2021

  1. D. P. Oyinloye, J. S. Teh*, N. Jamil*, M. Alawida, "Blockchain Consensus: An Overview of Alternative Protocols," Symmetry.

  2. M. F. Idris, J. S. Teh*, J. L. S. Yan, W-Z. Yeoh, "A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers," IEEE Access.

  3. D. R. Ibrahim, J. S. Teh*, R. Abdullah, "An overview of visual cryptography techniques," Multimedia Tools and Applications.

  4. R. Awadallah*, A. Samsudin*, J. S. Teh, M. Almazrooie, "An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain," IEEE Access.

  5. D. R. Ibrahim, J. S. Teh*, R. Abdullah, "Improved Facial Recognition Algorithms Based on Dragonfly and Grasshopper Optimization," in the 7th International Conference on Computational Science and Technology (ICCST 2020), Lecture Notes in Electrical Engineering.

  6. W. H. Alshoura*, Z. Zainol*, J. S. Teh*, M. Alawida, A. Alabdulatif, “Hybrid SVD-based Image Watermarking Schemes: A Review,” IEEE Access.

  7. M. Alawida*, A Samsudin*, N Alajarmeh, J. S. Teh, M. Ahmad, W. H. Alshoura, “A Novel Hash Function based on a Chaotic Sponge and DNA Sequence,” IEEE Access.

2020

  1. D. R. Ibrahim, R. Abdullah, J. S. Teh*, “An enhanced color visual cryptography scheme based on the binary dragonfly algorithm,” International Journal of Computers and Applications.

  2. J. L. S. Yan*, J. S. Teh, A. M. Kassim, C. W. Kee, R. Abdullah, “Girls2Code: Cultivating interest in programming among young girls in Malaysia by making drawings come to life,” STEM Education for Girls and Women: Breaking Barriers and Exploring Gender Inequality in Asia, UNESCO Publications.

  3. D. R. Ibrahim, J. S. Teh*, R. Abdullah, “Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimisation,” Information Security Journal: A Global Perspective.

  4. Z. Chen, J. Chen*, W. Meng, J. S. Teh, P. Li, B. Ren, “Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU,” Journal of Information Security and Applications.

  5. W-Z. Yeoh, J. S. Teh*, J. Chen, “Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm,” in the 25th Australasian Conference on Information Security and Privacy (ACISP 2020), Lecture Notes in Computer Science.

  6. J. S. Teh*, W. Teng, A. Samsudin, J. Chen, “A Post-processing Method for True Random Number Generators based on Hyperchaos with Applications in Audio-based Generators”, Frontiers of Computer Science.

  7. T. R. Lee, J. S. Teh*, J. S. Y. Liew, N. Jamil, W-Z. Yeoh, “A Machine Learning Approach to Predicting Block Cipher Security,” in the 7th International Cryptology and Information Security Conference 2020 (CRYPTOLOGY 2020).

  8. M. Alawida*, J. S. Teh*, D. P. Oyinloye, W. H. Alshoura, M. Ahmad, R. S. Alkhawaldeh, “A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata,” IEEE Access.

  9. J. S. Teh*, M. Alawida, A. Samsudin, “Generating True Random Numbers Based on Multicore CPU Using Race Conditions and Chaotic Maps,” Arabian Journal for Science and Engineering.

  10. W. H. Alshoura, Z. Zainol, J. S. Teh*, M. Alawida, “A New Chaotic Image Watermarking Scheme Based on SVD and IWT, “IEEE Access.

  11. J. S. Teh*, M. Alawida, J. J. Ho, “Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic,” Nonlinear Dynamics.

  12. W-Z. Yeoh, J. S. Teh*, M. I. S. M. Sazali, “u2: A lightweight block cipher”, in the 6th International Conference on Computational Science and Technology (ICCST 2019), Lecture Notes in Electrical Engineering.

 

2019

  1. Y. Zhang, J. Chen*, K. Chen, R. Xu, J. S. Teh, S. Zhang, “Network traffic identification of several open source secure proxy protocols,” International Journal of Network Management.

  2. J. S. Teh*, M. Alawida, Y. C. Sii, “Implementation and practical problems of chaos-based cryptography revisited,” Journal of Information Security and Applications.

  3. M. Alawida*, A. Samsudin, J. S. Teh*, “Enhanced digital chaotic maps based on bit reversal with applications in random bit generators,” Information Sciences.

  4. M. Alawida*, A. Samsudin, J. S. Teh, W. H. Alshoura, “Deterministic chaotic finite state automata”, Nonlinear Dynamics.

  5. M. Alawida*, A. Samsudin, J. S. Teh*, “Digital cosine chaotic map for cryptographic applications," IEEE Access.

  6. M. Alawida, A. Samsudin, J. S. Teh*, “Enhancing unimodal digital chaotic maps through hybridisation,” Nonlinear Dynamics.

  7. M. Alawida, J. S. Teh*, A. Samsudin, W. H. Alshoura, “An image encryption scheme based on hybridizing digital chaos and finite state machine”, Signal Processing.

  8. M. Alawida*, M. Samsudin, J. S. Teh, R. S. Alkhawaldeh, “A new hybrid digital chaotic system with applications in image encryption”, Signal Processing.

  9. D. R. Ibrahim, R. Abdullah, J. S. Teh*, B. Alsalibi, “Authentication for ID cards based on colour visual cryptography and facial recognition”, in the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 2019). 

 

2018

  1. W-Z. Yeoh, J. S. Teh*, H. R. Chern, “A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform”, Multimedia Tools and Applications.

  2. J. S. Teh*, K. Tan, M. Alawida, “A chaos-based keyed hash function based on fixed point representation”, Cluster Computing.

 

2017

  1. J. Chen, J. S. Teh, Z. Liu, C. Su, A. Samsudin, Y. Xiang, “Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks”, IEEE Transactions on Computers.

  2. J. S. Teh, A. Samsudin*, “A Stream Cipher based on Spatiotemporal Chaos and True Random Synchronization”, IETE Journal of Research.

 

2016

  1. J. S. Teh*, W. Teng, A. Samsudin, “A true random number generator based on hyperchaos and digital sound”, in the 3rd International Conference on Computer and Information Sciences (ICCOINS 2016).

  2. J. Chen*, J. S. Teh*, C. Su, A. Samsudin, J. Fang, “Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework”, in the 21st Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science.

  3. J. Chen*, A. Miyaji, C. Su, J. S. Teh, “Accurate Estimation of the Full Differential Distribution for General Feistel Structures”, in the 11th International Conference on Information Security and Cryptology (INSCRYPT 2015), Lecture Notes in Computer Science.

  4. J. Chen*, A. Miyaji, C. Su, J. S. Teh, “Improved differential characteristic searching methods”, in the IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud 2015).

2015

  1. J. S. Teh, A. Samsudin*, M. Al-Mazrooie, A. Akhavan, “GPUs and chaos: a new true random number generator”, Nonlinear Dynamics.

  2. J. S. Teh, A. Samsudin*, A. Akhavan, “Parallel chaotic hash function based on the shuffle-exchange network”, Nonlinear Dynamics.

Preprints

  1. M. F. Idris, J. S. Teh*, J. L. S. Yan, W-Z. Yeoh, "A Deep Learning Approach for Active S-box Prediction of Generalized Feistel Lightweight Block Ciphers", Cryptology ePrint Archive.

  2. T. R. Lee, J. S. Teh*, J. L. S. Yan, N. Jamil, J. Chen, "Assessing Lightweight Block Cipher Security using Linear and Nonlinear Machine Learning Models", Cryptology ePrint Archive.

  3. W-Z. Yeoh, J. S. Teh*, J. Chen, "Optimized GPU Framework for Block Cipher Differential Search", Cryptology ePrint Archive.