Je Sen Teh

Orcid: 0000-0001-5571-4148

According to our database1, Je Sen Teh authored at least 40 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM.
J. Inf. Secur. Appl., August, 2023

SIM-P - A Simplified Consensus Protocol Simulator: Applications to Proof of Reputation-X and Proof of Contribution.
IEEE Internet Things J., 2023

Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN.
IACR Cryptol. ePrint Arch., 2023

2022
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations.
J. King Saud Univ. Comput. Inf. Sci., 2022

Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework.
J. Inf. Secur. Appl., 2022

New differential cryptanalysis results for the lightweight block cipher BORON.
J. Inf. Secur. Appl., 2022

Differential cryptanalysis of WARP.
J. Inf. Secur. Appl., 2022

Meet-in-the-Filter and Dynamic Counting with Applications to Speck.
IACR Cryptol. ePrint Arch., 2022

Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB.
Proceedings of the Emerging Information Security and Applications, 2022

2021
Blockchain Consensus: An Overview of Alternative Protocols.
Symmetry, 2021

An overview of visual cryptography techniques.
Multim. Tools Appl., 2021

Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization.
Inf. Secur. J. A Glob. Perspect., 2021

Network traffic identification of several open source secure proxy protocols.
Int. J. Netw. Manag., 2021

A Deep Learning Approach for Active S-box Prediction of Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2021

Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes.
IEEE Access, 2021

A Deep Learning Approach for Active S-Box Prediction of Lightweight Generalized Feistel Block Ciphers.
IEEE Access, 2021

An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain.
IEEE Access, 2021

Hybrid SVD-Based Image Watermarking Schemes: A Review.
IEEE Access, 2021

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence.
IEEE Access, 2021

2020
Implementation and practical problems of chaos-based cryptography revisited.
J. Inf. Secur. Appl., 2020

Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU.
J. Inf. Secur. Appl., 2020

Enhanced digital chaotic maps based on bit reversal with applications in random bit generators.
Inf. Sci., 2020

Optimized GPU Framework for Block Cipher Differential Search.
IACR Cryptol. ePrint Arch., 2020

Assessing Block Cipher Security using Linear and Nonlinear Machine Learning Models.
IACR Cryptol. ePrint Arch., 2020

A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators.
Frontiers Comput. Sci., 2020

A New Chaotic Image Watermarking Scheme Based on SVD and IWT.
IEEE Access, 2020

A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata.
IEEE Access, 2020

Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
An image encryption scheme based on hybridizing digital chaos and finite state machine.
Signal Process., 2019

A new hybrid digital chaotic system with applications in image encryption.
Signal Process., 2019

A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform.
Multim. Tools Appl., 2019

GPU-Accelerated Branch-and-Bound Algorithm for Differential Cluster Search of Block Ciphers.
IACR Cryptol. ePrint Arch., 2019

A chaos-based keyed hash function based on fixed point representation.
Clust. Comput., 2019

Digital Cosine Chaotic Map for Cryptographic Applications.
IEEE Access, 2019

Authentication for ID cards based on colour visual cryptography and facial recognition.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

2017
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017

A Chaos-Based Authenticated Cipher with Associated Data.
Secur. Commun. Networks, 2017

2016
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Improved Differential Characteristic Searching Methods.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Accurate Estimation of the Full Differential Distribution for General Feistel Structures.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015


  Loading...