Udovenko, V Velichkov

(2023), Vol. 13905, pp. 149-177, ACNS 2023 : Proceedings of the 21st International Conference on Applied Cryptography and Network Security, Kyoto, Japan, E1-1

conference
2022

BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning

C Chimeleze, N Jamil, R Ismail, K Lam, J Teh, J Samual, C Akachukwu Okeke

(2022), Vol. 2022, pp. 1-24, Security and Communication Networks, London, Eng., C1-1

journal article

New differential cryptanalysis results for the lightweight block cipher BORON

J Teh, L Tham, N Jamil, W Yap

(2022), Vol. 66, pp. 1-9, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1

journal article

Differential cryptanalysis of WARP

J Teh, A Biryukov

(2022), Vol. 70, pp. 1-10, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1

journal article

An enhanced color visual cryptography scheme based on the binary dragonfly algorithm

D Ibrahim, R Abdullah, J Teh

(2022), Vol. 44, pp. 623-632, International Journal of Computers and Applications, London, Eng., C1-1

journal article

Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework

W Yeoh, J Teh, J Chen

(2022), Vol. 65, pp. 1-15, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1

journal article

A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations

M Alawida, J Teh, A Mehmood, A Shoufan, W Alshoura

(2022), Vol. 34, pp. 8136-8151, Journal of King Saud University - Computer and Information Sciences, Amsterdam, The Netherlands, C1-1

journal article

An FPP-resistant SVD-based image watermarking scheme based on chaotic control

W Alshoura, Z Zainol, J Teh, M Alawida

(2022), Vol. 61, pp. 5713-5734, Alexandria Engineering Journal, Amsterdam, The Netherlands, C1-1

journal article

Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB

Y Chan, C Khor, J Teh, W Teng, N Jamil

(2022), Vol. 1641, pp. 55-67, EISA 2022 : Proceedings of the Third International Conference on Emerging Information Security and Applications, Wuhan, China, E1-1

conference
2021

A Deep Learning Approach for Active S-Box Prediction of Lightweight Generalized Feistel Block Ciphers

M Idris, J Teh, J Yan, W Yeoh

(2021), Vol. 9, pp. 104205-104216, IEEE Access, Piscataway, N.J., C1-1

journal article

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

M Alawida, A Samsudin, N Alajarmeh, J Teh, M Ahmad, W Alshoura

(2021), Vol. 9, pp. 17882-17897, IEEE Access, Piscataway, N.J., C1-1

journal article

Hybrid SVD-Based Image Watermarking Schemes: A Review

W Alshoura, Z Zainol, J Teh, M Alawida, A Alabdulatif

(2021), Vol. 9, pp. 32931-32968, IEEE Access, Piscataway, N.J., C1-1

journal article

An overview of visual cryptography techniques

D Ibrahim, J Teh, R Abdullah

(2021), Vol. 80, pp. 31927-31952, Multimedia Tools and Applications, Berlin, Germany, C1-1

journal article

Lightweight block cipher security evaluation based on machine learning classifiers and active s-boxes

T Lee, J Teh, N Jamil, J Yan, J Chen

(2021), Vol. 9, pp. 134052-134064, IEEE Access, Piscataway, N.J., C1-1

journal article

Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization

D Ibrahim, J Teh, R Abdullah

(2021), Vol. 30, pp. 149-159, Information Security Journal, London, Eng., C1-1

journal article

Blockchain Consensus: An Overview of Alternative Protocols

Damilare Oyinloye, Je Teh, Norziana Jamil, Moatsum Alawida

(2021), Vol. 13, pp. 1-35, Symmetry, Basel, Switzerland, C1-1

journal article

Network traffic identification of several open source secure proxy protocols

Y Zhang, J Chen, K Chen, R Xu, J Teh, S Zhang

(2021), Vol. 31, pp. 1-17, International Journal of Network Management, London, Eng., C1-1

journal article

An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain

R Awadallah, A Samsudin, J Teh, M Almazrooie

(2021), Vol. 9, pp. 69513-69526, IEEE Access, Piscataway, N.J., C1-1

journal article

Improved Facial Recognition Algorithms Based on Dragonfly and Grasshopper Optimization

D Ibrahim, J Teh, R Abdullah

(2021), Vol. 724, pp. 101-116, ICCST 2020 : Proceedings of the Seventh International Conference on Computational Science and Technology, Pattaya, Thailand, E1-1

conference
2020

Enhanced digital chaotic maps based on bit reversal with applications in random bit generators

M Alawida, A Samsudin, J Teh

(2020), Vol. 512, pp. 1155-1169, Information Sciences, Amsterdam, The Netherlands, C1-1

journal article

Generating True Random Numbers Based on Multicore CPU Using Race Conditions and Chaotic Maps

J Teh, M Alawida, A Samsudin

(2020), Vol. 45, pp. 10019-10032, Arabian Journal for Science and Engineering, Berlin, Germany, C1-1

journal article

Implementation and practical problems of chaos-based cryptography revisited

J Teh, M Alawida, Y Sii

(2020), Vol. 50, pp. 1-10, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1

journal article

Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic

J Teh, M Alawida, J Ho

(2020), Vol. 100, pp. 713-729, Nonlinear Dynamics, Berlin, Germany, C1-1

journal article

A New Chaotic Image Watermarking Scheme Based on SVD and IWT

W Alshoura, Z Zainol, J Teh, M Alawida

(2020), Vol. 8, pp. 43391-43406, IEEE Access, Piscataway, N.J., C1-1

journal article

Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU

Z Chen, J Chen, W Meng, J Teh, P Li, B Ren

(2020), Vol. 55, pp. 1-10, Journal of Information Security and Applications, Amsterdam, The Netherlands, C1-1

journal article

A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata

M Alawida, J Teh, D Oyinloye, W Alshoura, M Ahmad, R Alkhawaldeh

(2020), Vol. 8, pp. 113163-113174, IEEE Access, Piscataway, N.J., C1-1

journal article

A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators

J Teh, W Teng, A Samsudin, J Chen

(2020), Vol. 14, pp. 1-11, Frontiers of Computer Science, Berlin, Germany, C1-1

journal article

µ2: A Lightweight Block Cipher

W Yeoh, J Teh, M Sazali

(2020), Vol. 603, pp. 281-290, ICCST 2019 : Proceedings of the 6th International Conference on Computational Science and Technology, Kota Kinabalu, Malaysia,, E1-1

conference

A machine learning approach to predicting block cipher security

T Lee, J Teh, J Yan, N Jamil, W Yeoh

(2020), pp. 122-132, CRYPTOLOGY 2020 : Proceedings of the 7th International Cryptology and Information Security Conference, [Virtual], E1-1

conference

Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm

W Yeoh, J Teh, J Chen

(2020), Vol. 12248, pp. 160-179, ACISP 2020 : Proceedings of the 25th Australasian Conference on Information Security and Privacy, Perth, Western Australia, E1-1

conference
2019

An image encryption scheme based on hybridizing digital chaos and finite state machine

M Alawida, J Teh, A Samsudin, W Alshoura

(2019), Vol. 164, pp. 249-266, Signal Processing, Amsterdam, The Netherlands, C1-1

journal article

A new hybrid digital chaotic system with applications in image encryption

M Alawida, A Samsudin, J Teh, R Alkhawaldeh

(2019), Vol. 160, pp. 45-58, Signal Processing, Amsterdam, The Netherlands, C1-1

journal article

Enhancing unimodal digital chaotic maps through hybridisation

M Alawida, A Samsudin, J Teh

(2019), Vol. 96, pp. 601-613, Nonlinear Dynamics, Berlin, Germany, C1-1

journal article

A chaos-based keyed hash function based on fixed point representation

J Teh, K Tan, M Alawida

(2019), Vol. 22, pp. 649-660, Cluster Computing, Berlin, Germany, C1-1

journal article

Deterministic chaotic finite-state automata

M Alawida, A Samsudin, J Teh, W Alshoura

(2019), Vol. 98, pp. 2403-2421, Nonlinear Dynamics, Berlin, Germany, C1-1

journal article

Digital Cosine Chaotic Map for Cryptographic Applications

M Alawida, A Samsudin, J Teh, W Alshoura

(2019), Vol. 7, pp. 150609-150622, IEEE Access, Piscataway, N.J., C1-1

journal article

Authentication for ID cards based on colour visual cryptography and facial recognition

D Ibrahim, R Abdullah, J Teh, B Alsalibi

(2019), pp. 164-167, ICCSP 2019 : Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, Kuala Lumpur, Malaysia, E1-1

conference
2018

A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform

W Yeoh, J Teh, H Chern

(2018), Vol. 78, pp. 1-21, Multimedia Tools and Applications, Berlin, Germany, C1-1

journal article
2017

Towards accurate statistical analysis of security margins: new searching strategies for differential attacks

J Chen, J Teh, Z Liu, C Su, A Samsudin, Y Xiang

(2017), Vol. 66, pp. 1763-1777, IEEE transactions on computers, Piscataway, N.J., C1-1

journal article

A chaos-based authenticated cipher with associated data

J Teh, A Samsudin

(2017), Vol. 2017, pp. 1-15, Security and Communication Networks, London, Eng., C1-1

journal article

A Stream Cipher based on Spatiotemporal Chaos and True Random Synchronization

J Teh, A Samsudin

(2017), Vol. 63, pp. 346-357, IETE Journal of Research, London, Eng., C1-1

journal article
2016

A true random number generator based on hyperchaos and digital sound

J Teh, W Teng, A Samsudin

(2016), pp. 264-269, ICCOINS 2016 : Proceedings of the 3rd International Conference on Computer and Information Sciences, Kuala Lumpur, Malaysia, E1-1

conference

Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework

J Chen, J Teh, C Su, A Samsudin, J Fang

(2016), Vol. 9723, pp. 333-346, ACISP 2016 : Proceedings of the 21st Australasian Conference on Information Security and Privacy, Melbourne, Vic., E1-1

conference

Accurate estimation of the full differential distribution for general Feistel structures

J Chen, A Miyaji, C Su, J Teh

(2016), Vol. 9589, pp. 108-124, Inscrypt 2015 : Proceedings of the 11th International Conference on Information Security and Cryptology, Beijing, China, E1-1

conference

Improved Differential Characteristic Searching Methods

J Chen, A Miyaji, C Su, J Teh

(2016), pp. 500-508, CSCloud 2015 : Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, New York, NY., E1-1

conference
2015

GPUs and chaos: a new true random number generator

J Teh, A Samsudin, M Al-Mazrooie, A Akhavan

(2015), Vol. 82, pp. 1913-1922, Nonlinear Dynamics, C1-1

journal article

Parallel chaotic hash function based on the shuffle-exchange network

J Teh, A Samsudin, A Akhavan

(2015), Vol. 81, pp. 1067-1079, Nonlinear Dynamics, C1-1

journal article

Funded Projects at Deakin

No Funded Projects at Deakin found

Supervisions

No completed student supervisions to report