*Papers written by main authors (undergraduate students, postgraduate students, research fellows) whom I supervised
2023
-
*Y. Y. Chan, C-Y. Khor, J. S. Teh, W. J. Teng, N. Jamil, "Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB," in the 3rd International Conference on Emerging Information Security and Applications (EISA 2022).
-
*M. Alawida, J. S. Teh, W. H. Alshoura, "A New Image Encryption Algorithm based on DNA State Machine for UAV Data Encryption," Drones.
-
A. Biryukov, L. C. D. Santos, J. S. Teh, A. Udovenko, V Velichkov, "Meet-in-the-Filter and Dynamic Counting with Applications to Speck", in the 21st International Conference on Applied Cryptography and Network Security (ACNS 2023).
-
*Y. Y. Chan, C-Y. Khor, B.T. Khoo, J. S. Teh, W. J. Teng, N. Jamil, "On the resistance of new lightweight block ciphers against differential cryptanalysis," Heliyon.
-
*W. J. Teng, J. S. Teh, N. Jamil, "On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM," Journal of Information Security and Applications.
2022
-
C. Chimeleze, N. Jamil, R. Ismail, K-Y. Lam, J. S. Teh, J. Samual, C. A. Okeke, "BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps using Machine Learning," Security and Communication Networks.
-
*D. P. Oyinloye, J. S. Teh, N. Jamil, J. Teh, "SIM-P - A Simplified Consensus Protocol Simulator: Applications to Proof of Reputation-X and Proof of Contribution," IEEE Internet of Things Journal.
-
J. S. Teh, A. Biryukov, "Differential Cryptanalysis of WARP," Journal of Information Security and Applications.
-
A. Biryukov, J. S. Teh, A. Udovenko, "Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN," in Selected Areas in Cryptography (SAC 2022).
-
*M. Alawida, J. S. Teh, A. Mehmood, A. Shoufan, "A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations," Journal of King Saud University-Computer and Information Sciences.
-
*W. Z. Yeoh, J. S. Teh, J. Chen, "Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework," Journal of Information Security and Applications.
-
J. S. Teh, L. J. Tham, N. Jamil, W. S. Yap, "New differential cryptanalysis results for the lightweight block cipher BORON," Journal of Information Security and Applications.
2021
-
*W. H. Alshoura, Z. Zainol, J. S. Teh, M. Alawida, "An FPP-resistant SVD-based image watermarking scheme based on chaotic control," Alexandria Engineering Journal.
-
*T. R. Lee, J. S. Teh, N. Jamil, J. L. S. Yan, J. Chen, "Lightweight Block Cipher Security Evaluation based on Machine Learning Classifiers and Active S-boxes," IEEE Access.
-
*D. P. Oyinloye, J. S. Teh, N. Jamil, M. Alawida, "Blockchain Consensus: An Overview of Alternative Protocols," Symmetry.
-
*M. F. Idris, J. S. Teh, J. L. S. Yan, W-Z. Yeoh, "A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers," IEEE Access.
-
*D. R. Ibrahim, J. S. Teh, R. Abdullah, "An overview of visual cryptography techniques," Multimedia Tools and Applications.
-
R. Awadallah, A. Samsudin, J. S. Teh, M. Almazrooie, "An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain," IEEE Access.
-
*D. R. Ibrahim, J. S. Teh, R. Abdullah, "Improved Facial Recognition Algorithms Based on Dragonfly and Grasshopper Optimization," in the 7th International Conference on Computational Science and Technology (ICCST 2020), Lecture Notes in Electrical Engineering.
-
*W. H. Alshoura, Z. Zainol, J. S. Teh, M. Alawida, A. Alabdulatif, “Hybrid SVD-based Image Watermarking Schemes: A Review,” IEEE Access.
-
*M. Alawida, A Samsudin, N Alajarmeh, J. S. Teh, M. Ahmad, W. H. Alshoura, “A Novel Hash Function based on a Chaotic Sponge and DNA Sequence,” IEEE Access.
2020
-
*D. R. Ibrahim, R. Abdullah, J. S. Teh, “An enhanced color visual cryptography scheme based on the binary dragonfly algorithm,” International Journal of Computers and Applications.
-
J. L. S. Yan, J. S. Teh, A. M. Kassim, C. W. Kee, R. Abdullah, “Girls2Code: Cultivating interest in programming among young girls in Malaysia by making drawings come to life,” STEM Education for Girls and Women: Breaking Barriers and Exploring Gender Inequality in Asia, UNESCO Publications.
-
*D. R. Ibrahim, J. S. Teh, R. Abdullah, “Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimisation,” Information Security Journal: A Global Perspective.
-
Z. Chen, J. Chen, W. Meng, J. S. Teh, P. Li, B. Ren, “Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU,” Journal of Information Security and Applications.
-
*W-Z. Yeoh, J. S. Teh, J. Chen, “Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm,” in the 25th Australasian Conference on Information Security and Privacy (ACISP 2020), Lecture Notes in Computer Science.
-
J. S. Teh, W. Teng, A. Samsudin, J. Chen, “A Post-processing Method for True Random Number Generators based on Hyperchaos with Applications in Audio-based Generators”, Frontiers of Computer Science.
-
*T. R. Lee, J. S. Teh, J. S. Y. Liew, N. Jamil, W-Z. Yeoh, “A Machine Learning Approach to Predicting Block Cipher Security,” in the 7th International Cryptology and Information Security Conference 2020 (CRYPTOLOGY 2020).
-
*M. Alawida, J. S. Teh, D. P. Oyinloye, W. H. Alshoura, M. Ahmad, R. S. Alkhawaldeh, “A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata,” IEEE Access.
-
J. S. Teh, M. Alawida, A. Samsudin, “Generating True Random Numbers Based on Multicore CPU Using Race Conditions and Chaotic Maps,” Arabian Journal for Science and Engineering.
-
*W. H. Alshoura, Z. Zainol, J. S. Teh, M. Alawida, “A New Chaotic Image Watermarking Scheme Based on SVD and IWT, “IEEE Access.
-
J. S. Teh, M. Alawida, J. J. Ho, “Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic,” Nonlinear Dynamics.
-
*W-Z. Yeoh, J. S. Teh, M. I. S. M. Sazali, “u2: A lightweight block cipher”, in the 6th International Conference on Computational Science and Technology (ICCST 2019), Lecture Notes in Electrical Engineering.
2019
-
Y. Zhang, J. Chen, K. Chen, R. Xu, J. S. Teh, S. Zhang, “Network traffic identification of several open source secure proxy protocols,” International Journal of Network Management.
-
J. S. Teh, M. Alawida, Y. C. Sii, “Implementation and practical problems of chaos-based cryptography revisited,” Journal of Information Security and Applications.
-
*M. Alawida, A. Samsudin, J. S. Teh, “Enhanced digital chaotic maps based on bit reversal with applications in random bit generators,” Information Sciences.
-
*M. Alawida, A. Samsudin, J. S. Teh, W. H. Alshoura, “Deterministic chaotic finite state automata”, Nonlinear Dynamics.
-
*M. Alawida, A. Samsudin, J. S. Teh, “Digital cosine chaotic map for cryptographic applications," IEEE Access.
-
*M. Alawida, A. Samsudin, J. S. Teh, “Enhancing unimodal digital chaotic maps through hybridisation,” Nonlinear Dynamics.
-
*M. Alawida, J. S. Teh, A. Samsudin, W. H. Alshoura, “An image encryption scheme based on hybridizing digital chaos and finite state machine”, Signal Processing.
-
*M. Alawida, M. Samsudin, J. S. Teh, R. S. Alkhawaldeh, “A new hybrid digital chaotic system with applications in image encryption”, Signal Processing.
-
*D. R. Ibrahim, R. Abdullah, J. S. Teh, B. Alsalibi, “Authentication for ID cards based on colour visual cryptography and facial recognition”, in the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 2019).
2018
-
*W-Z. Yeoh, J. S. Teh, H. R. Chern, “A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform”, Multimedia Tools and Applications.
-
J. S. Teh, K. Tan, M. Alawida, “A chaos-based keyed hash function based on fixed point representation”, Cluster Computing.
2017
-
J. Chen, J. S. Teh, Z. Liu, C. Su, A. Samsudin, Y. Xiang, “Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks”, IEEE Transactions on Computers.
-
J. S. Teh, A. Samsudin, “A Stream Cipher based on Spatiotemporal Chaos and True Random Synchronization”, IETE Journal of Research.
-
J. S. Teh, A. Samsudin, "A Chaos-Based Authenticated Cipher with Associated Data," Security and Communication Networks.
2016
-
J. S. Teh, W. Teng, A. Samsudin, “A true random number generator based on hyperchaos and digital sound”, in the 3rd International Conference on Computer and Information Sciences (ICCOINS 2016).
-
J. Chen, J. S. Teh, C. Su, A. Samsudin, J. Fang, “Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework”, in the 21st Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science.
-
J. Chen, A. Miyaji, C. Su, J. S. Teh, “Accurate Estimation of the Full Differential Distribution for General Feistel Structures”, in the 11th International Conference on Information Security and Cryptology (INSCRYPT 2015), Lecture Notes in Computer Science.
-
J. Chen, A. Miyaji, C. Su, J. S. Teh, “Improved differential characteristic searching methods”, in the IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud 2015).
2015
-
J. S. Teh, A. Samsudin, M. Al-Mazrooie, A. Akhavan, “GPUs and chaos: a new true random number generator”, Nonlinear Dynamics.
-
J. S. Teh, A. Samsudin, A. Akhavan, “Parallel chaotic hash function based on the shuffle-exchange network”, Nonlinear Dynamics.
Preprints
-