top of page

*Papers written by main authors (undergraduate students, postgraduate students, research fellows) whom I supervised

2023

  1. *Y. Y. Chan, C-Y. Khor, J. S. Teh, W. J. Teng, N. Jamil, "Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB," in the 3rd International Conference on Emerging Information Security and Applications (EISA 2022).

  2. *M. Alawida, J. S. Teh, W. H. Alshoura, "A New Image Encryption Algorithm based on DNA State Machine for UAV Data Encryption," Drones.

  3. A. Biryukov, L. C. D. Santos, J. S. Teh, A. Udovenko, V Velichkov, "Meet-in-the-Filter and Dynamic Counting with Applications to Speck", in the 21st International Conference on Applied Cryptography and Network Security (ACNS 2023).

  4. *Y. Y. Chan, C-Y. Khor, B.T. Khoo, J. S. Teh, W. J. Teng, N. Jamil, "On the resistance of new lightweight block ciphers against differential cryptanalysis," Heliyon.

  5. *W. J. Teng, J. S. Teh, N. Jamil, "On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM," Journal of Information Security and Applications.

 

2022

  1. C. Chimeleze, N. Jamil, R. Ismail, K-Y. Lam, J. S. Teh, J. Samual, C. A. Okeke, "BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps using Machine Learning," Security and Communication Networks.

  2. *D. P. Oyinloye, J. S. Teh, N. Jamil, J. Teh, "SIM-P - A Simplified Consensus Protocol Simulator: Applications to Proof of Reputation-X and Proof of Contribution," IEEE Internet of Things Journal.

  3. J. S. Teh, A. Biryukov, "Differential Cryptanalysis of WARP," Journal of Information Security and Applications.

  4. A. Biryukov, J. S. Teh, A. Udovenko, "Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN," in Selected Areas in Cryptography (SAC 2022).

  5. *M. Alawida, J. S. Teh, A. Mehmood, A. Shoufan, "A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations," Journal of King Saud University-Computer and Information Sciences.

  6. *W. Z. Yeoh, J. S. Teh, J. Chen, "Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework," Journal of Information Security and Applications.

  7. J. S. Teh, L. J. Tham, N. Jamil, W. S. Yap, "New differential cryptanalysis results for the lightweight block cipher BORON," Journal of Information Security and Applications.

 

2021

  1. *W. H. Alshoura, Z. Zainol, J. S. Teh, M. Alawida, "An FPP-resistant SVD-based image watermarking scheme based on chaotic control," Alexandria Engineering Journal.

  2. *T. R. Lee, J. S. Teh, N. Jamil, J. L. S. Yan, J. Chen, "Lightweight Block Cipher Security Evaluation based on Machine Learning Classifiers and Active S-boxes," IEEE Access.

  3. *D. P. Oyinloye, J. S. Teh, N. Jamil, M. Alawida, "Blockchain Consensus: An Overview of Alternative Protocols," Symmetry.

  4. *M. F. Idris, J. S. Teh, J. L. S. Yan, W-Z. Yeoh, "A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers," IEEE Access.

  5. *D. R. Ibrahim, J. S. Teh, R. Abdullah, "An overview of visual cryptography techniques," Multimedia Tools and Applications.

  6. R. Awadallah, A. Samsudin, J. S. Teh, M. Almazrooie, "An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain," IEEE Access.

  7. *D. R. Ibrahim, J. S. Teh, R. Abdullah, "Improved Facial Recognition Algorithms Based on Dragonfly and Grasshopper Optimization," in the 7th International Conference on Computational Science and Technology (ICCST 2020), Lecture Notes in Electrical Engineering.

  8. *W. H. Alshoura, Z. Zainol, J. S. Teh, M. Alawida, A. Alabdulatif, “Hybrid SVD-based Image Watermarking Schemes: A Review,” IEEE Access.

  9. *M. Alawida, A Samsudin, N Alajarmeh, J. S. Teh, M. Ahmad, W. H. Alshoura, “A Novel Hash Function based on a Chaotic Sponge and DNA Sequence,” IEEE Access.

2020

  1. *D. R. Ibrahim, R. Abdullah, J. S. Teh, “An enhanced color visual cryptography scheme based on the binary dragonfly algorithm,” International Journal of Computers and Applications.

  2. J. L. S. Yan, J. S. Teh, A. M. Kassim, C. W. Kee, R. Abdullah, “Girls2Code: Cultivating interest in programming among young girls in Malaysia by making drawings come to life,” STEM Education for Girls and Women: Breaking Barriers and Exploring Gender Inequality in Asia, UNESCO Publications.

  3. *D. R. Ibrahim, J. S. Teh, R. Abdullah, “Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimisation,” Information Security Journal: A Global Perspective.

  4. Z. Chen, J. Chen, W. Meng, J. S. Teh, P. Li, B. Ren, “Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU,” Journal of Information Security and Applications.

  5. *W-Z. Yeoh, J. S. Teh, J. Chen, “Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm,” in the 25th Australasian Conference on Information Security and Privacy (ACISP 2020), Lecture Notes in Computer Science.

  6. J. S. Teh, W. Teng, A. Samsudin, J. Chen, “A Post-processing Method for True Random Number Generators based on Hyperchaos with Applications in Audio-based Generators”, Frontiers of Computer Science.

  7. *T. R. Lee, J. S. Teh, J. S. Y. Liew, N. Jamil, W-Z. Yeoh, “A Machine Learning Approach to Predicting Block Cipher Security,” in the 7th International Cryptology and Information Security Conference 2020 (CRYPTOLOGY 2020).

  8. *M. Alawida, J. S. Teh, D. P. Oyinloye, W. H. Alshoura, M. Ahmad, R. S. Alkhawaldeh, “A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata,” IEEE Access.

  9. J. S. Teh, M. Alawida, A. Samsudin, “Generating True Random Numbers Based on Multicore CPU Using Race Conditions and Chaotic Maps,” Arabian Journal for Science and Engineering.

  10. *W. H. Alshoura, Z. Zainol, J. S. Teh, M. Alawida, “A New Chaotic Image Watermarking Scheme Based on SVD and IWT, “IEEE Access.

  11. J. S. Teh, M. Alawida, J. J. Ho, “Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic,” Nonlinear Dynamics.

  12. *W-Z. Yeoh, J. S. Teh, M. I. S. M. Sazali, “u2: A lightweight block cipher”, in the 6th International Conference on Computational Science and Technology (ICCST 2019), Lecture Notes in Electrical Engineering.

 

2019

  1. Y. Zhang, J. Chen, K. Chen, R. Xu, J. S. Teh, S. Zhang, “Network traffic identification of several open source secure proxy protocols,” International Journal of Network Management.

  2. J. S. Teh, M. Alawida, Y. C. Sii, “Implementation and practical problems of chaos-based cryptography revisited,” Journal of Information Security and Applications.

  3. *M. Alawida, A. Samsudin, J. S. Teh, “Enhanced digital chaotic maps based on bit reversal with applications in random bit generators,” Information Sciences.

  4. *M. Alawida, A. Samsudin, J. S. Teh, W. H. Alshoura, “Deterministic chaotic finite state automata”, Nonlinear Dynamics.

  5. *M. Alawida, A. Samsudin, J. S. Teh, “Digital cosine chaotic map for cryptographic applications," IEEE Access.

  6. *M. Alawida, A. Samsudin, J. S. Teh, “Enhancing unimodal digital chaotic maps through hybridisation,” Nonlinear Dynamics.

  7. *M. Alawida, J. S. Teh, A. Samsudin, W. H. Alshoura, “An image encryption scheme based on hybridizing digital chaos and finite state machine”, Signal Processing.

  8. *M. Alawida, M. Samsudin, J. S. Teh, R. S. Alkhawaldeh, “A new hybrid digital chaotic system with applications in image encryption”, Signal Processing.

  9. *D. R. Ibrahim, R. Abdullah, J. S. Teh, B. Alsalibi, “Authentication for ID cards based on colour visual cryptography and facial recognition”, in the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 2019). 

 

2018

  1. *W-Z. Yeoh, J. S. Teh, H. R. Chern, “A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform”, Multimedia Tools and Applications.

  2. J. S. Teh, K. Tan, M. Alawida, “A chaos-based keyed hash function based on fixed point representation”, Cluster Computing.

 

2017

  1. J. Chen, J. S. Teh, Z. Liu, C. Su, A. Samsudin, Y. Xiang, “Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks”, IEEE Transactions on Computers.

  2. J. S. Teh, A. Samsudin, “A Stream Cipher based on Spatiotemporal Chaos and True Random Synchronization”, IETE Journal of Research.

  3. J. S. Teh, A. Samsudin, "A Chaos-Based Authenticated Cipher with Associated Data," Security and Communication Networks. 

 

2016

  1. J. S. Teh, W. Teng, A. Samsudin, “A true random number generator based on hyperchaos and digital sound”, in the 3rd International Conference on Computer and Information Sciences (ICCOINS 2016).

  2. J. Chen, J. S. Teh, C. Su, A. Samsudin, J. Fang, “Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework”, in the 21st Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science.

  3. J. Chen, A. Miyaji, C. Su, J. S. Teh, “Accurate Estimation of the Full Differential Distribution for General Feistel Structures”, in the 11th International Conference on Information Security and Cryptology (INSCRYPT 2015), Lecture Notes in Computer Science.

  4. J. Chen, A. Miyaji, C. Su, J. S. Teh, “Improved differential characteristic searching methods”, in the IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud 2015).

2015

  1. J. S. Teh, A. Samsudin, M. Al-Mazrooie, A. Akhavan, “GPUs and chaos: a new true random number generator”, Nonlinear Dynamics.

  2. J. S. Teh, A. Samsudin, A. Akhavan, “Parallel chaotic hash function based on the shuffle-exchange network”, Nonlinear Dynamics.

Preprints

bottom of page