default search action
Je Sen Teh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Abubakar Abba, Je Sen Teh, Moatsum Alawida:
Towards accurate keyspace analysis of chaos-based image ciphers. Multim. Tools Appl. 83(33): 79047-79066 (2024) - 2023
- [j28]Damilare Peter Oyinloye, Je Sen Teh, Norziana Jamil, Jiashen Teh:
SIM-P - A Simplified Consensus Protocol Simulator: Applications to Proof of Reputation-X and Proof of Contribution. IEEE Internet Things J. 10(6, March 15): 5083-5094 (2023) - [j27]Weijian Teng, Je Sen Teh, Norziana Jamil:
On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM. J. Inf. Secur. Appl. 76: 103531 (2023) - [c8]Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov:
Meet-in-the-Filter and Dynamic Counting with Applications to Speck. ACNS (1) 2023: 149-177 - [e1]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [i8]Alex Biryukov, Je Sen Teh, Aleksei Udovenko:
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN. IACR Cryptol. ePrint Arch. 2023: 851 (2023) - 2022
- [j26]Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen:
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework. J. Inf. Secur. Appl. 65: 103087 (2022) - [j25]Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap:
New differential cryptanalysis results for the lightweight block cipher BORON. J. Inf. Secur. Appl. 66: 103129 (2022) - [j24]Je Sen Teh, Alex Biryukov:
Differential cryptanalysis of WARP. J. Inf. Secur. Appl. 70: 103316 (2022) - [j23]Moatsum Alawida, Je Sen Teh, Abid Mehmood, Abdulhadi Shoufan, Wafa' Hamdan Alshoura:
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8136-8151 (2022) - [c7]Yen Yee Chan, Cher-Yin Khor, Je Sen Teh, Weijian Teng, Norziana Jamil:
Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB. EISA 2022: 55-67 - [c6]Alex Biryukov, Je Sen Teh, Aleksei Udovenko:
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN. SAC 2022: 355-375 - [i7]Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov:
Meet-in-the-Filter and Dynamic Counting with Applications to Speck. IACR Cryptol. ePrint Arch. 2022: 673 (2022) - 2021
- [j22]Moatsum Alawida, Azman Samsudin, Nancy Alajarmeh, Je Sen Teh, Musheer Ahmad, Wafa' Hamdan Alshoura:
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence. IEEE Access 9: 17882-17897 (2021) - [j21]Wafa' Hamdan Alshoura, Zurinahni Zainol, Je Sen Teh, Moatsum Alawida, Abdulatif Alabdulatif:
Hybrid SVD-Based Image Watermarking Schemes: A Review. IEEE Access 9: 32931-32968 (2021) - [j20]Ruba Awadallah, Azman Samsudin, Je Sen Teh, Mishal Almazrooie:
An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain. IEEE Access 9: 69513-69526 (2021) - [j19]Mohamed Fadl Idris, Je Sen Teh, Jasy Liew Suet Yan, Wei-Zhu Yeoh:
A Deep Learning Approach for Active S-Box Prediction of Lightweight Generalized Feistel Block Ciphers. IEEE Access 9: 104205-104216 (2021) - [j18]Ting Rong Lee, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, Jiageng Chen:
Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes. IEEE Access 9: 134052-134064 (2021) - [j17]Yidan Zhang, Jiageng Chen, Kaiming Chen, Ruoyan Xu, Jesen Teh, Shuai Zhang:
Network traffic identification of several open source secure proxy protocols. Int. J. Netw. Manag. 31(2) (2021) - [j16]Dyala R. Ibrahim, Je Sen Teh, Rosni Abdullah:
Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization. Inf. Secur. J. A Glob. Perspect. 30(3): 149-159 (2021) - [j15]Dyala R. Ibrahim, Je Sen Teh, Rosni Abdullah:
An overview of visual cryptography techniques. Multim. Tools Appl. 80(21): 31927-31952 (2021) - [j14]Damilare Peter Oyinloye, Je Sen Teh, Norziana Jamil, Moatsum Alawida:
Blockchain Consensus: An Overview of Alternative Protocols. Symmetry 13(8): 1363 (2021) - [i6]Mohamed Fadl Idris, Je Sen Teh, Jasy Liew Suet Yan, Wei-Zhu Yeoh:
A Deep Learning Approach for Active S-box Prediction of Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2021: 66 (2021) - [i5]Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap:
New Differential Cryptanalysis Results for the Lightweight Block Cipher BORON. IACR Cryptol. ePrint Arch. 2021: 1640 (2021) - [i4]Je Sen Teh, Alex Biryukov:
Differential Cryptanalysis of WARP. IACR Cryptol. ePrint Arch. 2021: 1641 (2021) - 2020
- [j13]Wafa' Hamdan Alshoura, Zurinahni Zainol, Je Sen Teh, Moatsum Alawida:
A New Chaotic Image Watermarking Scheme Based on SVD and IWT. IEEE Access 8: 43391-43406 (2020) - [j12]Moatsum Alawida, Je Sen Teh, Damilare Peter Oyinloye, Wafa' Hamdan Alshoura, Musheer Ahmad, Rami S. Alkhawaldeh:
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata. IEEE Access 8: 113163-113174 (2020) - [j11]Je Sen Teh, Weijian Teng, Azman Samsudin, Jiageng Chen:
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators. Frontiers Comput. Sci. 14(6): 146405 (2020) - [j10]Moatsum Alawida, Azman Samsudin, Je Sen Teh:
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. Inf. Sci. 512: 1155-1169 (2020) - [j9]Je Sen Teh, Moatsum Alawida, You Cheng Sii:
Implementation and practical problems of chaos-based cryptography revisited. J. Inf. Secur. Appl. 50 (2020) - [j8]Zhanwen Chen, Jiageng Chen, Weizhi Meng, Je Sen Teh, Pei Li, Bingqing Ren:
Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU. J. Inf. Secur. Appl. 55: 102565 (2020) - [c5]Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen:
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm. ACISP 2020: 160-179 - [i3]Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen:
Optimized GPU Framework for Block Cipher Differential Search. IACR Cryptol. ePrint Arch. 2020: 1056 (2020) - [i2]Ting Rong Lee, Je Sen Teh, Jasy Suet Yan Liew, Norziana Jamil, Jiageng Chen:
Assessing Block Cipher Security using Linear and Nonlinear Machine Learning Models. IACR Cryptol. ePrint Arch. 2020: 1235 (2020)
2010 – 2019
- 2019
- [j7]Moatsum Alawida, Azman Samsudin, Je Sen Teh, Wafa' Hamdan Alshoura:
Digital Cosine Chaotic Map for Cryptographic Applications. IEEE Access 7: 150609-150622 (2019) - [j6]Je Sen Teh, Kaijun Tan, Moatsum Alawida:
A chaos-based keyed hash function based on fixed point representation. Clust. Comput. 22(2): 649-660 (2019) - [j5]Wei-Zhu Yeoh, Je Sen Teh, Huey Rong Chern:
A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform. Multim. Tools Appl. 78(12): 15929-15949 (2019) - [j4]Moatsum Alawida, Azman Samsudin, Je Sen Teh, Rami S. Alkhawaldeh:
A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160: 45-58 (2019) - [j3]Moatsum Alawida, Je Sen Teh, Azman Samsudin, Wafa' Hamdan Alshoura:
An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process. 164: 249-266 (2019) - [c4]Dyala R. Ibrahim, Rosni Abdullah, Je Sen Teh, Bisan Alsalibi:
Authentication for ID cards based on colour visual cryptography and facial recognition. ICCSP 2019: 164-167 - [i1]Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen:
GPU-Accelerated Branch-and-Bound Algorithm for Differential Cluster Search of Block Ciphers. IACR Cryptol. ePrint Arch. 2019: 1216 (2019) - 2017
- [j2]Je Sen Teh, Azman Samsudin:
A Chaos-Based Authenticated Cipher with Associated Data. Secur. Commun. Networks 2017: 9040518:1-9040518:15 (2017) - [j1]Jiageng Chen, Jesen Teh, Zhe Liu, Chunhua Su, Azman Samsudin, Yang Xiang:
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks. IEEE Trans. Computers 66(10): 1763-1777 (2017) - 2016
- [c3]Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang:
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework. ACISP (2) 2016: 333-346 - 2015
- [c2]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Accurate Estimation of the Full Differential Distribution for General Feistel Structures. Inscrypt 2015: 108-124 - [c1]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Improved Differential Characteristic Searching Methods. CSCloud 2015: 500-508
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint